SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Who’s Really Attacking Your
#WHOAMI
• Threat Researcher at Trend Micro- research and blogger on criminal
underground, persistent threats, and vulnerabilities.
• Bachelor’s and Master’s in Computer Science. Currently pursuing PhD.
Normal security certifications, CISSP, GCIH, GCFE, etc…
• Research:
-Malware detection/reversing
-Persistent Threats (Malware based espionage)
-ICS/SCADA Security
-Vulnerabilities and the “Underground”
This presentation will focus on:
• Concerns/Overview of ICS Security
• How terrible the security profiles of ICS devices are
• Are ICS devices attacked?
• Who attacks ICS devices?
Agenda
• ICS Overview
• Typical ICS Deployment
• Overview of two SCADA protocols
• ICS Vulnerabilities
• SCADA on the Internet?
• Story Time!
• Findings
• Attacker Profile
• Recommendations
ICS Overview
What are ICS devices?
• Used in production of virtually anything
• Used in water, gas, energy, automobile
manufacturing, etc.
• Notoriously insecure…in every way
• Software is sometimes embedded, sometimes not
• Typically proprietary
TYPICAL ICS
DNP3
• Used to send and receive messages
• Complex
• No authentication or encryption
• Several published vulnerabilities
Modbus
• Oldest ICS Protocol
• Controls I/O Interfaces (MOSTLY!!!!)
• No authentication or encryption! (Surprise!!!)
• No broadcast suppression
• Vulnerabilities are published
Security Concerns- ICS vs.
Traditional IT Systems
ICS
• Productivity
• Up-time
• Reliability of data
IT
• Protect the data
• Protect comms
• Limit interruptions
ICS Vulnerabilities
• In 2012, 171 unique vulnerabilities affecting ICS products.
• 55 Vendors…
SCADA on the Internet???
• Google-fu
• Shodan
SCADA on the Internet???
• Pastebin
• ERIPP
• Twitter
Story Time!
• Small town in rural America
• Water pump controlling water
pressure/availability
• Population 18,000~
• WRONG!• WRONG!
Story Time!
• Water pressure system Internet facing
• No firewalls/security measures in place
• Could cause catastrophic water pressure
failures
• WRONG!• WRONG!
Story Time!
• Attacked several times…During Q3-Q4
• Attackers successfully gained access
• Has not been made public
• This is not a story…
• Real life event..
• WRONG!• WRONG!
Story Time!
This Happened.
• WRONG!
Story Time!
In my basement…
• WRONG!• WRONG!
Enter…Honeypots…
• WRONG!• WRONG!
Honeypot Overview
• Two low-interaction
• One high-interaction
• Ran for 28 days in total
• One Windows Server 08
• Two Ubuntu 12.04 Servers
What They See
• WRONG!• WRONG!
High-Interaction Architecture
• WRONG!• WRONG!
Low-Interaction Architecture
• WRONG!• WRONG!
Some Tools Used
Vulnerabilities Presented
“If you can ping it, you own it”
• SNMP vulns (read/write
SNMP, packet sniffing, IP spoofing)
• Authentication limitations
• Limits of Modbus/DNP3
authentication/encryption
• VxWorks Vulnerability (FTP)
• Open access for certain ICS
modifications- fan
speed, temperature, and utilization.
• WRONG!
What is an “attack”?
• ONLY attacks that were targeted
• ONLY attempted modification of pump system
(FTP, Telnet, etc.)
• ONLY attempted modification via Modbus/DNP3
• DoS/DDoS will be considered attacks
• WRONG!
Attack Profile Countries
US, 9
LAOS, 6
UK, 4
CHINA, 17
NETHERLANDS, 1
JAPAN, 1
BRAZIL, 2
POLAND, 1
VIETNAM, 1
RUSSIA, 3
PALESTINE, 1
