The Stuxnet Worm and Options for Remediation
|
|
|
- Trevor French
- 10 years ago
- Views:
Transcription
1 The Stuxnet Worm and Options for Remediation Andrew Ginter, Chief Security Officer, Industrial Defender Last updated: August 23, 2010 We encourage distribution of the information in this document to support knowledge sharing and to enable further discussion and discovery. The content of this document is licensed under a Creative Commons Attribution- Share Alike 3.0 License < Additionally, permission is also granted to copy, distribute and/or modify content in this document under the terms of the GNU Free Documentation License < Please do not use any text selectively in order to misrepresent Industrial Defender's position. Legal action may be taken if this occurs. Please contact [email protected] for additional information Industrial Defender, Inc. 1
2 Table of Contents 1: Introduction : Variants and Naming : LNK Vulnerability : Stuxnet Propagation : Evidence of Compromise : Signed Code : Network Operations : Stuxnet Targets Siemens PCS 7 Systems : Geographic Distribution : Remediations : Microsoft Patch for LNK Vulnerability : Microsoft Tool to Disable Display of File Shortcuts : Siemens / TrendMicro Remediation Tool : Siemens Update : Third Party LNK Vulnerability Avoidance Tools : Anti-Virus Tools : Whitelisting / Host Intrusion Prevention Systems : Host Intrusion Detection Systems : Disabling USB Keys : Strict Firewall Egress Filtering : Other Topics : Conclusions : Links Industrial Defender, Inc. 2
3 1: Introduction On June 17, 2010, the makers of the VirusBlokAda anti-virus product in Belarus identified a new worm. The worm was significant in that it propagated via a previously unknown vulnerability in the method that all versions of Microsoft Windows operating systems, since at least Windows NT, handled file shortcut or.lnk files. Further, the malware was signed by a RealTek certificate. On July 14, Frank Boldewin, a security expert in Germany, investigated the worm further and discovered that the worm targeted Siemens WinCC control system components, part of the Siemens PCS 7 control system solution. This combination of characteristics: Using an unknown and un-patched vulnerability to compromise machines, Being signed with a certificate from a well-known vendor, presumably stolen, and A sophisticated attack on industrial control systems components, made the worm very unusual. Later analysis by Symantec identified the worm as the first control system rootkit a piece of software that modifies the behavior of a control system and disguises itself from detection. This paper summarizes what is known about the worm at the time of writing, and describes ways to protect industrial control systems from the worm. 2: Variants and Naming The VirusBlokAda paper used a number of terms to refer to the worm. Components of the worm were identified as Rootkit.TmpHider and Rootkit.TmpHider.2, presumably because when propagating via USB sticks and network shares, the worm embeds itself in.tmp files. By the time Microsoft published their advisory, a majority of labs with signatures published for the worm had dubbed it Stuxnet. Microsoft identified the TmpHider and TmpHider.2 components of the worm as Stuxnet.A and Stuxnet.B. This first Stuxnet.A/B variant of the worm was signed with a RealTek certificate. On July 17, ESET labs announced that they had found a second variant of the worm, signed with a JMicron certificate. On July 23, Kaspersky labs reported that their anti-virus products were reporting over 40,000 computers infected with Stuxnet.A/B, but only two machines infected with the JMicronsigned variant. Little has been published about the variant and differing naming conventions for the variant exist. Symantec reports that it has analyzed some four variants of the Stuxnet worm. The oldest dates from June, The worm appears to have been under steady development by a professional team for at least the last 12 months. Most of the information in this report relates to the Stuxnet.A/B variant. 3: LNK Vulnerability The Microsoft Windows LNK vulnerability appears evident in all versions of Windows operating systems, back to at least Windows NT 4.0. The vulnerability is related to the rendering of icons in the Windows Explorer shell for certain file shortcuts. It seems that when the shell renders icons for certain shortcuts, the shell activates code in the files to which the shortcuts refer. Stuxnet code is initially activated this way. The Stuxnet worm uses the LNK vulnerability when the worm propagates via USB mass storage media, such as USB flash sticks. The Stuxnet code is activated by viewing the Stuxnet shortcuts in Windows Explorer. On the surface, this sounds similar to many other worms which propagate via USB sticks. Those worms use the autorun.inf file to trigger execution of the malware; a common protection against such worms is to instruct Windows not to run the autorun files when 2010 Industrial Defender, Inc. 3
