Post-Stuxnet Industrial Security



Similar documents
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware

Using Tofino to control the spread of Stuxnet Malware

Stuxnet Malware. Official communication presented at CIP Seminar by Thomas Brandstetter. Siemens AG All Rights Reserved.

Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured PC-based Control and Operation

Security appliances with integrated switch- Even more secure and more cost effective

Securing EtherNet/IP Using DPI Firewall Technology

Industrial Security for Process Automation

Security Testing in Critical Systems

Protecting productivity with Plant Security Services

Ovation Security Center Data Sheet

Operational Guidelines for Industrial Security

How To Secure Your System From Cyber Attacks

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The Stuxnet Worm and Options for Remediation

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Ovation Security Center Data Sheet

Host-based Intrusion Prevention System (HIPS)

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

What Do You Mean My Cloud Data Isn t Secure?

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

What is Really Needed to Secure the Internet of Things?

OPC & Security Agenda

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

WIN XP Don t Get Left Behind

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Xerox Next Generation Security: Partnering with McAfee White Paper

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Firewalls, Tunnels, and Network Intrusion Detection

Countermeasures against Bots

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

Driving Company Security is Challenging. Centralized Management Makes it Simple.

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

MOBILE MALWARE REPORT

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG All Rights Reserved.

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

S3 Control and System Call Indirection

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

Does your Citrix or Terminal Server environment have an Achilles heel?

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

The Hillstone and Trend Micro Joint Solution

Defending Against Cyber Attacks with SessionLevel Network Security

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

The 2014 Next Generation Firewall Challenge

The Key to Secure Online Financial Transactions

Securityconcept fortheprotectionofindustrialplants. Industrial Security. White PaperV1.0

Cyber Security Where Do I Begin?

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Top five strategies for combating modern threats Is anti-virus dead?

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Chapter 9 Firewalls and Intrusion Prevention Systems

Agilent Technologies Electronic Measurements Group Computer Virus Control Program

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

NetDefend Firewall UTM Services

Deploying Firewalls Throughout Your Organization

PCI Data Security Standards (DSS)

CDM Software Asset Management (SWAM) Capability

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Networking for Caribbean Development

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Proactive Rootkit Protection Comparison Test

Section 12 MUST BE COMPLETED BY: 4/22

Remote Control in Manufacturing

Advanced & Persistent Threat Analysis - I

Application Security Backgrounder

Unknown threats in Sweden. Study publication August 27, 2014

11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Protect your personal data while engaging in IT related activities

Towards End-to-End Security

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

End-user Security Analytics Strengthens Protection with ArcSight

Covert Operations: Kill Chain Actions using Security Analytics

Building A Secure Microsoft Exchange Continuity Appliance

The Christian Science Monitor

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Symantec Endpoint Protection Getting Started Guide

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Cloud Services Prevent Zero-day and Targeted Attacks

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.

INSIDE. Malicious Threats of Peer-to-Peer Networking

Cisco Advanced Services for Network Security

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Using Innominate mguard over BGAN

Innovative Defense Strategies for Securing SCADA & Control Systems

Transcription:

Post-Stuxnet Industrial Security Zero-Day Discovery and Risk Containment of Industrial Malware with Innominate mguard Technology Introduction Following its discovery in June 2010, the Stuxnet worm triggered a worldwide sensation. It was the first publicly known root-kit attack targeted at industrial plants. It has infected tens of thousands of PCs, abusing and manipulating Windows-based automation software for its own purposes to ultimately infiltrate malicious code into the controllers of specific real-world industrial installations. After Stuxnet, the threats from malware and insufficient IT security in automation networks, forecast by industry experts for a long time now, can no longer be ignored. The real danger looming out there, however, is not from Stuxnet itself, but rather from mutations likely to be created by imitators who could now circulate other arbitrary, malicious code utilizing the same basic techniques. And while Stuxnet focused on products from the Siemens SIMATIC family and on STEP 7 PLC projects with very specific properties, such mutations could affect components from other vendors as well, and turn out to be a lot less selective in their damaging impact. Apart from the fact that PCs in industrial use often are not (and cannot be) equipped with antivirus software, Stuxnet has also made it clear that conventional virus scanners do not provide protection against attacks of this caliber. In retrospect, the analysis of Stuxnet has shown that the worm had been out in the wild unnoticed for at least 12 months before its discovery and had not been detected by antivirus programs during that period for lack of any known signatures for the malware. Damaging Impact in Four Steps To develop protective measures against Stuxnet-like attacks, a basic understanding of the worm s activities is essential. It unfolds its damaging impact in four steps on different layers. 1. Infection of Windows PCs: The worm uses an aggressive mix of mechanisms to spread onto and contaminate both networked as well as non-networked Windows PCs (the latter via USB flash drives). For doing so, it utilizes a total of four zero-day exploits of previously unknown vulnerabilities which exist in several generations of Windows operating systems, and have only partially been fixed by security patches to date. In addition to a number of encrypted files which the worm stores in the %SystemRoot%\inf\ directory, Stuxnet installs the two device drivers MrxNet.sys and MrxCLS.sys in %SystemRoot%\system32\drivers\. These drivers have been signed with stolen private digital keys from Realtek and JMicron and do therefore contain certificates which are rated as trustworthy by Windows systems. Page 1

