SlideShare a Scribd company logo
1 of 8
This following findings report contains specific details of devices that are directly connected to the
Internet that may be utilized for mission critical operations associated to one (or more) critical
infrastructure sectors (and their respective industries). Information contained within this report should
only be used for awareness purposes.
This document is licensed under Creative Commons v4.0:
http://creativecommons.org/licenses/by-nc/4.0
LEGAL DISCLAIMER
Project RUGGTEDTRAX is a research project designed to observe and gather data used to provide some proof of any threats and
risk associated with SCADA and industrial control system devices that appear to be directly connected to the Internet. The
project is but one of several projects to raise public awareness of such devices that may impact one (or more) critical
infrastructure sectors (and their respective industries), while demonstrating providing quantifiable proof of any impacts to
these devices that are publicly accessible through the Internet.
Project RUGGEDTRAX โ€“ Creative Commons v4.0: Attribution/Non-Commercial Use Page 1
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
Project RUGGEDTRAX
SCADA/ICS Analysis
Findings Report
Based on intelligence gathered from an
ICS device placed directly onto the Internet
14 Oct 2014 through 27 Dec 2014
28 Nov
2015
Contact Information
For more information about Project RUGGEDTRAX, please send correspondence to:
Project RUGGEDTRAX Inquiries
projectruggedtrax@infracritical.com
Introduction
This project is subset to Project SHINE (SHodan Intelligence Extraction), providing one example of what
would happen if a device was to be directly connected to the Internet.
At no point in time was this project intended to identify any shortcomings of the manufacturerโ€™s efforts
in remediating any of the known vulnerabilities, nor was it intended to place any blame or negligence
towards the manufacturer in any manner whatsoever. The choosing of the specific device was to
provide a simplified example which could be easily demonstrated as a form of substantiation of our
position provided through Project SHINE. It should be noted that the device utilized, has an out-of-date
version of its firmware that is subject to one or more known vulnerabilities that currently exist. The
manufacturer has taken steps previously to remediate those versions of firmware by providing updated
versions; it is strongly suggested that any asset owners running this specific version of firmware
update/upgrade to the latest version as a precautionary effort.
Objective
The objective of this project is to provide some form of substantiation that directly connecting an ICS
device onto the Internet could have consequences. As such, the premise of this project was to:
(1) Obtain current ICS equipment through public sources (eBay), and deploy this equipment as
actual cyber assets controlling perceived critical infrastructure environments;
(2) Ascertain any pertinent threat or attack vectors, as well as scope and magnitude of any attacks
against the perceived critical infrastructure environments;
(3) Record network access attempts, and analyze captured network packets for any patterns; and,
(4) Report redacted findings for public awareness to governments and media outlets.
Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 2
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
Device Specifications
The equipment chosen is a serial-to-Ethernet converter that has capabilities of controlling two (2) ICS
devices utilizing either the MODBUS/TCP or DNP3 network protocols.
The manufacturer is Siemens RuggedCom, and the device model is RS910, which is a 2-port serial-to-
Ethernet converter that is DIN rail-mounted; a hardware diagram is shown below:
.
Figure 1.
The device is running the firmware release level of version 3.8.0. This version of the firmware is
susceptible to several publicly known vulnerabilities, including the factory backdoor vulnerability, in
which an adversary may bypass security controls by executing an application to obtain administrative
privileges through a generated factory account and password. This feature was previously available as a
method of accessing the device should an asset owner administrator lose their administrative privileged
access to any Siemens RuggedCom device, and has since been remediated by Siemens RuggedCom.
Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 3
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
Device Configuration
The device can communicate using the following protocols: TELNET, Trivial FTP (TFTP), Remote Shell
(RSH), Secure Shell (SSH), SNMP, HTTP/HTTPS, MODBUS/TCP and DNP3. After resetting the device to
factory defaults, all protocols are enabled and available.
The following protocols were disabled: TELNET, TFTP, RSH, SNMP, and MODBUS/TCP.
The protocols HTTP/HTTPS and SSH are always required (outside of serial console), with minimal
connectivity of at least ONE (1) allowed connection. NOTE: The DNP3 protocol cannot be disabled.
The device was portrayed and configured as a water pump to a wellhead for a local municipality. In this
case, the local government is Geneva, Illinois.
The contact name is fictitious; any resemblance to any individuals with a similar name is entirely
coincidental. A screen shot of the redacted web interface is shown below:
1 2
Figure 2.
1
The name โ€œRUGGEDCOMโ€, โ€œRugged Operating Systemโ€, and โ€œROSโ€ are copyright and registered trademarks of Siemens RuggedCom.
2
The name โ€œgoaheadโ€ and โ€œgoahead WEBSERVERโ€ are copyright Embedthis Software.
Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 4