CHILE, 1 CROATIA, 1 NORTH KOREA, 1
• Not Just IP’s
• WRON!
Attack Overview
0 2 4 6 8 10 12 14
Modification of CPU fan speed
Modbus traffic modification
Secured area access attempt
Modify pump pressure
Modify temperature output
Attempt to shutdown pump system
Vxworks exploitation attempt
Count
Count
Snort Findings
• Used Digital Bond’s Quickdraw SCADA Snort Rules
• Custom Snort Rules Created
1111006
Modbus TCP – Unauthorized Read Request to a PLC
1111007
Modbus TCP – Unauthorized Write Request to a PLC
1111206 / 11112061
DNP3 – Unauthorized Read Request to a PLC
1111207DNP3 – Unauthorized Write Request to a PLC
1111208
DNP3 – Unauthorized Miscellaneous Request to a PLC
• WRONG!• WRONG!
Spear Phished!
TO: CITYWORKX@<HOSTNAME OF OUR CITY>.COM
“ Hello sir, I am <name of city administrator> and would like
the attached statistics filled out and sent back to me. Kindly
Send me the doc and also advise if you have questions. Look
forward you hear from you soon
....Mr. <city administrator name> ”
• WRONG!• WRONG!
CityRequest.doc
• WRONG!• WRONG!
Malware
• CityRequest.doc
• File gh.exe dumps all local password hashes
– <gh.exe –w>
• File ai.exe shovels a shell back to a dump server.
– < ai.exe –d1 (Domain) –c1 (Compare IP) –s (Service) >
• Malware communicating to a drop/CnC server in China.
• exploiting CVE 2012-0158
• WRONG!• WRONG!
Execution
• WRONG!• WRONG!
Execution
• Upon execution of CityRequest.docx, files leaving the server
in question after 5 days.
– Fake VPN config file
– Network statistics dump
– SAM database dump
– Gain persistence via process migration
• Won’t execute on Office 2010.
• WRONG!• Monitors reg keys for value changes
• Creates guard pages
• Dropped PE files
• Communicates to C2 IP’s
• Creates files
• Creates fake document and opens it
Malware Features
Attack: Days 1-4
Attack: Days 5-17
Attack: Days 18-???
• WRONG!• WRONG!
• Chose most prevalent attacker(s)
• Profiled, poked, and researched who they were
• Malware was code-reuse
Targeted? Who Knows…
Attacker Profile
Motivation?
• Motivation is hard to establish…
Recommendations
• Disable Internet access to your trusted resources. Where possible.
• Maintain your trusted resources at the latest patch levels, and
ensure you are diligent in monitoring when new patches/fixes are
released.
• Require username/password (two-factor if possible) combinations
for all systems, including those that are not deemed “trusted”.
• Control contractor access- Many SCADA/ICS networks utilize
remote contractors, and controlling how they access trusted
resources is imperative.
Recommendations
• Utilize SSL/TLS for all communications to web-based ICS/SCADA
systems.
• Control access to trusted devices. For instance, for access to a
segmented network, use a bastion host with ACL’s for
ingress/egress access.
• Improve logging on trusted environments, in addition to passing
logs to SIEM devices for third party backup/analysis.
• Utilize Zones- such as “BLAN”, “WLAN”, and “SCADA”.
• Develop a threat modeling system to your organization-
understand who’s attacking you, and why.
REMEMBER:
• These attacks are happening… In the USA, and many other places…
Shout
Twitter: @lowcalspam
Email: kyle_wilhoit@trendmicro.com
Non-Work: kylewilhoit@gmail.com
Please complete the speaker feedback surveys! (m.blackhat.com)

