Down the SCADA (security) Rabbit Hole. Alberto Volpatto



Similar documents
External Supplier Control Requirements

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Protecting Organizations from Cyber Attack

Security Issues with Integrated Smart Buildings

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Cyber Security for SCADA/ICS Networks

OPC & Security Agenda

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Web Application Security

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Adobe Systems Incorporated

SANS Top 20 Critical Controls for Effective Cyber Defense

Protecting Your Organisation from Targeted Cyber Intrusion

Table of Contents. Page 2/13

Privacy + Security + Integrity

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Security Testing in Critical Systems

QuickBooks Online: Security & Infrastructure

Cyber Security in a Nuclear Context

SCADA Security: Challenges and Solutions

Seven Strategies to Defend ICSs

Feature. SCADA Cybersecurity Framework

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

How Secure is Your SCADA System?

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

SCADA Security Training

Columbia University Web Security Standards and Practices. Objective and Scope

MANAGED SECURITY TESTING

2015 Vulnerability Statistics Report

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

Magento Security and Vulnerabilities. Roman Stepanov

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

External Supplier Control Requirements

SCADA System Security, Complexity, and Security Proof

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

Innovative Defense Strategies for Securing SCADA & Control Systems

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

CYBER SECURITY. Is your Industrial Control System prepared?

CompTIA Security+ (Exam SY0-410)

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

How To Prevent Hacker Attacks With Network Behavior Analysis

A Decision Maker s Guide to Securing an IT Infrastructure

How To Protect A Web Application From Attack From A Trusted Environment

Where every interaction matters.

Critical Controls for Cyber Security.

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Keeping the Lights On

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Cyber Security Implications of SIS Integration with Control Networks

New Era in Cyber Security. Technology Development

What Risk Managers need to know about ICS Cyber Security

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

AURORA Vulnerability Background

The State-of-the-State of Control System Cyber Security

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

Network Security Policy

Security Research Advisory IBM inotes 9 Active Content Filtering Bypass

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

How to complete the Secure Internet Site Declaration (SISD) form

Network/Cyber Security

DDoS Overview and Incident Response Guide. July 2014

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

05.0 Application Development

Cloud Computing for SCADA

ISACA rudens konference

Security + Certification (ITSY 1076) Syllabus

This is a preview - click here to buy the full publication

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security Aspects of SCADA and Corporate Network Interconnection: An Overview

Network Instruments white paper

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

Solutions and IT services for Oil-Gas & Energy markets

Homeland Security Red Teaming

The Web AppSec How-to: The Defenders Toolbox

Dr. György Kálmán

Goals. Understanding security testing

Information Technology Cyber Security Policy

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

Transcription:

Down the SCADA (security) Rabbit Hole Alberto Volpatto

Alberto Volpatto Security Engineer & Team Leader @ Secure Network Computer Engineer Application Security Specialist

What is SCADA? Supervisory operators, engineers, supervisors Control monitoring, controlling, locally and/or remotely And Data information representing the acquired system Acquisition access, acquire and represent meaningful data

What is SCADA? A SCADA system is a type of ICS Industrial Control System used to monitor and control large-scale critical systems, both locally and remotely.

Application fields Industrial processes Manufacturing, power generation, production Infrastructure processes Water treatment and distribution, oil and gas pipelines, electrical power transmission Facility processes Heating, ventilation and air conditioning systems - HVAC

Application fields Industrial processes

Application fields Infrastructure processes

Application fields Facility processes

The SCADA ecosystem

SCADA/ICS Security For years SCADA/ICS systems relied on security through obscurity Industrial systems, which have been designed and intended to be alone, became magically connected to the world No perception of modern security threats and risks, from both SCADA vendors and consumers

SCADA/ICS Security As traditional IT networks, SCADA environments host critical data and information Projects, plans, chemical secrets They have a direct impact on the physical world An attack to a SCADA system could lead to a real world disaster, affecting people s safety

Attacking Chemical Plants August 2013 multiple vulnerabilities in the industrial wireless products of three vendors have been reported. Customers are nuclear, oil and gas, refining, petro-chemical, utility, and wastewater companies 2014 Lucas Apa and Carlos Penagos released a public advisory describing four vulnerabilities affecting some OleumTech Wireless Products

