Looking Into The Eye Of The Meter

Similar documents
OPTIGUARD: A SMART METER ASSESSMENT TOOLKIT

Advanced Metering Infrastructure Security

Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas

AMI security considerations

EnergyAxis System: Security for the Smart Grid

Facilitated Self-Evaluation v1.0

Computer Organization & Architecture Lecture #19

WHITEPAPER. Smart Grid Security Myths vs. Reality

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Single channel data transceiver module WIZ2-434

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

GE Measurement & Control

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Testing Overview [Document subtitle]

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

DSO138 oscilloscope program upgrade method

Potential Targets - Field Devices

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Log Management for the University of California: Issues and Recommendations

Voice Over Internet Protocol (VoIP) Configuration

AMI Penetration Test Plan

Recommended Best Practices for the Design of Secure Multi-Domain KVM and Video Routing Systems

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Reverse engineering hardware for software reversers: studying an encrypted external HDD

September 20, 2013 Senior IT Examiner Gene Lilienthal

USER GUIDE. ZigBit USB Stick User Guide. Introduction

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Integrate Check Point Firewall

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Breach Found. Did It Hurt?

Concierge SIEM Reporting Overview

RSA Security Analytics Security Analytics System Overview

USB Portable Storage Device: Security Problem Definition Summary

E-Book Security Assessment: NuvoMedia Rocket ebook TM

NOQ_NQ-9121 Z-Wave Data Logger for Gas Meters Firmware Version : 2.55

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens BlackVue Cloud BlackVue Wi-Fi Internal Memory...

Using Contactless Smart Cards for Secure Applications

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges

Centralized Monitoring Management Platform Manual

Lessons Learned from AMI Pioneers Follow the Path to Success

NESCOR Guide to Penetration Testing for Electric Utilities

SecureD Technical Overview

Observer Probe Family

Windows Operating Systems. Basic Security

Implementation Guide

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Firewalls & Intrusion Detection

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Computer and Set of Robots

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Open Flow Controller and Switch Datasheet

WiFi Security Assessments

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Network Security 101 Multiple Tactics for Multi-layered Security

Using ISO Compliant RFID Tags in an Inventory Control System

Amcrest 960H DVR Quick Start Guide

Assets, Groups & Networks

Invisible EYE for Security System

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

FISMA / NIST REVISION 3 COMPLIANCE

Critical Security Controls

Update On Smart Grid Cyber Security

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May Contents

Security Issues with Integrated Smart Buildings

ITL BULLETIN FOR AUGUST 2012

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

GE Measurement & Control. Cyber Security for NEI 08-09

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

Attachment A. Identification of Risks/Cybersecurity Governance

Ohio Supercomputer Center

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

CC3100 Over-The-Air (OTA) Update. Application Note

Security & Chip Card ICs SLE 44R35S / Mifare

Using IPSec in Windows 2000 and XP, Part 2

Cyber Security: Beginners Guide to Firewalls

Payment Transactions Security & Enforcement

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

LED light control using DMX512 control method

Patch and Vulnerability Management Program

Longmai Mobile PKI Solution

Testing Data Radio Modem with Serial Port Tool V1.20

Transcription:

Looking Into The Eye Of The Meter Don C. Weber InGuardians, Inc. 1

Cutaway and InGuardians http://www.linkedin.com/in/cutaway http://inguardians.com/info 2

Smart Meter Research Findings REDACTED 3

Research Disclaimer Yes, I conduct assessments on AMI components No, I will not tell you for which clients No, I will not tell you which vendor products I have analyzed Yes, many of these images are generic 4

Danger Electrocution I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions. Random Image Taken From: http://www.flickr.com/photos/lwr/132854217/ 5

Permission-based Research / Penetration Testing Unauthorized Testing Is Illegal EVEN IF THE METER IS ON YOUR HOUSE. Getting Permission For Research IS NOT IMPOSSIBLE. Contact Vendors. I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions. 6

Agenda Purpose Smart Meters Criminals and Smart Meters Attack/Assessment Optical Tool Mitigations Not So Random Image Taken From: http://www.willhackforsushi.com/?p=349 7

Purpose: Presentation and Toolkit Smart Meter data acquisition techniques have been known since January 5, 2009 Advanced Metering Infrastructure Attack Methodology [1] Some vendors/utilities/people/teams are still not aware Tools to: Test functionality Validate configuration Generate anomalous data [1] http://inguardians.com/pubs/ami_attack_methodology.pdf 8

What Criminals Can Attack Access and change data on meter Gain access to wireless communications Subvert field hardware to impact internal resources 9

Criminal Interest Free or Reduced Energy Corporate Espionage Access To Back-End Resources Non-Kinetic Attack Hacktivism HAS ALREADY OCCURRED VIA OPTICAL PORT 10

Aggregator On Poletop Random Image Taken From: http://www.blogcdn.com/www.engadget.com/ media/2009/12/091204-smartgrid-01.jpg 11

Only One Winks At You 12

Where To Start? Steal This? State of Texas: Class B Misdemeanor Theft - $50 to $500 Jail <180 Days and/or Fine <$2000 Meter near my barber shop. The exposed contacts scared me. 13

Components and Interaction DANGER!!! Data At Rest Microcontrollers Memory Radios Data In Motion MCU to Radio MCU to MCU MCU to Memory Board to Board IR to MCU Image Take From: http://www.ifixit.com/teardown/xxxxxxx-smart-meter-teardown/5710/1 14