Weitere ähnliche Inhalte

Was ist angesagt?

Threat hunting in_windows
Threat hunting in_windowsThreat hunting in_windows
Threat hunting in_windowsChung Wee Jing
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud XiaoShakacon
 
Loggin alerting and hunting technology hub 2016
Loggin alerting and hunting   technology hub 2016Loggin alerting and hunting   technology hub 2016
Loggin alerting and hunting technology hub 2016Scot Berner
 
To see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoSTo see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoSMarco Gioanola
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
Ch 7: Attacking Session Management
Ch 7: Attacking Session ManagementCh 7: Attacking Session Management
Ch 7: Attacking Session ManagementSam Bowne
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug huntingKirill Ermakov
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Microwaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloudMicrowaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your clouddlapiduz
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsdrewz lin
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCanSecWest
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15Benjamin D. Brooks, CISSP
 
Positive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsPositive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsMona Arkhipova
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...APNIC
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Hykeos
 

Was ist angesagt? (20)

Threat hunting in_windows
Threat hunting in_windowsThreat hunting in_windows
Threat hunting in_windows
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Loggin alerting and hunting technology hub 2016
Loggin alerting and hunting   technology hub 2016Loggin alerting and hunting   technology hub 2016
Loggin alerting and hunting technology hub 2016
 
To see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoSTo see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoS
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Ch 7: Attacking Session Management
Ch 7: Attacking Session ManagementCh 7: Attacking Session Management
Ch 7: Attacking Session Management
 
Cryptography
CryptographyCryptography
Cryptography
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug hunting
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Microwaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloudMicrowaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloud
 
Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
 
IoT Key Elements
IoT Key ElementsIoT Key Elements
IoT Key Elements
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
 
Positive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsPositive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсs
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
 

Andere mochten auch

Attacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsAttacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsMike Spaulding
 
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemSafety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemAleksandr Timorin
 
Techniques of attacking ICS systems
Techniques of attacking ICS systems Techniques of attacking ICS systems
Techniques of attacking ICS systems qqlan
 
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]RootedCON
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104pgmaynard
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...arnaudsoullie
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAleksandr Timorin
 

Andere mochten auch (7)

Attacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsAttacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty Years
 
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemSafety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical System
 
Techniques of attacking ICS systems
Techniques of attacking ICS systems Techniques of attacking ICS systems
Techniques of attacking ICS systems
 
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
 

Ähnlich wie Bh europe 2013_wilhoit

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Network security basics
Network security basicsNetwork security basics
Network security basicsSkillspire LLC
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud SecuritySBWebinars
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39Bilal Ahmed
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the CloudTeri Radichel
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessCalyptix Security
 

Ähnlich wie Bh europe 2013_wilhoit (20)

Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Web security
Web securityWeb security
Web security
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT business
 