4 media is attached to USB ports or even CD drives. This autorun.inf protection does not prevent Stuxnet from running you activate the Stuxnet code by having Windows Explorer display the Stuxnet shortcut icons. The same vulnerability can be triggered anywhere that file shortcut icons are displayed on the hard disk, on network shares and on WebDAV shares. More recently, there are reports that the vulnerability can be triggered by file shortcuts embedded in Microsoft Office documents, other kinds of files and even electronic mail. Other kinds of malware have also started using the LNK vulnerability to propagate. Note: The ICS-CERT and Microsoft advisories on the LNK vulnerability are easy to misinterpret. Neither list Windows NT, Windows 2000 or Windows XP SP2 as affected by the vulnerability. The reason for the omission is that these platforms are out of support by Microsoft. The platforms are in fact affected by the vulnerability, and are still widely used in industrial control systems. Note: The Microsoft advisory indicates that program information files (PIF) can be abused to trigger the execution of malware, in much the same way as LNK files can be abused. PIF files however, are not used by Stuxnet to propagate, and so are not treated in depth in this discussion of Stuxnet. 4: Stuxnet Propagation Stuxnet moves between computers on USB sticks, via network shares, and via an older Microsoft RPC vulnerability. If you look at an infected USB stick on a Linux machine, or a Windows machine protected to the point where it cannot run the software on the USB stick, you will see files: Copy of Copy of Copy of Copy of Shortcut to.lnk Copy of Copy of Copy of Shortcut to.lnk Copy of Copy of Shortcut to.lnk Copy of Shortcut to.lnk ~wtr4132.tmp ~wtr4141.tmp The LNK files are the malicious file shortcuts, all referring to ~wtr4132.tmp. The TMP files contain the code of the worm. If you attach another USB stick to a compromised machine, these files are usually copied to the stick. The version of Stuxnet Industrial Defender tested would not create these files on an empty USB stick, but would create them if the stick contained a number of other files. Note: The does not write to empty USB sticks is not behavior you should rely on. Once a machine is compromised, the Stuxnet worm renders the TMP and LNK files on the USB stick invisible to Windows Explorer. If you watch closely while Stuxnet compromises a machine, you may see the files briefly displayed in Windows Explorer, and then disappear a number of seconds later. When propagating via USB sticks, the worm counts how many hops it has made between machines. After three hops, the worm erases itself from the USB stick and from the machine it has just infected. This feature was likely designed to limit the geographic spread of the worm Industrial Defender, Inc. 4
5 Symantec reports that Stuxnet also propagates via network shares to which the compromised machine has permission to write to. The worm is said to store a file named: DEFRAG[random number].tmp in the root folder of any Admin$ share the worm finds. These shares are invisible administrative shares created by default on many file servers. To activate the TMP file on that share, the worm contacts the share server over the network and schedules execution of the TMP file, making remote use of the Windows task scheduler. And finally, the worm also propagates across local area networks using the Microsoft MS RPC vulnerability. That vulnerability is also used by Conflicker and other worms, and a patch has been available for the vulnerability since : Evidence of Compromise When the Stuxnet worm compromises a Windows machine, it does many things, including creating files, creating and starting services, and hiding code inside of apparently benign processes in memory. The easiest changes to identify are the creation of files: %SystemRoot%\system32\drivers\mrxcls.sys %SystemRoot%\system32\drivers\mrxnet.sys %SystemRoot%\inf\oem6c.pnf %SystemRoot%\inf\oem7a.pnf Unlike the masked LNK and TMP files on USB sticks, these files are visible to Windows Explorer. The worm also creates two services: MRXCLS MRXNET and creates a number of registry keys in: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MRxCLS HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MRxNET The services, however, are not visible in the Control Panel / Administrative Tools / Services tool. In addition, there are indications in the worm code that the worm checks for the presence of antivirus systems on compromised equipment and may disable those systems. If a system has been compromised and owners are removing the worm, owners should check that any anti-virus protections which should be active on the machine are still working. 6: Signed Code The mrxcls and mrxnet drivers are signed because Windows Vista prompts you if drivers you are installing are not signed with a trusted certificate, and Windows 7 refuses to install drivers which are not signed this way. Most of the Stuxnet worms circulating are signed with a RealTek certificate. Verisign has confirmed that the certificates were legitimate they were legitimately issued to representatives of RealTek and JMicron. Both certificates have been revoked, but this only means that no new code can be signed with them, not that signatures on existing code have become invalid Industrial Defender, Inc. 5
6 No one knows for sure how the malware came to be signed with certificates legitimately issued to these firms. There is speculation that since the firms have offices close to each other in an industrial park in Taiwan, that the theft might have been by a corporate insider in that geography. Other speculation is that the firms may have been compromised by malware of some sort which steals certificates. For example, the Zeus botnet is known to steal website certificates, but is not known to steal other kinds of certificates Industrial Defender, Inc. 6
