INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION



Similar documents
Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG All Rights Reserved.

Seven Strategies to Defend ICSs

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

OPC & Security Agenda

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Advanced & Persistent Threat Analysis - I

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Penetration Testing Report Client: Business Solutions June 15 th 2015

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Certified Ethical Hacker (CEH)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Guidelines for Web applications protection with dedicated Web Application Firewall

Hacking Database for Owning your Data

A Decision Maker s Guide to Securing an IT Infrastructure

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

13 Ways Through A Firewall

Metasploit The Elixir of Network Security

A Systems Approach to HVAC Contractor Security

Protecting Critical Infrastructure

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Locking down a Hitachi ID Suite server

Designing a security policy to protect your automation solution

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Common Cyber Threats. Common cyber threats include:

Innovative Defense Strategies for Securing SCADA & Control Systems

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

SANS Top 20 Critical Controls for Effective Cyber Defense

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Cisco IPS Tuning Overview

Security Testing in Critical Systems

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

FortiWeb 5.0, Web Application Firewall Course #251

EC-Council Certified Security Analyst (ECSA)

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

13 Ways Through A Firewall What you don t know will hurt you

Using Tofino to control the spread of Stuxnet Malware

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Who is Watching You? Video Conferencing Security

Agenda , Palo Alto Networks. Confidential and Proprietary.

Vulnerability Testing of Industrial Network Devices

How We're Getting Creamed

NSTB. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

N-Dimension Solutions Cyber Security for Utilities

Best Practices for DeltaV Cyber- Security

Vulnerability Assessment and Penetration Testing

Networks & Security Course. Web of Trust and Network Forensics

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Cyber Essentials Scheme

Penetration Testing - a way for improving our cyber security

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Vulnerability Analysis of Energy Delivery Control Systems

Protecting the Infrastructure: Symantec Web Gateway

Application Security Best Practices. Wally LEE Principal Consultant

SCADA City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor

DeltaV System Cyber-Security

Guideline on Auditing and Log Management

Open Source Security Tool Overview

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CYBER SECURITY. Is your Industrial Control System prepared?

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Penetration Testing. ISACA - Atlanta

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

SPEAR PHISHING UNDERSTANDING THE THREAT

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Thick Client Application Security

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Protecting Your Organisation from Targeted Cyber Intrusion

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Ovation Security Center Data Sheet

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

ABB s approach concerning IS Security for Automation Systems

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

CYBERTRON NETWORK SOLUTIONS

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Energy Cybersecurity Regulatory Brief

CRYPTUS DIPLOMA IN IT SECURITY

USM IT Security Council Guide for Security Event Logging. Version 1.1

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Transcription:

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013

Disclaimer References made herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favouring by the U.S. Government, any agency thereof, or any company affiliated with the Idaho National Laboratory, Pacific Northwest National Laboratory or Sandia National Laboratory. 2

Acknowledgement The equipment for this demo was provided by the US Department of Homeland Security ICS-CERT. Additional resources and training on cyber security for industrial control systems are available at http://ics-cert.us-cert.gov/ 3

Demonstration 4

Demo Network Layout 5

Demo Exploit Path 6

Attack Stage #1 Internet to Corporate Client Side Attack: Corporate user follows a malicious URL Social engineering From an email From a suspicious web page Triggers a vulnerability on the corp box Exploit payload calls outbound through the firewall to the attacker internet host Attacker gains remote control of the corporate victim 7

Attack Stage #2 Reconnaissance Victim #1 browser history indicates access to a separate subnet (Victim #1 IP 1.2.3.32, HTTP IP - 192.168.10.21) 8

Attack Stage #2 Corporate to DMZ Web Application Vulnerabilities Help desk web application allows user to upload arbitrary files (trouble tickets) Attacker uploads a new PHP file and also an executable rootkit Website code has an SQL injection problem Provides admin access to the website (privileged features) Attacker makes an HTTP request to an existing admin page and changes the action on the URL to include (aka execute) the uploaded PHP page PHP is able to run system commands and launch the rootkit Firewall policy: Grants Victim #1 HTTP access to Victim #2 Victim #2 allowed any TCP connection to internet Uploaded rootkit calls back to attacker machine 9

Attack Stage #3 Reconnaissance Victim#2 Netstat shows an established connection to a new subnet (Victim #2 IP 192.168.10.21, Remote Server IP 192.168.0.10) 10

Attack Stage #3 DMZ to SCADA Tag Server Buffer Overflow Exploit overflows the point name field Firewall policy: Grants Victim #2 access to Victim #3 on port 2000 Victim #3 allowed any TCP connection to internet Exploit payload calls back to attacker machine 11

Attack Stage #3 HMI 12

Attack Commands Directly to the PLC Attacker incrementally expanded attack Gained remote control of host inside the control LAN Controls the HMI or Substation from the internet 13

Demo Vulnerabilities & Possible Mitigations Problems Antiquated and/or unpatched Operating systems Services Poorly defined firewall policy (any outbound traffic allowed) Intrusion detection system (IDS) is underutilized Application coding problems Unsafe function usage Logic problems Least privileges principle has not been applied to all applications, services, and the network design Fixes Keep public systems fully patched Audit firewall rules and analyze all exceptions Push data rather than pull Outbound firewall policies Deploy and monitor IDS in border networks Audit home grown applications for problems Ensure services are running as users rather than Administrator or System 14