Kürzlich hochgeladen

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Bh europe 2013_wilhoit

  • 2. #WHOAMI • Threat Researcher at Trend Micro- research and blogger on criminal underground, persistent threats, and vulnerabilities. • Bachelor’s and Master’s in Computer Science. Currently pursuing PhD. Normal security certifications, CISSP, GCIH, GCFE, etc… • Research: -Malware detection/reversing -Persistent Threats (Malware based espionage) -ICS/SCADA Security -Vulnerabilities and the “Underground”
  • 3. This presentation will focus on: • Concerns/Overview of ICS Security • How terrible the security profiles of ICS devices are • Are ICS devices attacked? • Who attacks ICS devices?
  • 4. Agenda • ICS Overview • Typical ICS Deployment • Overview of two SCADA protocols • ICS Vulnerabilities • SCADA on the Internet? • Story Time! • Findings • Attacker Profile • Recommendations
  • 5. ICS Overview What are ICS devices? • Used in production of virtually anything • Used in water, gas, energy, automobile manufacturing, etc. • Notoriously insecure…in every way • Software is sometimes embedded, sometimes not • Typically proprietary
  • 7. DNP3 • Used to send and receive messages • Complex • No authentication or encryption • Several published vulnerabilities
  • 8. Modbus • Oldest ICS Protocol • Controls I/O Interfaces (MOSTLY!!!!) • No authentication or encryption! (Surprise!!!) • No broadcast suppression • Vulnerabilities are published
  • 9. Security Concerns- ICS vs. Traditional IT Systems ICS • Productivity • Up-time • Reliability of data IT • Protect the data • Protect comms • Limit interruptions
  • 10. ICS Vulnerabilities • In 2012, 171 unique vulnerabilities affecting ICS products. • 55 Vendors…
  • 11. SCADA on the Internet??? • Google-fu • Shodan
  • 12. SCADA on the Internet??? • Pastebin • ERIPP • Twitter
  • 13. Story Time! • Small town in rural America • Water pump controlling water pressure/availability • Population 18,000~
  • 14. • WRONG!• WRONG! Story Time! • Water pressure system Internet facing • No firewalls/security measures in place • Could cause catastrophic water pressure failures
  • 15. • WRONG!• WRONG! Story Time! • Attacked several times…During Q3-Q4 • Attackers successfully gained access • Has not been made public • This is not a story… • Real life event..
  • 16. • WRONG!• WRONG! Story Time! This Happened.
  • 17. • WRONG! Story Time! In my basement…
  • 19. • WRONG!• WRONG! Honeypot Overview • Two low-interaction • One high-interaction • Ran for 28 days in total • One Windows Server 08 • Two Ubuntu 12.04 Servers
  • 24. Vulnerabilities Presented “If you can ping it, you own it” • SNMP vulns (read/write SNMP, packet sniffing, IP spoofing) • Authentication limitations • Limits of Modbus/DNP3 authentication/encryption • VxWorks Vulnerability (FTP) • Open access for certain ICS modifications- fan speed, temperature, and utilization.
  • 25. • WRONG! What is an “attack”? • ONLY attacks that were targeted • ONLY attempted modification of pump system (FTP, Telnet, etc.) • ONLY attempted modification via Modbus/DNP3 • DoS/DDoS will be considered attacks
  • 26. • WRONG! Attack Profile Countries US, 9 LAOS, 6 UK, 4 CHINA, 17 NETHERLANDS, 1 JAPAN, 1 BRAZIL, 2 POLAND, 1 VIETNAM, 1 RUSSIA, 3 PALESTINE, 1 CHILE, 1 CROATIA, 1 NORTH KOREA, 1 • Not Just IP’s
  • 27. • WRON! Attack Overview 0 2 4 6 8 10 12 14 Modification of CPU fan speed Modbus traffic modification Secured area access attempt Modify pump pressure Modify temperature output Attempt to shutdown pump system Vxworks exploitation attempt Count Count
  • 28. Snort Findings • Used Digital Bond’s Quickdraw SCADA Snort Rules • Custom Snort Rules Created 1111006 Modbus TCP – Unauthorized Read Request to a PLC 1111007 Modbus TCP – Unauthorized Write Request to a PLC 1111206 / 11112061 DNP3 – Unauthorized Read Request to a PLC 1111207DNP3 – Unauthorized Write Request to a PLC 1111208 DNP3 – Unauthorized Miscellaneous Request to a PLC
  • 29. • WRONG!• WRONG! Spear Phished! TO: CITYWORKX@<HOSTNAME OF OUR CITY>.COM “ Hello sir, I am <name of city administrator> and would like the attached statistics filled out and sent back to me. Kindly Send me the doc and also advise if you have questions. Look forward you hear from you soon ....Mr. <city administrator name> ”
  • 31. • WRONG!• WRONG! Malware • CityRequest.doc • File gh.exe dumps all local password hashes – <gh.exe –w> • File ai.exe shovels a shell back to a dump server. – < ai.exe –d1 (Domain) –c1 (Compare IP) –s (Service) > • Malware communicating to a drop/CnC server in China. • exploiting CVE 2012-0158
  • 33. • WRONG!• WRONG! Execution • Upon execution of CityRequest.docx, files leaving the server in question after 5 days. – Fake VPN config file – Network statistics dump – SAM database dump – Gain persistence via process migration • Won’t execute on Office 2010.
  • 34. • WRONG!• Monitors reg keys for value changes • Creates guard pages • Dropped PE files • Communicates to C2 IP’s • Creates files • Creates fake document and opens it Malware Features
  • 38. • WRONG!• WRONG! • Chose most prevalent attacker(s) • Profiled, poked, and researched who they were • Malware was code-reuse Targeted? Who Knows… Attacker Profile
  • 39. Motivation? • Motivation is hard to establish…
  • 40.
  • 41. Recommendations • Disable Internet access to your trusted resources. Where possible. • Maintain your trusted resources at the latest patch levels, and ensure you are diligent in monitoring when new patches/fixes are released. • Require username/password (two-factor if possible) combinations for all systems, including those that are not deemed “trusted”. • Control contractor access- Many SCADA/ICS networks utilize remote contractors, and controlling how they access trusted resources is imperative.
  • 42. Recommendations • Utilize SSL/TLS for all communications to web-based ICS/SCADA systems. • Control access to trusted devices. For instance, for access to a segmented network, use a bastion host with ACL’s for ingress/egress access. • Improve logging on trusted environments, in addition to passing logs to SIEM devices for third party backup/analysis. • Utilize Zones- such as “BLAN”, “WLAN”, and “SCADA”. • Develop a threat modeling system to your organization- understand who’s attacking you, and why.
  • 43. REMEMBER: • These attacks are happening… In the USA, and many other places…
  • 44. Shout Twitter: @lowcalspam Email: kyle_wilhoit@trendmicro.com Non-Work: kylewilhoit@gmail.com Please complete the speaker feedback surveys! (m.blackhat.com)