7 7: Network Operations Symantec reports that once the worm has compromised a machine, it contacts a command and control (C&C) server on port 80 at one of the DNS addresses: www. mypremierfutbol. com www. todaysfutbol. com Some variants of the worm also contain hard-coded IP addresses which are identical to the IP addresses these DNS entries once resolved to. The two IP addresses involved identified two C&C servers one in Malaysia and one in Denmark. Symantec reports that it worked with agencies to redirect the C&C DNS entries to benign IP addresses. The benign addresses are now being used to count infected machines and to work with authorities in different countries to assist in cleaning up the infection. Note: Symantec cautions that the Stuxnet worm is easily reconfigured to use different IP addresses and DNS entries to contact its C&C servers. No such variants have yet been identified. However, users should not be complacent because the existing versions of the worm have been frustrated in their attempts to contact a C&C server. Symantec further reports that the worm sends basic information about the compromised host to the C&C server, including: Windows version information, Computer name, Network group name, A flag as to whether the WinCC software is installed or not, and IP addresses of all network interfaces. The information is sent encrypted to the URL: server address>/index.php?data=<encrypted data> The server responds with either a command to execute a remote procedure call on the compromised host, or with a download of a new DLL for the worm to download and execute. The remote procedure calls include: Read a file Write to a file Delete a file Create a process Inject a.dll into lsass.exe Load an additional.dll file Inject code into other processes Update the configuration data for the worm No information has been published as to whether any of these RPCs were activated on compromised hosts, or whether additional dll files have been discovered to have been downloaded to those hosts Industrial Defender, Inc. 7
8 8: Stuxnet Targets Siemens PCS 7 Systems Figure 1: Siemens PCS 7 System Structure Stuxnet targets computers running the WinCC Human / Machine Interface (HMI) components of a Siemens PCS 7 control system. In process control systems, HMIs display graphic analogues of the physical process to a plant operator, animating the graphics with the latest real-time data acquired from Programmable Logic Controllers (PLCs). The sensors and controllers in the physical process are wired into the PLCs. In addition, operators can manipulate the graphic user interface to change the physical process, for example: start pumps, close valves, increase pressures, and so on. The HMI translates those graphic manipulations into low-level commands and sends those commands to the PLCs. Note that PLCs are generally not Windows computers and so are not of themselves vulnerable to direct compromise by the Stuxnet worm. Every WinCC component uses the Microsoft SQLServer database to store information. The database runs on the same machine as the WinCC software. The WinCC software uses a hardcoded password to access the SQLServer database. Users are not able to change this vendor password, since the password is embedded in the WinCC product. If users were to change the password in the SQLServer database, the WinCC components would malfunction, as they would no longer be able to contact the database. When Stuxnet takes over a machine, it checks to see if the machine is running WinCC software. If so, the worm opens a connection to the SQLServer database on the machine using the vendor password. Frank Boldewin, the security researcher who first published that the worm targets Siemens control systems, has published SQL queries embedded in the worm. His analysis is that if those embedded queries execute, they will extract IP addresses and port numbers of other WinCC machines that are connected up in the PCS 7 system. The SQLServer database on WinCC hosts can by default accept connections from other hosts on the same network using the vendor password. There is no indication that the worm uses this capability Industrial Defender, Inc. 8
9 Symantec has published an analysis of the worm's capabilities as well. Symantec reports that the worm contains a wrapper for the Siemens s7otbxdx.dll. This dll is used by WinCC to communicate with PLCs. The wrapper exports exactly as many functions as the real dll. Some of these functions simply pass control directly into the real dll without changing any data, and other functions either manipulate inputs before passing them on to the real dll, or manipulate the outputs of the real dll. The set of functions which manipulate inputs or outputs is listed below: s7_event s7ag_bub_cycl_read_create s7ag_bub_read_var s7ag_bub_write_var s7ag_link_in s7ag_read_szl s7ag_test s7blk_delete s7blk_findfirst s7blk_findnext s7blk_read s7blk_write s7db_close s7db_open s7ag_bub_read_var_seg s7ag_bub_write_var_seg These functions are related to PLC programming. With these function wrappers, Symantec has identified Stuxnet as the first known rootkit for SCADA devices. Symantec and other researchers report that if a PLC program has been modified in a certain way, these wrappers act to hide the modification from users trying to examine the PLC program from a compromised Windows host. Any user looking at the PLC from a programming tool on the compromised WinCC host makes request to see the list of function blocks in the PLC, using the wrapped functions above. If the programming tool requests all the function blocks for display, but the return values from the library are modified by the wrapper to exclude the malicious function blocks, those blocks are invisible to the programming tool, and so are invisible to the user using the programming tool Industrial Defender, Inc. 9
