{"id":96189,"date":"2019-08-09T13:00:50","date_gmt":"2019-08-09T20:00:50","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96189"},"modified":"2025-06-01T23:38:49","modified_gmt":"2025-06-02T06:38:49","slug":"from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/","title":{"rendered":"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta"},"content":{"rendered":"<p>Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to order the others around. This tendency towards centralized authority is not without reason, however \u2013 it is often more efficient to have one person, or thing, calling the shots. For an example of the latter, one needs look no further than Delta\u2019s enteliBUS Manager, or eBMGR. Put simply, this device aims to centralize control for various pieces of hardware often found in corporate or industrial settings, whether it be temperature and humidity controls for a server room, a boiler and its corresponding alarms and sensors in a factory, or access control and lighting in a business. The advantages seem obvious, too \u2013 it can be configured to adjust fan speeds according to thermostat readings or sound an alarm if pressure crosses a certain threshold, all with little human interaction.<\/p>\n<p>The disadvantages, while less obvious, become clear when one considers tech-savvy malicious actors. Suddenly, your potentially critical system now has a single point of failure, and one that is attached to a network, to make matters worse.<\/p>\n<p>Consider for a moment a positive pressure room in a hospital, the kind typically used to keep out contaminants during surgeries. Managing rooms such as these is a typical application for the eBMGR and it does not take an overactive imagination to envision what kind of damage a bad actor could cause if they disrupted such a sensitive environment.<\/p>\n<p>Management. Control. That\u2019s what\u2019s at stake if a device such as this is not properly secured. It\u2019s also what made this device such a high priority for McAfee\u2019s Advanced Threat Research team. The decision to make network-connected critical systems such as these demands an extremely high standard of software security \u2013 finding where it might fall short is precisely our job.<\/p>\n<p>With these stakes in mind, our team went to work. We began by hooking up an eBMGR unit to a network with several other devices to simulate an environment somewhat true to life. Using a technique known as \u201cfuzzing\u201d, we then blasted the device with all kinds of deliberately malformed network traffic, looking for a chink in the armor. That is one advantage often afforded to the bad guys in software security; they can make many mistakes; manufacturers need only make one.<\/p>\n<p>Perhaps unsurprisingly, persistence and creativity led us to discover one such mistake: a mismatch in the memory sizes used to handle incoming network data created what is often referred to as a buffer overflow vulnerability. This seemingly innocuous mistake rendered the eBMGR vulnerable to our carefully crafted network attack, which allows a hacker on the same network to gain complete control of the device\u2019s operating system. Worse still, the attack uses what is known as broadcast traffic, meaning they can launch the attack without knowing the location of the targets on the network. The result is a twisted version of Marco Polo \u2013 the hacker needs only shout \u201cMarco!\u201d into the darkness and wait for the unsuspecting targets to shout \u201cPolo!\u201d in response.<\/p>\n<p>In this field, complete control of the operating system is typically the finish line. But we weren\u2019t content with just that. After all, controlling the eBMGR on its own is not all that interesting; we wanted to see if we could use it to control all the devices it was connected to. Unfortunately, we did not have the source code for the device\u2019s software, so this new goal proved non-trivial.<\/p>\n<p>We went back to the drawing board and acquired some additional hardware that the Delta device might realistically be charged with managing and had a certified technician program the device just as he would for a real-world client \u2013 in our case, as an HVAC controller. Our strategy quickly became what is often referred to as a replay attack. As an example, if we wanted to determine how to tell the device to flip a switch, we would first observe the device flipping the switch in the \u201cnormal\u201d way and try to track down what code had to run for that to happen. Next, we would try to recreate those conditions by running that code manually, thus <em>replaying<\/em> the previously observed event. This strategy proved effective in granting us control over every category of device the eBMGR supports. Moreover, this method remains agnostic to the specific hardware attached to the building manager. Hypothetically, this sort of attack would work without any prior knowledge of the device\u2019s configuration.<\/p>\n<p>The result was an attack that would compromise any enteliBUS Manager on the same network and attach a custom piece of malware we developed to the software running on it. This malware would then create a backdoor which would allow the attacker to remotely issue commands to the manager and control any hardware connected to it, whether it be something as benign as a light switch or as dangerous as a boiler.<\/p>\n<p>To make matters worse, if the attacker knows the IP address of the device ahead of time, this exploit can be performed over the Internet, increasing its impact exponentially. At the time of this writing, a Shodan scan revealed that over 1600 such devices are internet connected, meaning the danger is far from hypothetical.<\/p>\n<p>For those craving the nitty-gritty technical details of how we went about accomplishing this, we also published what is arguably a novella <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/hvacking-understanding-the-delta-between-security-and-reality\/\" target=\"_blank\" rel=\"noopener noreferrer\"><u>here<\/u><\/a>\u00a0that delves into the vulnerability discovery and exploitation process from start to finish.<\/p>\n<p>In keeping with our <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/threat-center\/advanced-threat-research\/disclosure.html\" target=\"_blank\" rel=\"noopener noreferrer\">responsible disclosure program<\/a>, we reached out to Delta Controls as soon as we confirmed that the initial vulnerability we discovered was exploitable. Shortly thereafter, they provided us with a beta version of a patch meant to fix the vulnerability and we confirmed that it did just that \u2013 our attack no longer worked. Furthermore, by using our understanding of how the attack is performed at a network level, we were able to add mitigation for this vulnerability to McAfee\u2019s Network Security Platform (NSP) via NSP signature 0x45d43f00, helping our customers remain secure. This is our idea of a success story \u2013 researchers and vendors coming together to improve security for end users and ultimately reduce the attack surface for the adversary. If there\u2019s any doubt they are interested in targets like these, a quick search will illuminate <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/04\/mysterious-safety-tampering-malware-infects-a-2nd-critical-infrastructure-site\/\" target=\"_blank\" rel=\"noopener noreferrer\">the myriad attempts to exploit industrial control systems<\/a> as a top target of interest.