Hinweis der Redaktion

  1. today I&apos;m going to be talking about who&apos;s really attacking your ICS devices. There is a lot of hype about ICS devices, and are they attacked, and I felt this needed more research to prove or disprove the data behind this. This talk isn’t going to cover 0-days of ICS devices, nor is it going to cover some new tool to exploit ICS devices- it’s to cover who’s really attacking your ICS devices. Before we get started, I&apos;m going to share a little bit about who I am.
  2. I’m part of a team called “Future Threat Research”. We look at threats from the current to five years out.
  3. -Likewise, I will also be discussing the security profiles of ICS, and how terrible they are.-In addition, I will cover how ICS devices are traditionally attacked, and who would usually do the attacking.
  4. Before we get started on our talk today, let&apos;s quickly cover what I&apos;m going to discuss. This is a full talk, so we&apos;re going to have breeze through these slides quickly- covering a lot of topics in a short period of time.A.) First, were going to cover what in the hell ICS devices are, and where they are used.B.)Second, I&apos;m going to give an overview of the two most widely used SCADA protocols- Modbus and DNP3.
  5. So…what are ICS devices? Typically proprietary based on manufacturer/function!!!!
  6. This is a typical ICS deployment. A few things to take note of here:A.) The SCADA network sits on top, under &quot;Supervisory Network&quot; You would typically see these in office locations of a mining site for instance.B.) The Control networks sit below, labled &quot;Control systems&quot;. These control systems are typically found in remote areas of an industrial site, and can seen as controllers on an assembly belt for instance.C.) There are no security devies anywhere to be found. THIS IS TYPICAL!!!!TYPICAL ICS DEVICES HAVE NO SECURITY WHATSOEVER.
  7. The assumption exists that DNP3 traffic comes from the same subnet…TRUST FLAW!!!!!!!!!!!A DNP3 frame consists of a header and data section. The header specifies the frame size, contains data link control information and identifies the DNP3 source and destination device addresses. The data section is commonly called the payload and contains data passed down from the layers above. The assumption exists that DNP3 traffic comes from the same subnet…TRUST FLAW!!!!!!!!!!!A DNP3 frame consists of a header and data section. The header specifies the frame size, contains data link control information and identifies the DNP3 source and destination device addresses. The data section is commonly called the payload and contains data passed down from the layers above.
  8. Used to read/write input/output interfaces. Very simple and usage is limited in nature.
  9. 26% of incidents revolved around Internet-facing and Water…
  10. -Many ICS devices are Internet facing, and have VERY little security-Target Rich environment-THESE DEVICES THAT ARE INTERNET FACING BRING ME TO OUR STORY TIME.
  11. ----- Meeting Notes (3/8/13 16:08) -----Recent water plant in IL FOR INSTANCE
  12. This is where the presentation gets fun. I’m not going to talk about how I exploited a vulnerability in an ICS or SCADA device, nor am I going to talk about a zero-day affecting SCADA devices. What I’m going to do is share a story about a small town in rural Missouri, in the US.
