The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices



Similar documents
ICS, SCADA, and Non-Traditional Incident Response. Kyle Wilhoit Threat Researcher, Trend Micro

Who s Really Attacking Your ICS Equipment?

Cyber Security for SCADA/ICS Networks

Basics of Internet Security

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Security Testing in Critical Systems

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

RSA Security Anatomy of an Attack Lessons learned

Goals. Understanding security testing

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Agenda , Palo Alto Networks. Confidential and Proprietary.

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Holistic View of Industrial Control Cyber Security

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Post-Access Cyber Defense

Stephen Coty Director, Threat Research

The SCADA That Didn t Cry Wolf

APT Advanced Persistent Threat Time to rethink?

CISCO IOS NETWORK SECURITY (IINS)

Secure Networks for Process Control

ICS/SCADA Security Analysis of a Beckhoff CX5020 PLC

I N T E L L I G E N C E A S S E S S M E N T

Rule 4-004G Payment Card Industry (PCI) Remote and Mobile Access Security (proposed)

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

IT Security and OT Security. Understanding the Challenges

Cyber Essentials. Test Specification

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Uroburos Highly complex espionage software with Russian roots

From SCADA and ICS to the Internet of Things. Andy Swift Infrastructure Team Lead CNS Group

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Protecting Your Organisation from Targeted Cyber Intrusion

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

13 Ways Through A Firewall

Overview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)

Network Security Administrator

Security Issues with Integrated Smart Buildings

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Phone Fax

Potential Targets - Field Devices

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

ISACA rudens konference

Jort Kollerie SonicWALL

Best Practices for a BYOD World

Who is Watching You? Video Conferencing Security

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Incident Response. Six Best Practices for Managing Cyber Breaches.

Safe Network Integration

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

What is Really Needed to Secure the Internet of Things?

13 Ways Through A Firewall What you don t know will hurt you

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

Securely Connect, Network, Access, and Visualize Your Data

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Networking: EC Council Network Security Administrator NSA

Symantec Managed Security Services The Power To Protect

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Medical Device Security: The Transition From Patient Privacy To Patient Safety. Scott Erven

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Cisco Configuring Secure Shell (SSH) on Cisco IOS Router

Exploiting Access Control and Facility Management Systems. Billy Rios Director of Threat Intelligence Qualys

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Network Security: A Practical Approach. Jan L. Harrington

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

A Love Affair: Cyber Security, Big-data and Risk

Denial of Service Attacks

Industrial Security Solutions

Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Networking for Caribbean Development

Ranch Networks for Hosted Data Centers

Why Can t We Be Friends?

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

Multifaceted Approach to Understanding the Botnet Phenomenon

Customer Service Description Next Generation Network Firewall

Waterfall for NERC-CIP Compliance

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Information Technology Security Procedures

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Transcription:

The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices Kyle Wilhoit Sr. Threat Researcher Trend Micro 1

Glossary HMI: Human Machine Interface IED: Intelligent Electronic Device SCADA: Supervisory Control And Data Acquisition RTU: Remote Terminal Unit Historian: Data Historian Modbus: Common ICS Protocol DNP3: Common ICS Protocol 10/31/13 2 Confidential Copyright 2012 Trend Micro Inc.

Typical ICS Deployment 10/31/13 3 Confidential Copyright 2012 Trend Micro Inc.

Modbus Oldest ICS Protocol Controls I/O Interfaces (MOSTLY!!!!) No authentication or encryption! (Surprise!!!) No broadcast suppression Vulnerabilities are published 10/31/13 4 Confidential Copyright 2012 Trend Micro Inc.

Security Concerns- ICS vs. IT ICS Correct commands issued (Integrity) Limit interruptions (Availability) Protect the data (Confidentiality) IT Protect the data (Confidentiality) Correct commands issued (Integrity) Limit interruptions (Availability) 10/31/13 5 Confidential Copyright 2012 Trend Micro Inc.

Primary Security Concerns HMI: Allows arbitrary command execution as well as set point modifications. Data Historian: Allows inbound traffic to secure network segments. (Replication of data) RTU: Allows remote communication ability And many more

Incidents Exist First half of 2013 Over 200 confirmed incidents

SCADA Internet Facing Google-fu Shodan ERIPP Pastebin Twitter

SCADA Internet Facing

Story Time! All Internet facing No security measures in place

Attacks Attacked several times- over a period of months Attackers gained access Exfiltrated data Not made public This is not a story This happened

Story Time! In my basement

Enter Honeypots

12 total honeypots 8 different countries Running since Jan, 2013 Phase 1: Combination of *nix, Windows, and embedded Nov. 2012-March systems 2013

Physical Deployment Small town in rural America Water pump controlling water pressure/ availability Population 18,000~ 10/31/13 15 Confidential Copyright 2012 Trend Micro Inc.