How and Why it Happens 15

Potential Entry Points 16

Potential Entry Points 17

Manipulation of the System Talk Directly to the Front-End Equipment Often no userid/passwords required Undocumented vendor protocols are common Commands are generally not logged 18

Manipulation of the System Export the HMI Screen Graphic pictures to describe the process Noticeable by the operator Can use your off-the-shelf tools Have credentials of logged in user May not be able to manipulate to failure 19

Manipulation of the System Change Operator s Display If presented with an out-of-control system, operator will take steps to shut down Logs will reflect operator actions & true state of system Detailed knowledge of process needed to make believable 20

Open Source Tools 21

Enumerate Network: Nmap Nmap Enumerates (scans) networks to determine which hosts are up and/or what services they are offering. 22

Vulnerability Scanning Software tools are available to assess computers, computer systems, networks, or applications for weaknesses, e.g., Unpatched operating systems Unpatched applications Open ports and services Web applications Two examples are Nessus (commercial) and OpenVAS (open source) 23

Capture Communications: Tcpdump Open-source packet sniffer (reader) that is available for most modern operating systems. Allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Can be used to analyze network behavior, performance and applications that generate or receive network traffic. It s native capture file format is libpcap format, which is also the format used by various other tools. 24

Analyze Communications: Wireshark Open-source GUI network protocol analyzer. Browse packet data from a live network or from a previously saved capture file. Export data objects to files (documents, pictures) Native capture file format is libpcap format, which is also the format used by tcpdump & various other tools. 25

Host Compromise The Metasploit Project Created to provide information on exploit techniques and to create a useful resource for exploit developers and security professionals. Provides useful information to people who perform penetration testing, IDS signature development, and exploit research. Provided for legal security research and testing purposes only. Exploits often added for new vulnerabilities within days of vulnerability disclosure. An open-source hacking toolkit http://www.metasploit.com/ 26

Cyber Incidents 27

Basic Attack Steps Monitor for these Activities 1. Targeting 2. Discovery and Fingerprinting 3. Exploitation 4. Maintaining Access 5. Cleaning-up/Covering their tracks 6. Repeat 28

Third-Party Access and Malware Protection Davis Besse Nuclear Power Plant Event: January 25, 2003, Slammer worm infects plant. Threat: Cracker (Group I) Impact: Complete shutdown of digital portion of Safety Parameter Display System (SPDS) and Plant Process Computer (PPC). Specifics: Worm started at contractors site then jumped from the corporate to plant network and found an unpatched server. Lessons learned: Secure remote (trusted) access channels Ensure Defense-in-depth strategies with appropriate procurement requirements Critical patches need to be applied 29

Patch Management for ICS Hatch Nuclear Power Plant Event: March 7, 2008, software update on business system causes plant shutdown. Threat: Insider (accidental) Impact: Reset of measured coolant levels, causing shutdown of Unit 2. Specifics: Engineer installed software update on a computer that monitored data from the facility s primary control systems. The computer was on the business network. When the computer rebooted, it reset data on coolant levels, which caused safety systems to shut down the reactor. Lessons learned: Control and data acquisition systems are sensitive to data availability. Patches should be tested on an offline system (e.g. simulator) prior to being applied in the field for supervisory data acquisition systems and control systems. 30

Data Availability Brown s Ferry Nuclear Plant Event: August 19, 2006, Excessive traffic on the control system network caused two water pumps to fail. Threat: Insider (accidental) Impact: High power, low flow condition forced manual SCRAM of the reactor. Specifics: The controllers for the pumps locked up following a spike in data traffic on the power plant's internal control system network. Lessons learned: Control and data acquisition systems are sensitive to data availability. Unexpected & high volumes of network traffic (data spike) can cause some controllers to become unresponsive. 31

Security for Portable Media and Devices Nuclear Facility (Name Withheld) Infected with Malware Event: 2010 - Mariposa Botnet Crimeware Infects a nuclear facility s enterprise network. Threat: Criminals (for-profit, Group II) Impact: Over 100 hosts on the enterprise network were infected. Specifics: The infection occurred when an employee attended an industry event and used an instructor s USB flash drive to download presentation materials to the employee s laptop. Other nuclear industry personnel had also used the same infected USB drive at the industry event. Lessons learned: Organizations should have polices and procedures for use of portable media and devices. Portable media and devices should be scanned prior to use on critical systems. Source: http://www.us-cert.gov/control_systems/pdf/ics-cert_incident_response_summary_report_09_11.pdf 32

Access to Critical Digital Systems Natanz Uranium Enrichment Facility (Iran) Event: November 30, 2010, Iranian president admits that a cyber attack affected Iran s uranium enrichment centrifuges. Threat: Possibly nation-statesponsored (Group III) Impact: Shut down of Iran s uranium enrichment facility for 6 days in November 2010. Lessons learned: Organizations should have polices and procedures for use of portable media. Portable media should be scanned prior to use on critical systems. 33

Targeted Attack on Control Systems Stuxnet Exploited multiple flaws: Multiple 0-days Certificate Compromise Privilege Escalation Default password in control system software 34