25
Threats To Industrial Control Systems IWS 11 – Oklahoma City, Oklahoma Dan Scali Dragos, Inc. | October 2018

PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Threats To Industrial Control SystemsIWS 11 – Oklahoma City, Oklahoma

Dan Scali

Dragos, Inc. | October 2018

Page 2: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Topics For Today

How do ICS attacks work?

What have we learned from them?

What can we do about it?

1

2

3

Page 3: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

ICS attack capabilities are improving – on both offense and defense

1998 - 20092010 - 2012

2013 - 2015

2015-2017

Lack of Collection• Campaigns: APT1• ICS Malware: None

New Interest in ICS• Campaigns: Sandworm• ICS Malware: Stuxnet

Campaigns Target ICS• Campaigns: Dragonfly• ICS Malware: BlackEnergy 2

and Havex• First attack to cause physical

destruction on civilian infrastructure (German Steel)

Adversaries Disrupt ICS• Campaigns: 10 Unique• ICS Malware:

CRASHOVERRIDE and TRISIS

• First and second ever electric grid attacks that disrupt power

• First malware to target human life

Page 4: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

German Steel Mill 2014

• Dec 18, 2014 German Government’s BSI released annual report highlighting incidents

• Identified “massive damage” in a steel facility due to a cyber attack

• 2nd publicly known case of physical damage to control systems from cyber attacks

Page 5: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Ukraine 2015

• First ever cyber attack on a power grid to lead to outages

• 3 power companies across Ukraine

• SCADA Hijack scenario by a well funded team

Page 6: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Ukraine 2016 - CRASHOVERRIDE

Page 7: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

2017 TRISIS

• TRISIS was delivered into an industrial facility by a well funded attack team

• Targeted Safety Instrumented System (SIS) and failed causing a stop in operations

• First malware to specifically target human life

Page 8: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

The ICS Cyber Kill ChainST

AG

E 1

STA

GE

2

Page 9: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Vectors of ICS compromise, by frequency

Interconnectivity

Self Propagation

Trojanized Software

Phising

1

2

3

4

Page 10: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

The Diamond Model of Intrusion Analysis

ADVERSARY

INFRASTRUCTURECAPABILITY/TRADECRAFT

VICTIM/TARGET

Page 11: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

ELECTRUMADVERSARY• Operating since at least 2017

INFRASTRUCTURE• Legitimate infrastructure• University IPs for C2

CAPABILITY / TRADECRAFT• CRASHOVERRIDE• Long-term persistence• Use Microsoft SQL

database servers as the gateway that bridges business and ICS networks

• Electric grid disruption

VICTIM/TARGET• Electric utility companies in the Ukraine

Page 12: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

XENOTIMEADVERSARY• Unique tool development

since at least 2014

INFRASTRUCTURE• European web hosting providers• Asian shipping company

CAPABILITY / TRADECRAFT• TRISIS• Custom credential

harvesting

VICTIM/TARGET• Oil & Gas• Middle East

Page 13: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

CHRYSENEADVERSARY• Evolution of “Greenbug” activity• Possible links to Shamoon

INFRASTRUCTURE• Register domains mimicking

legitimate IT services or companies

• Configure an adversary-controlled authoritative nameserver for the domain

CAPABILITY / TRADECRAFT• Watering holes• 64-bit malware• Covert C2 via IPv6 DNS• ISMDOOR

VICTIM/TARGET• Oil & Gas, Manufacturing• Europe, MENA, North America

Page 14: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

COVELLITEADVERSARY• Emerged in September 2017 • No clear ICS-specific capability

demonstrated

INFRASTRUCTURE• Legitimate infrastructure• University IPs for C2

CAPABILITY / TRADECRAFT• Sophisticated implant with secure

communication channels• Similar features to malware used

against South Korean targets• Specific session key used for

payload and second encrypted layer• 41 minute and 30 second sleep

VICTIM/TARGET• Electric utility companies in the

United States

Page 15: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

MAGNALLIUMADVERSARY• Espionage group with ICS industry focus.• Associated with APT 33.

INFRASTRUCTURE• Registers own infrastructure• Spoofs victim organizations and

generic IT themes

CAPABILITY / TRADECRAFT• STONEDRILL wiper, variants

of TURNEDUP malware

VICTIM/TARGET• Petrochemical, Aerospace• Saudi Arabia

Page 16: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

ALLANITEADVERSARY• Operations began no later than May 2017• Similar but distinct from DYMALLOY

INFRASTRUCTURE• Compromised ISPs• European VPS resources

CAPABILITY / TRADECRAFT• Phishing w/ engineering

focused resumes• Compromised legitimate

websites for ICS OEMs and providers

VICTIM/TARGET• Electric utility companies in the

United States

Page 17: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

DYMALLOYADVERSARY• Observed mid- to late-2017• Some indications of

relationship to Dragonfly

INFRASTRUCTURE• Compromised ISP service nodes• No domains observed, IP only

used for C2, infection

CAPABILITY / TRADECRAFT• GOODOR• DORSHEL• KARAGANY• Mimikatz

VICTIM/TARGET• Energy sector, Oil & Gas, Advanced Industry• Turkey, Europe, US

Page 18: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

RASPITEADVERSARY• Associated with LeafMiner

INFRASTRUCTURE• Registers domains that look like

legitimate IT services• Utilize RDP communications to

controlled C2 servers for remote access

CAPABILITY / TRADECRAFT• Service installer malware

designed to beacon out to adversary infrastructure

VICTIM/TARGET• Electric Utilities• US, Saudi Arabia, Japan, Europe

Page 19: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Conventional Wisdom: ICS Cybersecurity is Hard

other17

Unknown110

Spear Phising109

Abuse of Authorized

Access7

Weak Authentication

18

Network Scanning /

Probing26

FY 2015 INCIDENTS BY INFECTION VECTOR 2015 ( 295 TOTAL)

HUNDREDS

BILLIONS

ICS CYBER SECURITY SPECIALISTS

Page 20: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Defense is Doable• Industrial infrastructures are

some of the most *defensible* networks on the planet

• Predictable high-confidence cyber attacks are difficult (ICS Cyber Kill Chain)

• The threats are worse than we realize but not as bad as we want to imagine

Page 21: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Commodity malware remains a risk to ICS

Page 22: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

You cannot just patch away the problem

• Dragos’ 2017 in Review reports revealed that for ICS vulnerabilities:

• 64% of all patches didn’t eliminate the risk

• 72% provided no alternate mitigation to the patch

• Only 15% could be leveraged to gain initial access

Ref: www.dragos.com/YearInReview/2017

Page 23: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Understanding your threat model

Page 24: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Sliding Scale of Security: Where are you now? Where do you want to be?

Ref: https://www.sans.org/reading-room/whitepapers/analyst/sliding-scale-cyber-security-36240

Page 25: PowerPoint Presentation IWS 11 Final.pdfTitle: PowerPoint Presentation Author: Ryan Fashing Created Date: 10/3/2018 11:18:53 AM

Thank you

@[email protected]