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
The device was placed online 14-Oct-2014 (Tuesday), and taken out of service 27-Dec-2014 (Saturday).
Once placed directly on the Internet, the device was monitored closely for any activity. For sake of
brevity, this report was limited to 53 countries, identifying the most significant counted countries, top-
to-bottom, left-to-right, which include the following:
Country Count Percent Country Count Percent Country Count Percent
China 125299 89.2424 France 3344 2.3817 United States 3247 2.3126
Germany 1794 1.2778 Korea 1602 1.141 Singapore 1576 1.122
Tunisia 509 0.363 Ukraine 327 0.233 Indonesia 253 0.180
Canada 220 0.157 Turkey 198 0.141 Italy 196 0.140
Japan 193 0.137 Poland 185 0.132 Netherlands 183 0.130
Lithuania 178 0.127
United
Kingdom 159 0.113
Hong
Kong 137 0.0.98
Russian
Federation 105 0.075 Brazil 85 0.061 Vietnam 81 0.058
Sweden 76 0.054 Belarus 65 0.046 Austria 64 0.046
Taiwan 56 0.040 Panama 47 0.033 Peru 45 0.032
Mexico 44 0.031 Kazakhstan 25 0.018 Norway 17 0.012
Israel 12 0.009 Estonia 10 0.007 India 8 0.006
Hungary 7 0.005 Iran 7 0.005 Malaysia 7 0.005
Romania 7 0.005 Belgium 6 0.004 Moldova 6 0.004
Greece 3 0.002 Spain 3 0.002 Thailand 3 0.002
Australia 2 0.001 Kenya 2 0.001 Pakistan 2 0.001
Argentina 1 0.0007 Costa Rica 1 0.0007 Czech Republic 1 0.0007
Denmark 1 0.0007 Ecuador 1 0.0007 Ireland 1 0.007
Satellite
Provider3
1 0.0007 Slovakia 1 0.0007
Table 1.
The top-most country is highlighted in red; the remain 4 top-most countries are highlighted in yellow; of
100%, the 5 top-most countries represent 96.3555% or 135,286 out of 140,403 non-unique entries.
3
Based on the IP address, this belonged to an undisclosed satellite provider.
Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 5
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
Percentages
With Chinese-based IP addresses representing 89.2424%; the next 4 countries representing 7.1131%;
and the remaining 48 countries representing 3.6445%; out of a total of 53 countries.
Counts
With Chinese-based IP addresses represent 125,299 non-unique entries; the next 4 countries represent
9,987 non-unique entries; and remaining 48 countries representing 5,117 non-unique entries.
Total count is 140,403 non-unique entries out of 140,430 total entries.
The difference represents 27 erroneous entries (or 0.0192%) due to network connection retries.
The margin of error is ยฑ3.04%.
Graph (Country Count Distribution)
The graph (shown below) demonstrates just how skewed the access attempts against the device were
identified per country-based IP address(es). Please note that this does not infer that the country
identified is representative of a nation-state sanctioned activity; merely, it is representative of the IP
addresses correlated to a specific network address block for that country.
Table 2.
Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 6
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
Graph (IP Network Address Count Distribution)
The graph (shown below) shows the top 5 IP addresses that are part of the 140,403 count distribution,
with a count of 12,112, representing 8.6266% of the total count. Of the 5 IP addresses identified,
numbers 1, 3, 4 and 5 are from Chinese-based IP addresses; number 2 is from a French-based IP address.
Identified as the following:
China: 3044, 2258, 2175, and 2056.
France: 2579.
Table 3.
The top 5 IP addresses are part of a total of 651 IP addresses, minus 3 IP addresses used for local and/or
remote access during the packet capture and evaluation.
Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 7
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
Conclusion
Based on the data examined, it appears that the majority of the access attempts originated from IP
addresses belong to the country of China. This does not mean nor infer that any of the access attempts
were conducted by anyone from the Chinese nation, its government, or any organization based out of
China.
The originating IP addresses may be proxied in an effort to mask the originating IP address sources.
It would be an assumption that these access attempts were directed primarily at a critical infrastructure
specifically; however, this does not mean that such an attempted access could not exist. Majority of the
attempts appear to be automated, with repetitive attempts several times within 1-2 seconds of each
other, over the course of several minutes. The only exception would be accounts other than โ€œrootโ€,
which appear to be manually attempted (โ€œadminโ€, โ€œsupportโ€, โ€œtestโ€, โ€œbinโ€, โ€œmysqlโ€, et. al).
In conclusion, the data provided within this report, as well as through the GitHub repository, will allow
anyone to see the amount of probing attempts against unprotected devices may experience. As this
experiment was conducted for only 75 days (roughly 2.5 months), this demonstrates the intensity by
which these probes are performed.
This data is being released publicly in an attempt to provide further aware and understanding of the
magnitude of how bad it is for placing equipment directly onto the Internet without any form of
protection whatsoever. Please utilize the data as you see fit; however, we request that credentials be
given to โ€œInfracriticalโ€ should you utilize any or all of the data set.
This report may be found on SlideShare:
http://www.slideshare.net/BobRadvanovsky/project-ruggedtrax-findings-report-28nov2015
The supporting data may be found on GitHub:
https://github.com/infracritical/ruggedtrax
Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 8
Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future