10 Figure 2 Hiding Compromised PLC Programs The Stuxnet worm is reported to contain some 70 function blocks which it is able to download into PLCs. Details of the effects of these function blocks are not yet available. Note: If your PCS7 control system has been compromised by Stuxnet, it is not enough to clean out the compromised machines or rebuild those machines from scratch. Anyone cleaning out a compromised control system must also examine all S7 PLCs in the control system from an uncompromised computer and determine whether there are any illegitimate function blocks in the PLC. 9: Geographic Distribution On July 15, Kaspersky Labs, the Russian anti-virus vendor, reported over 5,000 compromised machines with a geographic distribution as follows: 2010 Industrial Defender, Inc. 10
11 Figure 3: July 15 Kaspersky Labs Infection Data On July 16, the Microsoft Protection Center reported detecting and rejecting infection attempts at some 1000 machines per day. Less than.02% of all machines globally, which Microsoft monitors, report infection attempts daily. Microsoft reports a significant rate of infection attempts in the USA, but when you normalize the infection attempts by the number of monitored machines in each geography, Microsoft reports infection attempts as follows: Figure 4: July 16 Microsoft Infection Attempt Data 2010 Industrial Defender, Inc. 11
12 On July 17, ESET, the French anti-virus vendor reported infections distributed geographically as follows: United States 57.71% Iran 30.00% Russia 4.09% Indonesia 3.04% Faroe Islands 1.22% United Kingdom 0.77% Turkey 0.49% Spain 0.44% India 0.29% Rest of the world 1.73% Figure 5: July 18 ESET Infection Data ESET published only these percentages, not a total count of infected machines. On July 22, Symantec reported over 14,000 distinct IP addresses harvested from the benign IP addresses which were substituted for the real C&C servers. The geographic distribution of those addresses was as follows: Figure 6: July 22 Symantec Compromised Host IP Address Data The IP address data can be misleading. A compromised host can contact a C&C server only if it is on a network with connectivity to the open internet. On July 23, Kaspersky Labs reported over 45,000 infected machines, with about 1,000 new machines being infected per day: 2010 Industrial Defender, Inc. 12
13 Figure 7: July 23 Kaspersky Labs Infection Data These reports do not agree particularly well. It may be that some of the reported infection data was in fact infection attempt data. It may also be that some of the anti-virus vendors have limited installed bases in some geographies, thus skewing their statistics. To the extent that they agree, it is clear that the most-impacted countries are India, Indonesia and Iran. There is disagreement as to what extent computers in the USA were affected. 10: Remediations Whenever the Stuxnet worm is discussed, the question What can I do about it? arises. For end users on home computers, the answer is simple: Don't worry about Stuxnet there are so few infections in the world you are unlikely to encounter one. Do worry about other more widespread malware taking advantage of the LNK and PIF vulnerabilities. Make sure you have an anti-virus system installed. All credible anti-virus vendors now have signatures for the LNK and PIF vulnerabilities and many have signatures for the Stuxnet worm. A Microsoft patch for the LNK and PIF vulnerabilities has been available since August 2, install the patch and you should be well-protected. For corporate networks the answer is similar, though it may take corporate IT teams a little longer to test and distribute the Microsoft patch. For sites running industrial control systems, the question is quite a bit more involved. What you should do depends very much on how vulnerable your control systems are, how stringent your safety and availability requirements are, and what your existing security program looks like. There is an incredible variety among control system security postures. Some systems are more or less managed like corporate IT systems well patched, protected by anti-virus and other modern protections, with signatures updated regularly. Such systems will be protected as soon as the new anti-virus signatures make it through their site's change control processes. Other sites are running old versions of operating systems without anti-virus, and cannot patch those systems 2010 Industrial Defender, Inc. 13