2. Abuse and Manipulation of Automation Software: If Stuxnet comes across installations of WinCC visualization and/or STEP 7 engineering components on an infected PC, it abuses and manipulates any found WinCC databases and STEP 7 projects to ensure its further proliferation and persistency on the PC, and to spy out the controllers referenced in those projects as potential targets for step 3. Furthermore, Stuxnet renames the dynamic link library which is responsible for the communication between SIMATIC Manager and the projected S7 controllers (s7otbxdx.dll in the %SystemRoot%\system32\ thereby being renamed to s7otbxdsx.dll) and replaces it with a wrapper DLL of its own under the original name in the same directory, effectively hiding the modification. 3. Injection of Malicious Code into Controllers: This manipulated wrapper DLL enables Stuxnet to infiltrate arbitrary malicious code into the projected PLCs, to hide those manipulations from the programming engineer, and to safeguard them from later overwriting. The precise malicious code selectively injected by Stuxnet, only into controllers and projects with very specific properties, is of remarkable sophistication and according to the latest expert findings is supposed to permanently manipulate frequency converters and turbine controls as inconspicuously as possible, with the goal of disrupting the controlled processes and ultimately destroying the affected equipment. The malicious code targeted at controller models of the S7-417 series in particular, is combining denialof-control and denial-of-view techniques into a man-in-the-middle attack in ways rarely considered until now. Under the attack, the legitimate PLC program completely loses control of the process without this being noticed by the PLC, or by the operating staff viewing their consoles in the control room. The underlying attack vector is generic and reproducible. It could be packaged into and provisioned by exploit tools such as Metasploit and then contrary to common misconceptions be used for attacks even by persons lacking in comprehensive insider knowledge. 4. Communication with Command & Control Servers on the Internet: From infected PCs, the worm attempts to contact its designated command & control servers on the Internet. When a connection gets established, information collected from the target and its environment can be uploaded to those servers as well as new instructions and updates to the worm, and its malicious payload can be received and executed. This adds an extra dynamic depth to the worm s potential for espionage and sabotage. Combined with the worm s capabilities to spread and update itself via peer-to-peer connections and USB flash drives, all of this can have collateral effects even on systems without a network connection or Internet access. Benefits of the Innominate mguard Technology* The mguard technology developed by Innominate available in mguard-based industrial network security appliances from multiple vendors and as an embedded technology for OEMs comprises a set of preventive and diagnostic functions which can boost security against Stuxnet-like attacks and reduce their associated risks. Due to the diversity of proliferation paths, actively preventing 100% of all malware infections may not be practicable. Therefore, a most important aspect of protection is to discover such infections quickly and reliably rather than letting them slip through unnoticed and adversely affect facilities for a long span of time as was the case with Stuxnet. Page 2

