SlideShare a Scribd company logo
1 of 44
Who’s Really Attacking Your
#WHOAMI
• Threat Researcher at Trend Micro- research and blogger on criminal
underground, persistent threats, and vulnerabilities.
• Bachelor’s and Master’s in Computer Science. Currently pursuing PhD.
Normal security certifications, CISSP, GCIH, GCFE, etc…
• Research:
-Malware detection/reversing
-Persistent Threats (Malware based espionage)
-ICS/SCADA Security
-Vulnerabilities and the “Underground”
This presentation will focus on:
• Concerns/Overview of ICS Security
• How terrible the security profiles of ICS devices are
• Are ICS devices attacked?
• Who attacks ICS devices?
Agenda
• ICS Overview
• Typical ICS Deployment
• Overview of two SCADA protocols
• ICS Vulnerabilities
• SCADA on the Internet?
• Story Time!
• Findings
• Attacker Profile
• Recommendations
ICS Overview
What are ICS devices?
• Used in production of virtually anything
• Used in water, gas, energy, automobile
manufacturing, etc.
• Notoriously insecure…in every way
• Software is sometimes embedded, sometimes not
• Typically proprietary
TYPICAL ICS
DNP3
• Used to send and receive messages
• Complex
• No authentication or encryption
• Several published vulnerabilities
Modbus
• Oldest ICS Protocol
• Controls I/O Interfaces (MOSTLY!!!!)
• No authentication or encryption! (Surprise!!!)
• No broadcast suppression
• Vulnerabilities are published
Security Concerns- ICS vs.
Traditional IT Systems
ICS
• Productivity
• Up-time
• Reliability of data
IT
• Protect the data
• Protect comms
• Limit interruptions
ICS Vulnerabilities
• In 2012, 171 unique vulnerabilities affecting ICS products.
• 55 Vendors…
SCADA on the Internet???
• Google-fu
• Shodan
SCADA on the Internet???
• Pastebin
• ERIPP
• Twitter
Story Time!
• Small town in rural America
• Water pump controlling water
pressure/availability
• Population 18,000~
• WRONG!• WRONG!
Story Time!
• Water pressure system Internet facing
• No firewalls/security measures in place
• Could cause catastrophic water pressure
failures
• WRONG!• WRONG!
Story Time!
• Attacked several times…During Q3-Q4
• Attackers successfully gained access
• Has not been made public
• This is not a story…
• Real life event..
• WRONG!• WRONG!
Story Time!
This Happened.
• WRONG!
Story Time!
In my basement…
• WRONG!• WRONG!
Enter…Honeypots…
• WRONG!• WRONG!
Honeypot Overview
• Two low-interaction
• One high-interaction
• Ran for 28 days in total
• One Windows Server 08
• Two Ubuntu 12.04 Servers
What They See
• WRONG!• WRONG!
High-Interaction Architecture
• WRONG!• WRONG!
Low-Interaction Architecture
• WRONG!• WRONG!
Some Tools Used
Vulnerabilities Presented
“If you can ping it, you own it”
• SNMP vulns (read/write
SNMP, packet sniffing, IP spoofing)
• Authentication limitations
• Limits of Modbus/DNP3
authentication/encryption
• VxWorks Vulnerability (FTP)
• Open access for certain ICS
modifications- fan
speed, temperature, and utilization.
• WRONG!
What is an “attack”?
• ONLY attacks that were targeted
• ONLY attempted modification of pump system
(FTP, Telnet, etc.)
• ONLY attempted modification via Modbus/DNP3
• DoS/DDoS will be considered attacks
• WRONG!
Attack Profile Countries
US, 9
LAOS, 6
UK, 4
CHINA, 17
NETHERLANDS, 1
JAPAN, 1
BRAZIL, 2
POLAND, 1
VIETNAM, 1
RUSSIA, 3
PALESTINE, 1
CHILE, 1 CROATIA, 1 NORTH KOREA, 1
• Not Just IP’s
• WRON!
Attack Overview
0 2 4 6 8 10 12 14
Modification of CPU fan speed
Modbus traffic modification
Secured area access attempt
Modify pump pressure
Modify temperature output
Attempt to shutdown pump system
Vxworks exploitation attempt
Count
Count
Snort Findings
• Used Digital Bond’s Quickdraw SCADA Snort Rules
• Custom Snort Rules Created
1111006
Modbus TCP – Unauthorized Read Request to a PLC
1111007
Modbus TCP – Unauthorized Write Request to a PLC
1111206 / 11112061
DNP3 – Unauthorized Read Request to a PLC
1111207DNP3 – Unauthorized Write Request to a PLC
1111208
DNP3 – Unauthorized Miscellaneous Request to a PLC
• WRONG!• WRONG!
Spear Phished!
TO: CITYWORKX@<HOSTNAME OF OUR CITY>.COM
“ Hello sir, I am <name of city administrator> and would like
the attached statistics filled out and sent back to me. Kindly
Send me the doc and also advise if you have questions. Look
forward you hear from you soon
....Mr. <city administrator name> ”
• WRONG!• WRONG!
CityRequest.doc
• WRONG!• WRONG!
Malware
• CityRequest.doc
• File gh.exe dumps all local password hashes
– <gh.exe –w>
• File ai.exe shovels a shell back to a dump server.
– < ai.exe –d1 (Domain) –c1 (Compare IP) –s (Service) >
• Malware communicating to a drop/CnC server in China.
• exploiting CVE 2012-0158
• WRONG!• WRONG!
Execution
• WRONG!• WRONG!
Execution
• Upon execution of CityRequest.docx, files leaving the server
in question after 5 days.
– Fake VPN config file
– Network statistics dump
– SAM database dump
– Gain persistence via process migration
• Won’t execute on Office 2010.
• WRONG!• Monitors reg keys for value changes
• Creates guard pages
• Dropped PE files
• Communicates to C2 IP’s
• Creates files
• Creates fake document and opens it
Malware Features
Attack: Days 1-4
Attack: Days 5-17
Attack: Days 18-???
• WRONG!• WRONG!
• Chose most prevalent attacker(s)
• Profiled, poked, and researched who they were
• Malware was code-reuse
Targeted? Who Knows…
Attacker Profile
Motivation?
• Motivation is hard to establish…
Recommendations
• Disable Internet access to your trusted resources. Where possible.
• Maintain your trusted resources at the latest patch levels, and
ensure you are diligent in monitoring when new patches/fixes are
released.
• Require username/password (two-factor if possible) combinations
for all systems, including those that are not deemed “trusted”.
• Control contractor access- Many SCADA/ICS networks utilize
remote contractors, and controlling how they access trusted
resources is imperative.
Recommendations
• Utilize SSL/TLS for all communications to web-based ICS/SCADA
systems.
• Control access to trusted devices. For instance, for access to a
segmented network, use a bastion host with ACL’s for
ingress/egress access.
• Improve logging on trusted environments, in addition to passing
logs to SIEM devices for third party backup/analysis.
• Utilize Zones- such as “BLAN”, “WLAN”, and “SCADA”.
• Develop a threat modeling system to your organization-
understand who’s attacking you, and why.
REMEMBER:
• These attacks are happening… In the USA, and many other places…
Shout
Twitter: @lowcalspam
Email: kyle_wilhoit@trendmicro.com
Non-Work: kylewilhoit@gmail.com
Please complete the speaker feedback surveys! (m.blackhat.com)