14 due to the risk of causing a malfunction, or because the sites will breach the terms of their vendor support contracts. Still others run anti-virus on their older systems but do not update the signatures because they do not have a change control process in place capable of testing new signatures enough to ensure continued correct operation of the control system with new signatures in place. Some control systems have very stringent safety and availability requirements think nuclear sites, refineries and electric power systems. If things go catastrophically wrong at one of these sites there are significant impacts on the public at large. Such sites have very tight change control systems. Every change, however small, must be evaluated as to the risk the change poses to the correct operation of the physical process. Yes, the overall control system has many layers of redundant safety systems, and the HMI is only one of these layers, but nobody should use that as a reason to be complacent about changes to the HMI workstations. And finally, different sites have different degrees of security programs. Some sites have programs which are well thought through, comprehensive, regularly assessed for compliance to the site security policy, and reviewed and updated as the threat environment, or available security approaches change. Other sites may have much less well thought-through programs, and unfortunately there are still some industries where control system security is still very much an afterthought, especially smaller sites. The short story as to what industrial sites should do in light of the Stuxnet threat is easy: reevaluate your security posture in light of this new threat. If a site does not have the expertise inhouse to do this, they will need to bring in a qualified outside party. Depending on the existing security posture, sites should expect the re-evaluation to result in recommendations ranging from don't worry, you're good already to you need significant improvements to your security program. Industry experts are nearly unanimous in agreeing that the right security posture for industrial sites is a defense-in-depth posture, with layers of defenses including policies, procedures, training, physical security, computer security, personnel screening and many other elements. A detailed description of a defense-in-depth security program is beyond the scope of this report. Interested readers are referred to any of: NIST : Guide to Industrial Control Systems (ICS) Security ISA SP-99 Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts and Models Department of Homeland Security: Catalog of Control Systems Security: Recommendations for Standards Developers In the course of re-evaluating their security posture, industrial sites may wish to consider the following remediations. Note that while the focus of this report has been the Stuxnet worm and some of the remediations below are specific to the worm, sites should consider that the worm is only one example the first example of an advanced threat to control systems. Industrial sites are at risk from all kinds of malware, not only Stuxnet. Even if most other kinds of malware do not target control systems specifically, such systems will still be affected by any malware which takes over a machine, affected in ways that are difficult to predict. If a site is poorly protected against run-of-the-mill malware, the site should strengthen those protections, as well as considering specific protections against the Stuxnet worm. The following sections discuss specific remediation options. 10.1: Microsoft Patches Microsoft released a patch for the MS RPC vulnerability in 2008 and made the patch available for all then-supported operating systems platforms Industrial Defender, Inc. 14
15 Microsoft released a patch for the MS LNK and PIF vulnerabilities on August 2, Only newer versions of Windows operating systems are supported by the patch. In particular, the Windows 2000 and Windows XP SP2 versions of the operating system used heavily in industrial control systems, are not supported. In addition, many control systems have no effective patch program or are constrained in what patches they can apply by support contracts with their control system vendors. Sites which can apply these patches should expect to be protected against any exploit of the RPC, LNK and PIF vulnerabilities by the patch. A strong patch program generally should protect a site against much malware. Exceptions to the protections patches offer include zero-day threats, insider attacks and threats like trojans which persuade authorized users to download and run them. 10.2: Microsoft Tool to Disable Display of File Shortcuts Microsoft has released a tool at: Microsoft tool: Which disables the display of file shortcuts, thus preventing the exploit of the LNK and PIF file vulnerability. Users who have tried the tool are unanimous in their rejection of it the tool makes Windows operating systems extremely difficult to use. 10.3: Siemens / TrendMicro Remediation Tool Siemens has published instructions on how to use the TrendMicro Sysclean tool to remove the Stuxnet worm from compromised systems: Note: Siemens recommends that users contact their specific support organizations before using the remediation tool. Control systems generally, PCS 7 included, tend to be highly customized. Siemens, like most responsible control systems vendors, cannot recommend that any specific change be made safely to a highly customized control system. It is only the technical people familiar with a particular customization who have the test bed and procedures to test if it is safe to apply the Siemens tool on a particular control system. Use of the remediation tool does not protect a site from compromise by the Stuxnet worm. The tool is designed to remove the worm from a compromised machine. There are no reports yet as to the effectiveness of the tool. 10.4: Siemens Update Siemens has issued an update to their WinCC software which: Modifies registry settings according to the Microsoft security advisory for the LNK and PIF vulnerabilities, and Tightens up SQLServer security settings, especially for client authentication. Note: Applying this Siemens update will disable viewing of file shortcut icons just as the Microsoft tool does. This may make control system user interfaces on affected machines much harder to use Industrial Defender, Inc. 15