Discover Malware on Day Zero: mguard Integrity Monitoring* Due to the difficulties of deploying antivirus software on industrial PCs and with the timely provision of malware signatures, alternative techniques of integrity assurance are gaining relevance and acceptance for the protection of industrial systems. The mguard CIFS Integrity Monitoring method, for instance, provides monitoring of configurable sets of files on PCs for unexpected modifications of executable code (CIFS or Common Internet File System denoting the file sharing protocol used by Windows and other operating systems). When initialized, it computes a baseline of signatures for all monitored objects and then periodically checks them for any deviations. This process works without any external provision of virus signatures, without the risk of disrupting operations through false positives, without installation of software, and with moderate load on the monitored PCs, by utilizing the processing resources of an mguard security appliance. In this way, suspect modifications are reliably discovered and promptly reported via SNMP and E-mail to network management systems or responsible administrators. In a test study performed at the University of East Westphalia-Lippe in Germany, researchers from the independent init Institute for Industrial IT (www.hs.owl.de/init/en/) have been able to verify that mguard CIFS Integrity Monitoring recognized infections with Stuxnet and would have done so on day zero of its exploit. It would have unveiled the unexpected manipulations by the worm and warned asset operators about them long before any commercial antivirus product. Both the device drivers installed by Stuxnet as well as the modifications performed by the worm on the pivotal SIMATIC Manager DLL were immediately discovered in the process. And while antivirus products need frequent, continuous pattern updates mguard CIFS Integrity Monitoring does not need any patterns at all. Contain Proliferation, Prevent Virus C&C Transmissions: mguard Firewall When spreading across networks and vulnerabilities in operating systems, malware often takes advantage of network connections that are not at all necessary for the productive operation of a plant. The correct protection of industrial PCs and controllers or groups of such devices ( security segments ) with mguard firewalls reliably blocks these unsolicited connections and restricts the proliferation of malware. In the case of Stuxnet, healthy systems could be infected by both incoming as well as outgoing connections and vice versa, contaminated systems could spread their infection via corresponding outgoing and incoming connections. When protecting systems with firewalls, therefore, the often neglected outgoing connections (not only the incoming) should also be filtered as much as possible. In particular, this will prevent contacts via outgoing connections to command & control servers on the Internet and the associated potential for espionage and dynamic threats. Authenticated and Authorized PLC Programming: mguard User Firewall Most PLCs on the market today barely offer authentication and authorization functions to protect their own programming process. Contrary to popular beliefs, programming and other manipulation of such controllers does not require a specific or vendor-authorized engineering software package. Whoever has network access to the programming port and adheres to the correct protocol will be master of the PLC. Protective measures are typically limited to an access control list (ACL) restricting programming access Page 3

to a number of IP addresses. No further checking of users and programs accessing the PLC from these IP addresses or their actual authorization to do so is taking place. Insidiously, Stuxnet is using exactly those engineering and visualization PCs for its attack on the PLCs which are designated for legitimate communication with the controllers. The ACLs are useless here as are static firewall rule sets, because the malware s access to the controllers originates from authorized nodes. In contrast, the mguard User Firewall presents an effective means to prevent the manipulation of controllers by unauthorized programming access. When in place, network access to the programming port first needs to be unlocked at the firewall by authentication of an authorized user, which the malware cannot achieve on its own. Bearing in mind the manipulations performed by Stuxnet on the engineering software, it becomes apparent just how important it is to combine the techniques described above. An authorized user should, of course, unlock access through the mguard User Firewall only after having assured himself of the programming environment s integrity, which in turn is supported by mguard Integrity Monitoring. While even more advanced security technologies such as application whitelisting or intrusion prevention may become available in forthcoming generations of automation equipment, all of the methods presented in this paper lend themselves perfectly for retrofitting into existing installations today. * Innominate mguard, among other formats and applications, is available as a small, DIN-mount module for factory enclosures, easily enabled by technicians rather than network administrators. It incorporates router, firewall, encrypted VPN tunneling, authentication, and integrity monitoring functions, to provide distributed defense-in-depth, economically and without disturbing production. Innominate mguard devices have been fieldproven since 2003, with tens of thousands of units in use every day, 24/7. The mguard CIFS Integrity Monitoring function has been available since the release of firmware version 7.0 in August 2009, almost one year before Stuxnet became known. Page 4

Sources Symantec W32.Stuxnet Dossier, Version 1.3 (November 2010), available for download at http://www.symantec.com/business/theme.jsp?themeid=stuxnet Langner Communications GmbH, Hamburg, Blog on Stuxnet available at http://www.langner.com/en/blog About the Author Torsten Rössel is the Director of Business Development for Innominate Security Technologies AG in Berlin. He is a frequent speaker at industry conferences, and author of numerous articles on the protection of networked industrial systems and secured remote services for machinery over the Internet. He is available at: troessel@innominate.com About Innominate Security Technologies AG Innominate Security Technologies AG, a Phoenix Contact company, is the winner of the prestigious Frost & Sullivan "2008 Global Ethernet Security Product Value Leadership Award" for their family of industrial network security products, marketed worldwide under the mguard brand through system integrators and OEM partners. The company specializes in the protection of networked industrial systems and the secure remote maintenance of machinery over the Internet. Contact Innominate Security Technologies AG /protecting industrial networks/ Rudower Chaussee 13 D-12489 Berlin, Germany Tel.: +49 (0)30 921028-0 Fax: +49 (0)30 921028-020 www.innominate.com Page 5