  13. -THE HONEYPOT ARCHITECTURE IS FAIRLY STRAIGHT FORWARD, I USED TWO LOW-…-YOU SEE IN TEH SCREENSHOTS THAT THE FIELDS ARE IDENTICLE TO WHAT YOU WOULD SEE IN A TRADITIONAL ICS DEVICE CONTROL PAGE.
  14. WHAT THESE ATTACKERS SEE IS WHAT AN ATTACKER WOULD SEE IN A TRADITIONAL ICS SETUP. HAVING PEN TESTED ICS/SCADA ENVIRONMENTS, I REPLICATED THIS HONEYPOT ARCHITECTURE TO DIRECTLY MIMIC COMMONLY FOUND ICS DEVICE DEPLOYMENTS.EXTERNAL IP COULD BE CONSIDERED “HMI”PLC IS WHAT DIRECTLY MIMCS THE WATER PRESSURE PLANT.
  15. THESE ADMINSTRATIVE FUNCTIONS WOULD BE CONSIDERED MODBUS AND DNP3.THESE SALTED DOCUMENTS ARE WHAT YOU WOULD TRADITIONALLY FIND ON ICS BOXES…SUCH AS ENGINEERING DOCUMENTS, GEO SPATIAL INFORMATION, LOAD CONTROL DOCUMENTS, ETC.
  16. THIS HONEYWALL ALLOWS US TO DO SEVERAL THINGS. FIRST, IT ALLOWS US TO PASS TRAFFIC TO TWO DIFFERENT AMAZON EC2 INSTANCES, THAT MAY NOT BE LOGICALLY OR PHYSICALLY CONNECTED.Again, “External IP” would be considered the HMI. (Human Machine Interface)SECOND, IT ALLOWS TO HAVE A SECONDARY POINT OF LOGGING SHOULD THE ATTACKER GAIN ACCESS
  17. Snort (Digital Bond Modbus TCP Rules)]BeEFDionaneaTcpdumpHoneydNano-10Siemens SIMATIC S7-1200 CPU 1212CDell DL360Amazon EC2SMTPSalted sample data
  18. AUTHENTICATION LIMITATIONS- WE SET THE USERNAME/PASSWORD MORE COMPLEX THEN ADMIN/ADMIN TO ENSURE WE WERE SEEING WHAT WE CONSIDERED &quot;TARGETED&quot; ATTACKS. WE WERE REALLY ONLY INTERESTED IN &quot;TARGETED ATTACKS&quot;
  19. Not port scans, or non-targeted attacks.Not automated attacksNot drive-byWE ARE ONLY CONCERNED WITH TARGETED ATTACKS AGAINST ICS DEVICES. WE SAW MULTIPLE ATTACK ATTEMPTS VIA THE STANDARD DRIVE-BY&apos;S AND AUTOMATED ATTACKS, Think of these classifications:Information DisclosureCommunications WeaknessAccess Control and Permission ErrorsConfiguration ErrorsInput Validation Errors
  20. 49 attacks in total. 17 were considered “catastrophic” the rest were considered “attacks” that “could” cause massive issues.1.) CHINA2.) USA3.) LAOSAN INTERESTING COUNTRY OF ATTACK ORGIN: NORTH KOREA - MORE INFORMATION ON THAT IN A SECOND
  21. THERE WAS A LOT OF ATTACKERS INTERESTED IN NOT PROVIDING WATER TO THE PEOPLE OF ARNOLD DURING OUR TESTING.ALSO INTERESTED IN HAVING PEOPLE DRINK WARM WATER. (NORTH KOREA- MODBUS TRAFFIC MOD)----- Meeting Notes (3/8/13 16:08) -----Authenticated realm- PUMP SYSTEM AND TEMP OUTPUT
  22. Custom rules created for SCADA controllers, vulnerabilities, and protocols. Highly effective for low-interaction honeypots. In addition, it works well for high-interaction honeypots.----- Meeting Notes (3/5/13 13:17) -----DIRECT MODIFICATIONS TO MODBUS AND DNP3. THESE WOULD BE CONSIDERED THE MOST TARGETED OF ALL ATTACKS WE SAW DURING OUR TESTING PERIOD.AS IF ALL THAT INFORMATION ISN&apos;T INTERESTING ENOUGH, IT&apos;S ABOUT TO GET EVEN MORE INTERESTING.
  23. IT GOT WEIRD WHEN I CHECKED OUR EMAIL AT CITYWORKX@&lt;HOSTNAME OF OUR CITY&gt;.COMHAD AN ATTACHMENT, NAMED CITYREQUEST.DOC
  24. Document dropped two PE files- gh.exe and ai.exeNOTE (NOT TO DISCLOSE): THIS IS COMMENT CREW HACKSFASE. CONFIRMED.
  25. Will execute on Office 03/07 with various Service Packs
  26. -Mutexes created-process migration-IOC’s available
  27. Attacker days 1-4
  28. Attacker days 5-17
  29. Just a super sweet venn to show “WHO” could be interested in pwnage of water goodness.