More Related Content

What's hot

A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
SyedImranAliKazmi1
ย 

What's hot (20)

IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
ย 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
ย 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
ย 
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIntrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
ย 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
ย 
China Cyber
China CyberChina Cyber
China Cyber
ย 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
ย 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
ย 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
ย 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
ย 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
ย 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
ย 
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
ย 
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
ย 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
ย 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
ย 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
ย 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
ย 
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
ย 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
ย 

Viewers also liked (8)

ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat SheetICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ย 
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
ย 
PT - Siemens WinCC Flexible Security Hardening Guide
PT - Siemens WinCC Flexible Security Hardening GuidePT - Siemens WinCC Flexible Security Hardening Guide
PT - Siemens WinCC Flexible Security Hardening Guide
ย 
Acknowledgements
AcknowledgementsAcknowledgements
Acknowledgements
ย 
Acknowledgement
AcknowledgementAcknowledgement
Acknowledgement
ย 
Example of acknowledgment
Example of acknowledgmentExample of acknowledgment
Example of acknowledgment
ย 
Acknowledgement
AcknowledgementAcknowledgement
Acknowledgement
ย 
Acknowledgement
AcknowledgementAcknowledgement
Acknowledgement
ย 

Similar to Project RUGGEDTRAX Findings Report (28-Nov-2015)

Similar to Project RUGGEDTRAX Findings Report (28-Nov-2015) (20)

LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
ย 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
ย 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
ย 
Rain Technology.pptx
Rain Technology.pptxRain Technology.pptx
Rain Technology.pptx
ย 
Analysis of exposed ICS//SCADA/IoT systems in Europe
Analysis of exposed ICS//SCADA/IoT systems in EuropeAnalysis of exposed ICS//SCADA/IoT systems in Europe
Analysis of exposed ICS//SCADA/IoT systems in Europe
ย 
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
ย 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
ย 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
ย 
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in EuropeUPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
ย 
Final project report
Final project reportFinal project report
Final project report
ย 
Wi-Fi Controlled Car
Wi-Fi Controlled CarWi-Fi Controlled Car
Wi-Fi Controlled Car
ย 
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
ย 
IRJET- Development of a Multipurpose IoT based Energy & Remote Asset Monitori...
IRJET- Development of a Multipurpose IoT based Energy & Remote Asset Monitori...IRJET- Development of a Multipurpose IoT based Energy & Remote Asset Monitori...
IRJET- Development of a Multipurpose IoT based Energy & Remote Asset Monitori...
ย 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
ย 
Next Steps in the SDN/OpenFlow Network Innovation
Next Steps in the SDN/OpenFlow Network InnovationNext Steps in the SDN/OpenFlow Network Innovation
Next Steps in the SDN/OpenFlow Network Innovation
ย 
IRJET- IoT Enabled Smart Parking System
IRJET-  	  IoT Enabled Smart Parking SystemIRJET-  	  IoT Enabled Smart Parking System
IRJET- IoT Enabled Smart Parking System
ย 
IRJET- Electronic Notice Board Remotely Operated using Android Phone
IRJET-  	  Electronic Notice Board Remotely Operated using Android PhoneIRJET-  	  Electronic Notice Board Remotely Operated using Android Phone
IRJET- Electronic Notice Board Remotely Operated using Android Phone
ย 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
ย 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
ย 
Leandro Agrรฒ
Leandro AgrรฒLeandro Agrรฒ
Leandro Agrรฒ
ย 

More from Bob Radvanovsky (7)

CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'
ย 
U.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran MissionU.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran Mission
ย 
CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)
ย 
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
ย 
IANS-2008
IANS-2008IANS-2008
IANS-2008
ย 
ACS-2010
ACS-2010ACS-2010
ACS-2010
ย 
ABA-ISC-2009
ABA-ISC-2009ABA-ISC-2009
ABA-ISC-2009
ย 

Recently uploaded

Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
SUHANI PANDEY
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
SUHANI PANDEY
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
SUHANI PANDEY
ย 

Recently uploaded (20)

Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 

Project RUGGEDTRAX Findings Report (28-Nov-2015)