16 10.5: Third Party LNK Vulnerability Avoidance Tools Sophos and Surfright have released tools to prevent exploitation of the vulnerability without disabling most Windows icons: Feedback on the Sophos tool is that it protects against LNK exploits only when both the shortcut file and the file target are on external media. Neither tool protects against the PIF vulnerability. 10.6: Anti-Virus Tools Control systems with anti-virus products installed and virus signatures current should already be protected against malicious shortcut files and the Stuxnet worm. Sites with anti-virus products installed but without current signatures should have a comparatively easy time of acquiring some degree of protection. New signatures need to be run through the change control system, reviewed, tested, and applied. Sites with existing control systems lacking installed anti-virus products may not find anti-virus technology to be their best option to retrofit protection. Sites must first determine if their vendors recommend or support running their versions of control systems with anti-virus products. If the vendors support the products, the sites will need to apply a reasonably rigorous testing process to ensure that the operation of the anti-virus products does not impair the operation of their production control systems. Indiscriminate application of anti-virus products to existing control systems has historically resulted in component malfunctions and control systems failures. Anti-virus tools will protect against Stuxnet and other known threats and vulnerabilities. However, anti-virus vendors generally do not produce signatures for a threat until between five hundred and five thousands instances of the threat are observed world-wide. Further, anti-virus vendors can only produce signatures for known threats. Thus, anti-virus tools provide good general protection, but cannot protect against previously unknown, or low-volume threats such as attacks targeted at a specific site. 10.7: Whitelisting / Host Intrusion Prevention Systems Whitelisting or host intrusion prevention system (HIPS) products calculate a cryptographic hash for all approved executables in the filesystem on a machine. Whenever the operating system tries to load an executable file, including DLL libraries and other kinds of executables, the hash is recalculated and compared to the list of approved hashes. If there is no entry for the hash, it means the file being loaded is either not approved to execute, or has been tampered with. HIPS systems are generally configured either to issue a warning in this case and continue execution, or to block execution of the unauthorized software. HIPS products are comparatively new technologies and a good fit for control systems. The products themselves change very slowly, unlike anti-virus systems which issue new signatures as often as several times per day. As a result, HIPS products put less of a change management burden on industrial sites. Further, HIPS products protect against even low-volume and zero-day attacks, because malware software is never on the approved list of cryptographic hashes for a protected machine Industrial Defender, Inc. 16
17 For example: Industrial Defender labs have tested the Industrial Defender HIPS product with a live copy of the Stuxnet worm and confirmed that the HIPS product prevented compromise of the protected machine. Figure 8: Industrial Defender HIDS Results for Stuxnet Worm The HIPS system simply reports blocking the execution of the file ~wtr4132.tmp every time a Windows Explorer renders icons on a compromised USB stick. HIPS products have been criticized in enterprise applications because of the extra work required to keep the approved application list current as new patches and new software are frequently installed. This concern does not apply to most control systems. HIPS products check executables when they are loaded from disk and not all threats come from disk threats may come from networks with buffer overflow attacks for example. HIPS products deal with such threats in part by observing that most network-based malware uses the network shell code only to pull much larger executable files on to the machine and execute them. Execution of this second stage of the malware is then blocked by the HIPS. Further, most HIPS products have one form or another of memory protection, either periodically or in real-time scanning memory for suspicious executables that did not come from disk. Retrofitting HIPS protections onto an existing control system should be done cautiously, within the confines of a strong change control program. However, customers will likely find the slow pace of change of HIPS products to be a better fit for existing control systems than would be an anti-virus system retrofit on to those systems. 10.8: Host Intrusion Detection Systems If a control system has host intrusion detection systems (HIDS) installed, those systems should be sufficient to alert the site to a compromise by the Stuxnet worm. Industrial sites may use HIDS as part of a defense-in-depth strategy to find out whether anything got past their other protections, or they might use HIDS on very sensitive equipment where more intrusive HIPS or anti-virus products are considered a poor fit. Industrial Defender tested our own HIDS agents with a live Stuxnet worm and saw a burst of some 20 alerts describing unexpected changes to the control system host: Figure 9: Industrial Defender HIDS Results for Stuxnet Worm 2010 Industrial Defender, Inc. 17