Attacking Chemical Plants Threat an attacker in a ~ 60 km range could inject false values on the wireless gateways, modifying measurements used to make critical decisions Targeting a wireless transmitter that monitors the process temperature could make a chemical react and explode If failsafe mechanisms are not implemented They demonstrated the scenario on a virtual simulator

Attacking Chemical Plants

Stuxnet - 2010 The world s first cyber weapon source: https://www.youtube.com/watch?v=7g0pi4j8auq

Stuxnet - 2010 Switch off oil pipelines Turn up the pressure inside nuclear reactors STUXNET tells the operators that everything is normal source: https://www.youtube.com/watch?v=7g0pi4j8auq

Stuxnet - 2010

SCADA/ICS Security Assessment Penetration testing goal is data The intrinsic critical nature of systems requires slight changes in the modus operandi Typically, no testing or quality environment Need for a methodology to nullify: Service interruption of the controlled process Damages to the industrial plants and materials Risk of injuring people safety

SCADA/ICS Security Assessment White or gray box assessment strategy Horizontal analysis and vertical exploits on a subset of pre-defined and authorized targets Assessment activity is supervised by the customer A proper knowledge of the controlled process is required to identify a potential issue and react

SCADA/ICS Security Assessment Testing SCADA network systems and services with the support of Customer personnel Internal policies review in order to spot issues in the organization processes Canonical corporate network assessment with a focus on network segregation or isolation Fuzz testing on adopted protocols. Lab testing preferred over production environment testing

Corporate Network Assessment

Corporate Network Assessment Scenario-driven attacks Corporate networks are likely to have been assessed before, but context-dependent scenarios need to be evaluated Verify proper network segregation between corporate network and SCADA network. Is it possible to jump from one network into the other? Network attacks against users who have access to the SCADA network or systems e.g., abusing whitelisted workstation to pivot on the SCADA network

SCADA Network Assessment

SCADA Network Assessment Again, scenario-driven attacks Simulating attacks from malicious employees Simulating attacks against legitimate employees Vulnerability research on adopted software solutions Production systems testing should be carefully supervised by personnel or operators A Point of Contact (PoC) should be available in order to handle any incidents Vulnerabilities exploiting must be specifically authorized and monitored by the Customer

SCADA Network Assessment Network attacks against servers could be expected Pivoting through internal user web browsers to attack internal web applications is less obvious Many web applications are vulnerable to Cross-Site Request Forgery (CSRF) Attacks CSRF attacks are completely transparent to the user and may affect any system they are currently logged into CSRF attacks do not require a compromised workstation Using penetration testing tools focused on client-side attacks makes pivoting easier e.g., BeEF (The Browser Exploitation Framework)

Cross-Site Request Forgery (CSRF) Attacker Authenticate 1 4 Malicious web page 3 Surf page 2 Vulnerable application Operator 5 Execute unwanted action

PLC/RTU Device Testing

PLC/RTU Device Testing In-lab devices testing (if available) Devices are often considered out of scope, despite being critical elements in the ICS ecosystem Custom protocols reversing and fuzzing Testing on production environment is usually avoided or explicitly denied A crash or generic fault on production systems could have unpredictable impact on people safety

Policies & Procedures Review Targeting non-technological issues Identify process-related security weaknesses Focus on SCADA/ICS systems management

SCADA Top 10 Security Risks Security through obscurity Unpatched or unsupported (operating) systems Authentication and authorization issues Transport layer insecurity Input validation issues Lack of proper security policies Network isolation and/or segregation Default or weak configuration Lack of accountability Availability issues Denial of Service

Statistics of SCADA Security Issues % Vulnerable systems 100 90 80 80 90 80 90 70 65 65 60 55 55 50 45 40 30 25 20 10 0

Conclusions ICS are critical, vulnerable, exposed Identifying their weaknesses is paramount Security testing can be done safely Specific methodologies and expertise are needed

Thank you! alberto@securenetwork.it Special thanks to Luca De Fulgentis ( @_daath )