Data At Rest SPI/I 2 C Serial/ Parallel EEPROM PDIP/SOIJ/SOIC NAND/NOR/NVRAM/SRAM/ CellularRAM/PSRAM/SuperFlash/ DataFlash BGA/FBGA/VFBGA 15

Dumping Memory Total Phase Aardvark Flash Utility Xeltek SuperPro 5000 plus Adapter Custom Extractors 16

Memory Layout Logic Data Storage Standards C12.19 Tables in Transit Standard Tables formatted and documented Manufacturer Tables formatted but not externally documented Custom Obfuscated Information and Tables Extended memory for firmware SWAP Space 17

Data In Motion Component To Component Board to Board Random image take from some random Internet site 18

Data Eavesdropping Step One Simple Tapping with Logic Analyzer 19

Data Eavesdropping Step Two Persistent tapping by soldering leads to components Provides consistent monitoring for research and development 20

ANSI C12 Communication Protocols C12.21: Is Worse because people think it is secure C12.18: Is Okay because you know what you are getting. C12.22: ANSI committee has stated vendors should be implementing this 21

Logic Analyzer - Async Serial Analyzers can decode digital signal Export data to CSV formatted files C12.21 Identification Service Response Packet OK Standard 0x00 == C12.18 0x02 == C12.21 Version End-of-list Revision 22

C12.18 Packet Basics C12.21 Identification Service Request Packet Start packet character Identity Control Field Sequence Number Length Data Identification Service CCITT CRC 23

C12.18 Protocol Basics C12.18 Request/Response Pattern Identification Negotiation Logon Security Action (Read, Write, Procedure) Logoff Terminate 24

CSV Parser Functionality 25

Replay Tables To Talk To Tables 26

Advanced Persistent Tether Serial Transmitter Receive possible Replay C12.18 Packets C12.19 Table Interaction Read Tables Write Tables Run Procedures Receive Responses via Logical Analyzer Parse Responses by Hand 27

Hardware Client Functionality 28

Wink! Wink! Wink! Wink! 29

Lean In For A Closer Look 30

ANSI Type 2 Optical Port: Not Your Typical Infra-red Port Remote Control Devices Provides /dev/ttyusb0 via FTDI chip 31

Open Source Optical Probe? http://iguanaworks.net/ 32

What Do We Need To Do This? Serial Transceiver Driver C12.18 Packet Driver C12.18 Client Reads and parses C12.19 Tables Writes to C12.19 Tables Runs C12.19 Procedures Easy Function Updates Easy Access To All Functions 33

OptiGuard A Smart Meter Assessment Toolkit Image borrowed from: http://www.geekologie.com/2011/01/windows_to_the_soul_eyeball_cl.php 34

Permission-based Research / Penetration Testing Unauthorized Testing Is Illegal EVEN IF THE METER IS ON YOUR HOUSE. Getting Permission For Research IS NOT IMPOSSIBLE. Contact Vendors. I am not responsible for your actions. InGuardians, Inc. is not responsible for your actions. 35

OptiGuard Menu Notes Requires a VALID C12.18 Security Code to modify tables or run procedures Currently only works with some meters Vendor specific functions may be required C12.18 functions are coded for easy implementation and modification Optical transfer is finicky and fuzzing / brute forcing is hit or miss and must be monitored Brute force procedure runs have been known to disconnect/connect meters Brute force procedure runs have been known to brick meters 36

Using The Eye Chart Can check one code ~ every 2 seconds 12277 x 2 seconds = 409 minutes = 6.8 hours Hmmm, are failed logons logged? Does the meter return an error after N attempts 37

Open Wide for a Deep Look Inside Random Image Taken From: http://www.gonemovies.com/www/hoofd/a/photolarge.php?keuze=kubrickclockwork 38

Mitigations - General Residential meters on businesses Evaluate for increased risk to client Limit Shared Security Codes Difficult to implement a single security per meter Can vary in numerous ways: Vendor Commercial and Residential meter Zip Code 39

Mitigations General (2) Incident Response Planning Prioritize Critical Field Assets Incident Response Plan and Training Employee Training Identify Report Respond 40

Mitigations - Physical Tamper Alerts May seem overwhelming, initially Experience will identify correlating data to escalate appropriately Toggle Optical Port Use a switch that activates optical interface Should generate a tamper alert 41

Mitigations Data At Rest Secure Data Storage Encryption <- must be implemented properly Hashes <- must be implemented properly Configuration Integrity Checks Vendor Specific Some solutions systems already do this Meters should function with old configuration until approved / denied 42

Mitigations Data In Motion IR Interaction Authorization Tokens Breaking or Augmenting Standard? Microcontroller to <INSERT HERE> C12.22 Obfuscated Protocols 43

OptiGuard Offspring? Wireless Optical Port Readers Small cheap magnetic devices activated wirelessly Optical Port Spraying IR interaction without touching meter Wireless Hardware Sniffers/MITM Detect updates and modify data in transit Neighborhood Area Network FHSS Eavesdropping Channels, Spacing, Modulation, Sync Bytes, Etc 44

Vendor Participation The following people helped out in various important ways during this journey. Ed Beroset, Elster Robert Former, Itron Others who have asked not to be named 45

Those Who Must Be Thanked Gretchen, Garrison, and Collier Weber Andrew Righter Atlas Daniel Thanos John Sawyer Joshua Wright Matt Carpenter Tom Liston Travis Goodspeed InGuardians 46

consulting@inguardians.com Tell Them Cutaway Sent You Don C. Weber / Cutaway: don@inguardians.com 47