18 The most obvious indication of Stuxnet compromise were the alerts reporting new mrxnet.sys and mrxcls.sys drivers in the system32/drivers folder, as well as the alerts reporting the creation of two new services. HIDS products come in many shapes and sizes. Some install agents on the monitored hosts and others monitor hosts remotely. The former tend to be more powerful, since Windows facilities for remote monitoring are not as feature-rich as the on-host Windows programming environment. Further, some agents are designed to be non-intrusive, strictly throttling resource usage and running entirely in user space, while others are more profligate of machine resources and come with new kernel drivers and introduce new execution paths to all monitored software. Retrofitting HIDS on to an existing control system may be easier with remote monitoring, since even though the remote monitoring does introduce new execution paths into software on the control system host, those new paths may not be as significant as new paths introduced by host agents. In terms of effectiveness, most modern HIDS systems should be powerful enough to detect, but not prevent, compromise by Stuxnet. 10.9: Disabling USB Keys Many HIPS products include options to entirely disable the use of removable storage, such as USB flash sticks. Whether or not they use such technology, sites should strongly consider a policy forbidding the use of removable storage on production control system components. There is too much malware which propagates via removable storage and this makes it too easy for errors and omissions to change software on production hosts in violation of change management policies. Note: While controlling the use of USB sticks is good policy for many kinds of control system, it will not work for some systems, such as some kinds of Siemens S7 systems. USB sticks are the only supported way to move certain kinds of information into some kinds of S7 PLCs : Strict Firewall Egress Filtering Egress filtering is the filtering of outbound connections from a more trusted to a less trusted network. Such filtering is useful against Stuxnet and in fact against many kinds of malware, because the most powerful modern malware tends to work closely with instructions from a command and control (C&C) server. In order to contact the server, the malware must connect to an IP address on the open internet from the trusted network. If the firewall prohibits connections to random IP addresses from the trusted network, the malware does compromise the machine, but cannot receive new instructions or software updates from the C&C server. Further, if the firewall logs such communications attempts and site personnel review the logs, those personnel will be alerted to suspicious communications attempts from trusted IP addresses and can investigate those hosts for possible compromise. Egress filtering does not prevent compromise by Stuxnet or by any malware. Egress filtering prevents malware on compromised machines from doing any more than their hard-coded instructions. Malware without contact with a C&C server cannot start doing more things or worse things to your control system than was originally programmed in the malware. Monitoring egress filtering logs provides a kind of intrusion detection as well, which can be one layer in a defense-indepth posture : Other Topics There are many aspects to a strong security program. Sites re-evaluating their security posture generally, rather than specifically for this one kind of threat, may want to consider in addition measures like the following: 2010 Industrial Defender, Inc. 18
19 Keeping a site compliant with a mature security program can add up to enough effort to keep one or more full-time security personnel busy. Consider managing or reducing those costs with a compliance management system. Such systems help a site reduce costs while still keeping their security posture strong. Develop, document and test a strong incident response plan. Even some of the bestprotected sites will be compromised from time to time. When a site is compromised, it is important to respond quickly and correctly. Such response is only possible if it has been thought through and practiced in advance. Consider strong protections for control systems hosts host hardening, patch programs, and regular vulnerability assessments. Consider strengthening physical security and personnel security measures at industrial sites. The authors of this malware have been refining it for some time. Outsource the most complex or the most time-consuming security functions to experts focused on industrial security. This lets a site's personnel remain focused on the challenging skill-set which is continued correct operation of the control system, while still supporting a strong security posture. And in the long term, work with control systems vendors to make clear to them what security measures will be expected in all new control systems products Industrial Defender, Inc. 19