Physical Deployment Fake water pressure system Internet facing Very little security measures in place Could cause catastrophic water pressure failures if compromised 10/31/13 16 Confidential Copyright 2012 Trend Micro Inc.

What They See 10/31/13 17 Confidential Copyright 2012 Trend Micro Inc.

Physical Deployment 10/31/13 18 Confidential Copyright 2012 Trend Micro Inc.

Attack Profile- Country of Origin 2% 2% 2% 2% US 2% 2% 6% 19% LAOS UK 2% 2% 4% 12% CHINA NETHERLANDS 8% JAPAN 35% BRAZIL POLAND 10/31/13 19 Confidential Copyright 2012 Trend Micro Inc.

12 total honeypots 8 different countries Running since Jan, 2013 Phase 2: Combination of *nix, Windows, and embedded March. 2013-July systems 2013

Virtualized Environment Water pump controlling water pressure/ availability Population combined ~50 million

Logically 10/31/13 22 Confidential Copyright 2012 Trend Micro Inc.

Architecture

Some Tools Used Modbus.py OpenDNP3 Pi- Face

Vulnerabilities Presented If you can ping it, you own it SNMP vulns (read/write SNMP, packet sniffing, IP spoofing) Specific ICS Vendor vulnerabilities HMI (Server) Vulnerabilities Authentication limitations Limits of Modbus/DNP3 authentication/encryption VxWorks Vulnerability (FTP) Open access for certain ICS modifications- fan speed, temperature, and utilization.

What s an Attack? ONLY attacks that were targeted ONLY attempted modification of pump system (FTP, Telnet, Modbus, set points, etc.) ONLY attempted modification via Modbus/DNP3 DoS/DDoS will be considered attacks

-74 attacks Total Attacks

Non-Critical Attack Profile- Source Countries -63 non-critical attacks

Critical Attack Profile- Source -11 critical attacks Countries

Some Attack Stats Data exfiltration attempt Modification of CPU fan speed Modbus traffic modification HMI access Modify pump pressure Modify temperature output Shutdown pump system 0 0.5 1 1.5 2 2.5 3 3.5

Spear Phished TO: CITYWORKS@<HOSTNAME OF OUR CITY>.COM Hello sir, I am <name of city administrator> and would like the attached statistics filled out and sent back to me. Kindly Send me the doc and also advise if you have questions. Look forward you hear from you soon...mr. <city administrator name>

Cityrequest.doc Decoy doc- not much substance

Cityrequest.doc

Dropped Files CityRequest.doc File gh.exe dumps all local password hashes <gh.exe w> File ai.exe shovels a shell back to a dump server. < ai.exe d1 (Domain) c1 (Compare IP) s (Service) > Malware communicating to a drop/cnc server in China. exploiting CVE 2012-0158 Malware communicating to a drop/cnc server in USA 70.254.245.X 70.254.245.X Has been taken down by the US government

Execution Upon execution of CityRequest.docx, files leaving the server in question after 5 days. Fake VPN config file Network statistics dump SAM database dump Gain persistence via process migration Won t execute on Office 2010.

Exfiltration: Days 1-4

Exfiltration: Days 5-17

APT1 Report APT1 (Comment Crew) report released in Feb 2013. Included many APT variants we ve seen. One of particular interest was HACKSFASE. Commonly used in energy sector.

Examination

Attribution 10/31/13 40 Confidential Copyright 2012 Trend Micro Inc.

IP BeEF Code Analysis Attribution

BeEF Usage Detect Tor Get Registry Keys Get_Physical_Location Get_System_Info Get_Internal_IP

Attacker Profile Most attacks appeared to be non-targeted Many attackers were opportunists Some were targeted

Some Takeaways Red team/blue team often Perform specialized vulnerability assessments Control contractors Perform basic security controls Network segmentation Two-factor authentication Patch your stuff! Lockdown external media Manage vulnerabilities Classify your data/assets etc.

Shout Email: kyle_wilhoit@trendmicro.com Non-Work: kylewilhoit@gmail.com Twitter @lowcalspam