<\/p>\n<p>Before we leave you with \u201call\u2019s well that ends well\u201d, we want to stress that there is a lesson to be learned here: it doesn\u2019t take much to make a critical system vulnerable. Thus, it is important that companies extend proper security practices to all network-connected devices \u2013 not just PCs. Such practices might include placing all internet-connected devices behind a firewall, monitoring traffic to these devices, segregating them from the rest of the network using VLANs, and staying on top of security updates. For critical systems that cannot afford significant downtime, updates are often pulled instead of pushed, putting the onus on end users to keep these devices up to date. Whatever the precise implementation may be, a good security policy often begins by adopting the <em>principle of least privilege<\/em>, or the idea that all access should be restricted by default unless there is a compelling reason for it. For example, before approaching the challenge of keeping a device like the eBMGR secure on the internet, it\u2019s important to first ask if having it connected to internet is necessary in the first place.<\/p>\n<h2>Delta x McAfee<\/h2>\n<p>While companies and consumers should certainly take the proper steps to keep their networks secure, manufacturers must also take a proactive approach towards addressing vulnerabilities that impact their end users. Delta Controls\u2019 willingness to collaborate and timely response to our disclosure certainly seems like a step in the right direction. Please refer to the following <a href=\"http:\/\/deltacontrols.com\/news-and-events\/cybersecurity-collaboration-with-mcafee\/\" target=\"_blank\" rel=\"noopener noreferrer\">statement<\/a> from Delta Controls which provides insight into the collaboration with McAfee and the power of responsible disclosure.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/OieeNzYjPQs\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to&#8230;<\/p>\n","protected":false},"author":1084,"featured_media":96368,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526],"coauthors":[5850],"class_list":["post-96189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-advanced-threat-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to order the others around. This tendency\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to order the others around. This tendency\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-09T20:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T06:38:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mark Bereza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ROPsicle\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Bereza\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/\"},\"author\":{\"name\":\"Mark Bereza\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0960bc8b469c17a5b3c781599ae13693\"},\"headline\":\"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta\",\"datePublished\":\"2019-08-09T20:00:50+00:00\",\"dateModified\":\"2025-06-02T06:38:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/\"},\"wordCount\":1347,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg\",\"keywords\":[\"Advanced Threat Research\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/\",\"name\":\"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg\",\"datePublished\":\"2019-08-09T20:00:50+00:00\",\"dateModified\":\"2025-06-02T06:38:49+00:00\",\"description\":\"Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to order the others around. This tendency\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg\",\"width\":2048,\"height\":1152},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Building Control to Damage Control: A Case Study in Industrial Security Featuring Delta\u2019s enteliBUS Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0960bc8b469c17a5b3c781599ae13693\",\"name\":\"Mark Bereza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/76f31245d08b23e60cb3dfa20d1ee6a8\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/headshot-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/headshot-96x96.png\",\"caption\":\"Mark Bereza\"},\"description\":\"Mark Bereza is a Security Researcher and recent addition to McAfee's Advanced Threat Research team. An alumnus of Oregon State University's CS systems program, Mark's work has focused on vulnerability discovery and exploit development for embedded systems.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/mark-bereza\/\",\"https:\/\/x.com\/@ROPsicle\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mark-bereza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta | McAfee Blog","description":"Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to order the others around. This tendency","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta | McAfee Blog","og_description":"Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to order the others around. This tendency","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-08-09T20:00:50+00:00","article_modified_time":"2025-06-02T06:38:49+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg","type":"image\/jpeg"}],"author":"Mark Bereza","twitter_card":"summary_large_image","twitter_creator":"@ROPsicle","twitter_site":"@McAfee","twitter_misc":{"Written by":"Mark Bereza","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/"},"author":{"name":"Mark Bereza","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0960bc8b469c17a5b3c781599ae13693"},"headline":"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta","datePublished":"2019-08-09T20:00:50+00:00","dateModified":"2025-06-02T06:38:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/"},"wordCount":1347,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg","keywords":["Advanced Threat Research"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/","name":"From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg","datePublished":"2019-08-09T20:00:50+00:00","dateModified":"2025-06-02T06:38:49+00:00","description":"Management. Control. It seems that you can\u2019t stick five people in a room together without one of them trying to order the others around. This tendency","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/labs-thumbnail-3.jpeg","width":2048,"height":1152},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-building-control-to-damage-control-a-case-study-in-industrial-security-featuring-deltas-entelibus-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"From Building Control to Damage Control: A Case Study in Industrial Security Featuring Delta\u2019s enteliBUS Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0960bc8b469c17a5b3c781599ae13693","name":"Mark Bereza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/76f31245d08b23e60cb3dfa20d1ee6a8","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/headshot-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/headshot-96x96.png","caption":"Mark Bereza"},"description":"Mark Bereza is a Security Researcher and recent addition to McAfee's Advanced Threat Research team. An alumnus of Oregon State University's CS systems program, Mark's work has focused on vulnerability discovery and exploit development for embedded systems.","sameAs":["https:\/\/www.linkedin.com\/in\/mark-bereza\/","https:\/\/x.com\/@ROPsicle"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mark-bereza\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1084"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96189"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96189\/revisions"}],"predecessor-version":[{"id":214780,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96189\/revisions\/214780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96368"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96189"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}