20 11: Conclusions The Stuxnet worm is very unusual. It is a sophisticated piece of malware that clearly targets industrial control systems in a way that no other malware before it has. The ability of the worm to intercept, change, and hide PLC programs is of great concern, as, such changes undetected, could easily disrupt important civilian infrastructure. The best defense against threats lof this type is a strong industrial security program, which includes a defense-in-depth security posture. The Remediations section of this whitepaper describes steps you can take to protect control systems form malware like Stuxnet. Note that for the Stuxnet worm in particular: Patches and the various LNK vulnerability exploit prevention tools will prevent Stuxnet infections now, but these remediations did not exist when Stuxnet began circulating. Anti-virus tools will prevent Suxnet infections now, but had no effect when the worm began circulating, because signatures for the worm and for the LNK vulnerability had not yet been developed and circulated. Host Intrusion Detection Systems would have detected and diagnosed compromise by the Stuxnet worm, but would not have prevented compromise. Disabling USB keys would have prevented infection by Stuxnet, but this measure is not practical on most Siemens S7 systems because of the need to use USB keys to exchange certain information with S7 PLCs. Firewalls, one-way diodes and other perimeter protections would not have prevented Stuxnet infections, because the worm propagated primarily via USB keys carried past firewalls by trusted personnel. Strict firewall outbound connection/egress filtering controls would not have prevented compromise by Stuxnet, but would have prevented the worm from receiving new instructions from the command and control servers. Host Intrusion Prevention Systems would have prevented compromise, because the Stuxnet worm would not have been recognized as an approved and authorized executable, in spite of its signature by a well-known hardware manufacturer. All control system security practitioners should become familiar with this new technology as quickly as is feasible. Industrial Defender provides many of the technologies and services described in the Remediations section of this report, in an easy-to-use, integrated solution designed specifically for industrial control systems. More information on Industrial Defender solutions, including the Industrail Defender HIPS, are available at the Industrial Defender website. Customers with industrial sites should never hesitate to call upon Industrial Defender to understand how we might help to improve a security program, now or in the future. 12: Links Siemens Advisory Hitman Pro LNK Exploit Protection Mandiant Analysis ESET Analysis Industrial Defender, Inc. 20
21 Microsoft Analysis and Security Update an%3awinnt%2fstuxnet.b Symantec Analysis Kaspersky Lab Analysis Wilders Security Frank Boldewin Industrial Defender Blog ICS-CERT Advisory VirusBlokAda Analysis USB Malware Targeting Siemens Control Software.pdf We encourage distribution of the information in this document to support knowledge sharing and to enable further discussion and discovery. The content of this document is licensed under a Creative Commons Attribution- Share Alike 3.0 License < Additionally, permission is also granted to copy, distribute and/or modify content in this document under the terms of the GNU Free Documentation License < Please do not use any text selectively in order to misrepresent Industrial Defender's position. Legal action may be taken if this occurs. Please contact [email protected] for additional information Industrial Defender, Inc. 21
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware A White Paper presented by: Torsten Rössel Director of Business Development Innominate Security Technologies
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan
Stuxnet Malware. Official communication presented at CIP Seminar 02-11-2010 by Thomas Brandstetter. Siemens AG 2010. All Rights Reserved.
Official communication presented at CIP Seminar 02-11-2010 by Thomas Brandstetter What is the Stuxnet and what can it do? Stuxnet is a high sophisticated malware that targets very specific configurations
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Endpoint Security: Moving Beyond AV
Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
An Analysis of the Capabilities Of Cybersecurity Defense
UNIDIRECTIONAL SECURITY GATEWAYS An Analysis of the Capabilities Of Cybersecurity Defense Michael Firstenberg, Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices
Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices McAfee* application whitelisting combined with Intel vpro technology can improve security, increase
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
Integrated Protection for Systems. João Batista [email protected] Territory Manager
Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS
OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
System Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
Nessus and Antivirus. January 31, 2014 (Revision 4)
Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Managing a Malware Outbreak
Sality A Case Study Authors: Mike Andrews Senior Principal Consultant Jerry Pierce Principal Consultant Shawn Baker Senior Consultant Table of Contents Managing a Malware Outbreak... 1 Sality A Case Study...
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out
CounterACT: Powerful, Contents Introduction...3 Automated Threat Protection against Conficker... 3 How the Conficker Worm Works.... 3 How to Use CounterACT to Protect vs. the Conficker Worm...4 1. Use
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