  • 1. This following findings report contains specific details of devices that are directly connected to the Internet that may be utilized for mission critical operations associated to one (or more) critical infrastructure sectors (and their respective industries). Information contained within this report should only be used for awareness purposes. This document is licensed under Creative Commons v4.0: http://creativecommons.org/licenses/by-nc/4.0 LEGAL DISCLAIMER Project RUGGTEDTRAX is a research project designed to observe and gather data used to provide some proof of any threats and risk associated with SCADA and industrial control system devices that appear to be directly connected to the Internet. The project is but one of several projects to raise public awareness of such devices that may impact one (or more) critical infrastructure sectors (and their respective industries), while demonstrating providing quantifiable proof of any impacts to these devices that are publicly accessible through the Internet. Project RUGGEDTRAX โ€“ Creative Commons v4.0: Attribution/Non-Commercial Use Page 1 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future Project RUGGEDTRAX SCADA/ICS Analysis Findings Report Based on intelligence gathered from an ICS device placed directly onto the Internet 14 Oct 2014 through 27 Dec 2014 28 Nov 2015
  • 2. Contact Information For more information about Project RUGGEDTRAX, please send correspondence to: Project RUGGEDTRAX Inquiries projectruggedtrax@infracritical.com Introduction This project is subset to Project SHINE (SHodan Intelligence Extraction), providing one example of what would happen if a device was to be directly connected to the Internet. At no point in time was this project intended to identify any shortcomings of the manufacturerโ€™s efforts in remediating any of the known vulnerabilities, nor was it intended to place any blame or negligence towards the manufacturer in any manner whatsoever. The choosing of the specific device was to provide a simplified example which could be easily demonstrated as a form of substantiation of our position provided through Project SHINE. It should be noted that the device utilized, has an out-of-date version of its firmware that is subject to one or more known vulnerabilities that currently exist. The manufacturer has taken steps previously to remediate those versions of firmware by providing updated versions; it is strongly suggested that any asset owners running this specific version of firmware update/upgrade to the latest version as a precautionary effort. Objective The objective of this project is to provide some form of substantiation that directly connecting an ICS device onto the Internet could have consequences. As such, the premise of this project was to: (1) Obtain current ICS equipment through public sources (eBay), and deploy this equipment as actual cyber assets controlling perceived critical infrastructure environments; (2) Ascertain any pertinent threat or attack vectors, as well as scope and magnitude of any attacks against the perceived critical infrastructure environments; (3) Record network access attempts, and analyze captured network packets for any patterns; and, (4) Report redacted findings for public awareness to governments and media outlets. Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 2 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
  • 3. Device Specifications The equipment chosen is a serial-to-Ethernet converter that has capabilities of controlling two (2) ICS devices utilizing either the MODBUS/TCP or DNP3 network protocols. The manufacturer is Siemens RuggedCom, and the device model is RS910, which is a 2-port serial-to- Ethernet converter that is DIN rail-mounted; a hardware diagram is shown below: . Figure 1. The device is running the firmware release level of version 3.8.0. This version of the firmware is susceptible to several publicly known vulnerabilities, including the factory backdoor vulnerability, in which an adversary may bypass security controls by executing an application to obtain administrative privileges through a generated factory account and password. This feature was previously available as a method of accessing the device should an asset owner administrator lose their administrative privileged access to any Siemens RuggedCom device, and has since been remediated by Siemens RuggedCom. Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 3 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
  • 4. Device Configuration The device can communicate using the following protocols: TELNET, Trivial FTP (TFTP), Remote Shell (RSH), Secure Shell (SSH), SNMP, HTTP/HTTPS, MODBUS/TCP and DNP3. After resetting the device to factory defaults, all protocols are enabled and available. The following protocols were disabled: TELNET, TFTP, RSH, SNMP, and MODBUS/TCP. The protocols HTTP/HTTPS and SSH are always required (outside of serial console), with minimal connectivity of at least ONE (1) allowed connection. NOTE: The DNP3 protocol cannot be disabled. The device was portrayed and configured as a water pump to a wellhead for a local municipality. In this case, the local government is Geneva, Illinois. The contact name is fictitious; any resemblance to any individuals with a similar name is entirely coincidental. A screen shot of the redacted web interface is shown below: 1 2 Figure 2. 1 The name โ€œRUGGEDCOMโ€, โ€œRugged Operating Systemโ€, and โ€œROSโ€ are copyright and registered trademarks of Siemens RuggedCom. 2 The name โ€œgoaheadโ€ and โ€œgoahead WEBSERVERโ€ are copyright Embedthis Software. Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 4 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
