INTERNET ATTACKS AGAINST NUCLEAR POWER PLANTS



Similar documents
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Advanced & Persistent Threat Analysis - I

Advanced Persistent Threats

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Security A to Z the most important terms


Operation Liberpy : Keyloggers and information theft in Latin America

The Stuxnet Worm The Nexus of Cyber Security and International Policy. By George Aquila Mentor: Ming Chow

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

CYBER ESPIONAGE. Against Georgian Government. (Georbot Botnet) CERT.GOV.GE. LEPL Data Exchange Agency. Ministry of Justice of Georgia

The Christian Science Monitor

Cloud Services Prevent Zero-day and Targeted Attacks

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Detecting peer-to-peer botnets

Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware

Using WMI Scripts with BitDefender Client Security

The Hillstone and Trend Micro Joint Solution

Multifaceted Approach to Understanding the Botnet Phenomenon

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Cyber security and critical national infrastructure

RSA Security Analytics

Are you prepared to be next? Invensys Cyber Security

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

OPC & Security Agenda

SCADA/ICS Security in an.

Security Testing in Critical Systems

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

The Nitro Attacks. Security Response. Stealing Secrets from the Chemical Industry. Introduction. Targets. Eric Chien and Gavin O Gorman

Phone Fax

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Using Tofino to control the spread of Stuxnet Malware

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Worm Was Perfect for Sabotaging Centrifuges By WILLIAM J. BROAD and DAVID E. SANGER

The State-of-the-State of Control System Cyber Security

SCADA City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor

Networking for Caribbean Development

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

Seminar Computer Security

Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

KASPERSKY LAB TECHNOLOGY LEADERSHIP

Malware Analysis Report

Combating the Next Generation of Advanced Malware

Industrial Security for Process Automation

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

How To Prevent Hacker Attacks With Network Behavior Analysis

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

A 360 degree approach to security

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Advanced Persistent Threats

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Current counter-measures and responses by CERTs

SCADA Cyber Attacks and Security Vulnerabilities: Review

24/7 Visibility into Advanced Malware on Networks and Endpoints

Firewalls and Software Updates

13 Ways Through A Firewall

The Epic Turla Operation: Information on Command and Control Server infrastructure

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Report. Takeover of Virut domains

About Botnet, and the influence that Botnet gives to broadband ISP

Analysis of advanced issues in mobile security in android operating system

Computer Security DD2395

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Transcription:

INTERNET ATTACKS AGAINST NUCLEAR POWER PLANTS Kleissner & Associates IAEA, 1-5 June 2015, Vienna/Austria International Conference on Computer Security in a Nuclear World

Programmer and security researcher Prague, Czech Republic 2008-2009 Employee at the antivirus company Ikarus 2010 Austrian military 2012 External employee at a bank 2013-now CEO & Founder of Kleissner & Associates s.r.o. Main fields: Windows security, banking, malware

1. Administrative computers of NPP Could be used as entry point for targeting industrial computers. Often have lower security standards and according to Virus Tracker many general infections. An attacker could be interested to steal sensitive documents. 2. Industrial Computers Usually air-gapped for security reasons. USB thumb drives could defeat this air-gap, as done with Stuxnet in connection with exploits. Or via social engineering (delivering fake updates).

Backdoors can be potentially used by anyone else Abandoned botnets could be taken over by anyone Infections often disable antivirus and firewalls and therefore make the system more vulnerable Bots might remain for decades => Even if the C&C protocol is properly secured, the encryption technology might get broken in the future; Example: Conficker A with 1024 bits RSA encryption Stuxnet infections can be controlled by anyone who owns the C&C domains (!), due to lack of proper protocol encryption

Operation Olympic Games since 2006, signed off by the Bush administration [1] Discovered in June 2010 by Virusblokada antivirus company [2] Multiple versions uncovered by security companies [3] A lot of research by Symantec and Kaspersky Based on Tildet platform just as Flame, Duqu and Gauss [4] Targeting nuclear power plants, specifically Natanz, Iran according to reports Modifies S7P projects (the programs for controlling the industrial machines) Kill switch set to June 24, 2012 no more spreading then [5]

The Windows executable file format (PE) has multiple digital artifacts: Compilation Timestamp Resources -> Version numbers Rich Header with additional linker information Debug information (PDB file path) and strings Historical domain information reveals dates and whois info of domains. Researchers can link different domains to the same owners through DNS records and whois information (by use of reverse lookups).