  • 5. The device was placed online 14-Oct-2014 (Tuesday), and taken out of service 27-Dec-2014 (Saturday). Once placed directly on the Internet, the device was monitored closely for any activity. For sake of brevity, this report was limited to 53 countries, identifying the most significant counted countries, top- to-bottom, left-to-right, which include the following: Country Count Percent Country Count Percent Country Count Percent China 125299 89.2424 France 3344 2.3817 United States 3247 2.3126 Germany 1794 1.2778 Korea 1602 1.141 Singapore 1576 1.122 Tunisia 509 0.363 Ukraine 327 0.233 Indonesia 253 0.180 Canada 220 0.157 Turkey 198 0.141 Italy 196 0.140 Japan 193 0.137 Poland 185 0.132 Netherlands 183 0.130 Lithuania 178 0.127 United Kingdom 159 0.113 Hong Kong 137 0.0.98 Russian Federation 105 0.075 Brazil 85 0.061 Vietnam 81 0.058 Sweden 76 0.054 Belarus 65 0.046 Austria 64 0.046 Taiwan 56 0.040 Panama 47 0.033 Peru 45 0.032 Mexico 44 0.031 Kazakhstan 25 0.018 Norway 17 0.012 Israel 12 0.009 Estonia 10 0.007 India 8 0.006 Hungary 7 0.005 Iran 7 0.005 Malaysia 7 0.005 Romania 7 0.005 Belgium 6 0.004 Moldova 6 0.004 Greece 3 0.002 Spain 3 0.002 Thailand 3 0.002 Australia 2 0.001 Kenya 2 0.001 Pakistan 2 0.001 Argentina 1 0.0007 Costa Rica 1 0.0007 Czech Republic 1 0.0007 Denmark 1 0.0007 Ecuador 1 0.0007 Ireland 1 0.007 Satellite Provider3 1 0.0007 Slovakia 1 0.0007 Table 1. The top-most country is highlighted in red; the remain 4 top-most countries are highlighted in yellow; of 100%, the 5 top-most countries represent 96.3555% or 135,286 out of 140,403 non-unique entries. 3 Based on the IP address, this belonged to an undisclosed satellite provider. Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 5 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
  • 6. Percentages With Chinese-based IP addresses representing 89.2424%; the next 4 countries representing 7.1131%; and the remaining 48 countries representing 3.6445%; out of a total of 53 countries. Counts With Chinese-based IP addresses represent 125,299 non-unique entries; the next 4 countries represent 9,987 non-unique entries; and remaining 48 countries representing 5,117 non-unique entries. Total count is 140,403 non-unique entries out of 140,430 total entries. The difference represents 27 erroneous entries (or 0.0192%) due to network connection retries. The margin of error is ยฑ3.04%. Graph (Country Count Distribution) The graph (shown below) demonstrates just how skewed the access attempts against the device were identified per country-based IP address(es). Please note that this does not infer that the country identified is representative of a nation-state sanctioned activity; merely, it is representative of the IP addresses correlated to a specific network address block for that country. Table 2. Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 6 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
  • 7. Graph (IP Network Address Count Distribution) The graph (shown below) shows the top 5 IP addresses that are part of the 140,403 count distribution, with a count of 12,112, representing 8.6266% of the total count. Of the 5 IP addresses identified, numbers 1, 3, 4 and 5 are from Chinese-based IP addresses; number 2 is from a French-based IP address. Identified as the following: China: 3044, 2258, 2175, and 2056. France: 2579. Table 3. The top 5 IP addresses are part of a total of 651 IP addresses, minus 3 IP addresses used for local and/or remote access during the packet capture and evaluation. Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 7 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future
  • 8. Conclusion Based on the data examined, it appears that the majority of the access attempts originated from IP addresses belong to the country of China. This does not mean nor infer that any of the access attempts were conducted by anyone from the Chinese nation, its government, or any organization based out of China. The originating IP addresses may be proxied in an effort to mask the originating IP address sources. It would be an assumption that these access attempts were directed primarily at a critical infrastructure specifically; however, this does not mean that such an attempted access could not exist. Majority of the attempts appear to be automated, with repetitive attempts several times within 1-2 seconds of each other, over the course of several minutes. The only exception would be accounts other than โ€œrootโ€, which appear to be manually attempted (โ€œadminโ€, โ€œsupportโ€, โ€œtestโ€, โ€œbinโ€, โ€œmysqlโ€, et. al). In conclusion, the data provided within this report, as well as through the GitHub repository, will allow anyone to see the amount of probing attempts against unprotected devices may experience. As this experiment was conducted for only 75 days (roughly 2.5 months), this demonstrates the intensity by which these probes are performed. This data is being released publicly in an attempt to provide further aware and understanding of the magnitude of how bad it is for placing equipment directly onto the Internet without any form of protection whatsoever. Please utilize the data as you see fit; however, we request that credentials be given to โ€œInfracriticalโ€ should you utilize any or all of the data set. This report may be found on SlideShare: http://www.slideshare.net/BobRadvanovsky/project-ruggedtrax-findings-report-28nov2015 The supporting data may be found on GitHub: https://github.com/infracritical/ruggedtrax Project RUGGEDTRAX - Creative Commons v4.0: Attribution/Non-Commercial Use Page 8 Findings Report โ€“ 28 Nov 2015 Infracritical โ€“ Your Infrastructure, Their Future