Detects infected machines by sinkholing (registering C&C domains) More than 2.5 million devices per day seen Including Stuxnet, Flame & other espionage attacks We have Stuxnet since 2013 in the system!

153 unique identifiers as reported by Stuxnet 221 unique decoded Stuxnet requests 268 unique IP addresses 419 infection records in Virus Tracker

The data as it arrives at the Virus Tracker sinkhole: 2014-07-25 11:00:43 Pars Online PJS APT Stuxnet 188.245.250.173 Iran, Islamic Republic of Pars www.mypremierfutbol.com /index.php?data=66a96e28c013f8202df26332f5f8fcb5ff6b4f896e53b077fd1ccdabb8493f9b5390d446f2a 7645fa21d659d3fb4a87fe20af1d5f5e6c875c2bfe58f280ca956dc8427bdea6c5b1ee87734ff1da972a54fa39 1baa9e542c0b4fded6951ff24f0ba4fb4ce453ed141def05ad8cd19d613f0e5dfd9d21ed0b9f1cf7454c466a5e 757c0f81862fe2db9a907879d59d678d391

The data as it arrives at the Virus Tracker sinkhole: 2014-07-25 11:00:43 Pars Online PJS APT Stuxnet 188.245.250.173 Iran, Islamic Republic of Pars www.mypremierfutbol.com <- our sinkhole C&C server /index.php?data=66a96e28c013f8202df26332f5f8fcb5ff6b4f896e53b077fd1ccdabb8493f9b5390d446f2a 7645fa21d659d3fb4a87fe20af1d5f5e6c875c2bfe58f280ca956dc8427bdea6c5b1ee87734ff1da972a54fa39 1baa9e542c0b4fded6951ff24f0ba4fb4ce453ed141def05ad8cd19d613f0e5dfd9d21ed0b9f1cf7454c466a5e 757c0f81862fe2db9a907879d59d678d391 Hex encoded and XOR encrypted information!

The infection sends this information to the command & control server: Unique identifier of the Stuxnet infection (GUID) Main internal IP address Computer Name Domain Name IP address of interface 1 IP address of interface 2 IP address of interface 3 Windows major and minor version Windows Service Pack version Whether Siemens SCADA software is installed Project path of a found SCADA program

-------- STUXNET INFECTION -------- ID: F6A01E50-AF89-4081-9338-B6E27731FFD5 Main IP: 188.245.250.173 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: GERDOO-7A1D2321 Domain: MSHOME IP Interface 1: 188.245.250.173 IP Interface 2: 192.168.1.5 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p ----------------------------------- -------- STUXNET INFECTION -------- ID: F4BBB568-A3BC-4062-A37D-C8664B882711 Main IP: 169.254.124.74 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: H-C16EBB8501304 Domain: WORKGROUP IP Interface 1: 169.254.124.74 IP Interface 2: 213.217.39.254 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p ----------------------------------- -------- STUXNET INFECTION -------- ID: 03C28E58-8C9F-4BF2-83AE-0102FEF9B19C Main IP: 169.254.124.74 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: NEWTECH Domain: WORKGROUP IP Interface 1: 169.254.124.74 IP Interface 2: 213.217.45.94 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p -----------------------------------

-------- STUXNET INFECTION -------- ID: F6A01E50-AF89-4081-9338-B6E27731FFD5 Main IP: 188.245.250.173 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: GERDOO-7A1D2321 Domain: MSHOME IP Interface 1: 188.245.250.173 IP Interface 2: 192.168.1.5 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p ----------------------------------- S7P project path of an Industrial program -------- STUXNET INFECTION -------- ID: F4BBB568-A3BC-4062-A37D-C8664B882711 Main IP: 169.254.124.74 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: H-C16EBB8501304 Domain: WORKGROUP IP Interface 1: 169.254.124.74 IP Interface 2: 213.217.39.254 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p ----------------------------------- -------- STUXNET INFECTION -------- ID: 03C28E58-8C9F-4BF2-83AE-0102FEF9B19C Main IP: 169.254.124.74 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: NEWTECH Domain: WORKGROUP IP Interface 1: 169.254.124.74 IP Interface 2: 213.217.45.94 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p -----------------------------------

-------- STUXNET INFECTION -------- ID: F6A01E50-AF89-4081-9338-B6E27731FFD5 Main IP: 188.245.250.173 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: GERDOO-7A1D2321 Domain: MSHOME IP Interface 1: 188.245.250.173 IP Interface 2: 192.168.1.5 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p ----------------------------------- S7P project path of an Industrial program -------- STUXNET INFECTION -------- ID: F4BBB568-A3BC-4062-A37D-C8664B882711 Main IP: 169.254.124.74 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: H-C16EBB8501304 Domain: WORKGROUP IP Interface 1: 169.254.124.74 IP Interface 2: 213.217.39.254 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p ----------------------------------- -------- STUXNET INFECTION -------- ID: 03C28E58-8C9F-4BF2-83AE-0102FEF9B19C Main IP: 169.254.124.74 OS: Windows 5.1 Service Pack: 3 Scada installed: Yes! Computer: NEWTECH Domain: WORKGROUP IP Interface 1: 169.254.124.74 IP Interface 2: 213.217.45.94 S7P: C:\Program Files\Siemens\Step7\S7Proj\04082_19\040825.s7p ----------------------------------- 2 Stuxnet infections in the same internal network behind 1 public IP

Those 3 Iranian infections compared: Public IP OS Computer Domain IP 1 IP 2 188.245.250.173 Windows 5.1 GERDOO-7A1D2321 MSHOME 188.245.250.173 192.168.1.5 213.217.39.254 Windows 5.1 H-C16EBB8501304 WORKGROUP 169.254.124.74 213.217.39.254 213.217.45.94 Windows 5.1 NEWTECH WORKGROUP 169.254.124.74 213.217.45.94 Public IP is the one as seen by Virus Tracker when the infection checks in. The other info is listed as it was sent by the infection.

Date IP Stuxnet Id Country ASN Organization by IP lookup 7/25/2014 11:00 188.245.250.173 F6A01E50-AF89-4081-9338-B6E27731FFD5 Iran AS16322 Rasaneh Pardaz Sepahan Co. 9/8/2014 13:25 213.217.39.254 F4BBB568-A3BC-4062-A37D-C8664B882711 Iran AS16322 Parsonline-Dynamic-Pool 11/19/2014 16:57 213.217.45.94 03C28E58-8C9F-4BF2-83AE-0102FEF9B19C Iran AS16322 Parsonline-Dynamic-Pool 9/1/2014 07:01 31.29.61.10 CD994AB8-46EA-4461-AC05-35B017764F47 Iran AS48309 Rasaneh Pardaz Sepahan Co. 9/12/2014 12:58 78.39.79.170 6791667B-B507-4681-A7CE-C3009911B0AA Iran AS12880 Pars Special Economic Energy Zone,Boushehr,IR 11/30/2014 10:44 113.229.7.74 ACB0AE39-8771-403D-8CC1-ECFFA7DCB5F1 China AS4837 China Unicom Liaoning province network 12/5/2014 07:22 175.146.209.120 ACB0AE39-8771-403D-8CC1-ECFFA7DCB5F1 China AS4837 China Unicom Liaoning province network http://www.pseez.ir/en/home screenshot for reference:

Thanks for attending the presentation! Questions? For any information please contact: Email info@kleissner.org Address Na strži 1702/65 140 00 Praha Czech Republic 2015 Kleissner & Associates s.r.o.

[1] NYT, David E. Sanger, Obama Order Sped Up Wave of Cyberattacks Against Iran http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html [2] KREBS, B., Experts Warn of New Windows Shortcut Flaw http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/ [3] W32/Stuxnet Dossier, Symantec https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf [4] Kaspersky, Gauss: Nation-state cyber-surveillance meets banking Trojan https://securelist.com/blog/incidents/33854/gauss-nation-state-cyber-surveillance-meets-banking-trojan-54/ [5] MURCHU, L., Interview http://gcn.com/articles/2012/06/26/stuxnet-demise-expiration-date.aspx