More Related Content

What's hot

Threat hunting in_windows
Threat hunting in_windowsThreat hunting in_windows
Threat hunting in_windowsChung Wee Jing
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud XiaoShakacon
 
Loggin alerting and hunting technology hub 2016
Loggin alerting and hunting   technology hub 2016Loggin alerting and hunting   technology hub 2016
Loggin alerting and hunting technology hub 2016Scot Berner
 
To see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoSTo see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoSMarco Gioanola
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
Ch 7: Attacking Session Management
Ch 7: Attacking Session ManagementCh 7: Attacking Session Management
Ch 7: Attacking Session ManagementSam Bowne
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug huntingKirill Ermakov
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Microwaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloudMicrowaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your clouddlapiduz
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsdrewz lin
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCanSecWest
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15Benjamin D. Brooks, CISSP
 
Positive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsPositive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsMona Arkhipova
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...APNIC
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Hykeos
 

What's hot (20)

Threat hunting in_windows
Threat hunting in_windowsThreat hunting in_windows
Threat hunting in_windows
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Loggin alerting and hunting technology hub 2016
Loggin alerting and hunting   technology hub 2016Loggin alerting and hunting   technology hub 2016
Loggin alerting and hunting technology hub 2016
 
To see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoSTo see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoS
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Ch 7: Attacking Session Management
Ch 7: Attacking Session ManagementCh 7: Attacking Session Management
Ch 7: Attacking Session Management
 
Cryptography
CryptographyCryptography
Cryptography
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug hunting
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Microwaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloudMicrowaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloud
 
Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
 
IoT Key Elements
IoT Key ElementsIoT Key Elements
IoT Key Elements
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
 
IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15IMA - Anatomy of an Attack - Presentation- 28Aug15
IMA - Anatomy of an Attack - Presentation- 28Aug15
 
Positive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsPositive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсs
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
 

Viewers also liked

Attacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsAttacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsMike Spaulding
 
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemSafety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemAleksandr Timorin
 
Techniques of attacking ICS systems
Techniques of attacking ICS systems Techniques of attacking ICS systems
Techniques of attacking ICS systems qqlan
 
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]RootedCON
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104pgmaynard
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...arnaudsoullie
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAleksandr Timorin
 

Viewers also liked (7)

Attacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsAttacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty Years
 
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemSafety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical System
 
Techniques of attacking ICS systems
Techniques of attacking ICS systems Techniques of attacking ICS systems
Techniques of attacking ICS systems
 
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
 

Similar to Bh europe 2013_wilhoit

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Network security basics
Network security basicsNetwork security basics
Network security basicsSkillspire LLC
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud SecuritySBWebinars
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39Bilal Ahmed
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the CloudTeri Radichel
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessCalyptix Security
 

Similar to Bh europe 2013_wilhoit (20)

Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Web security
Web securityWeb security
Web security
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39CS101- Introduction to Computing- Lecture 39
CS101- Introduction to Computing- Lecture 39
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT business
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Bh europe 2013_wilhoit

  • 2. #WHOAMI • Threat Researcher at Trend Micro- research and blogger on criminal underground, persistent threats, and vulnerabilities. • Bachelor’s and Master’s in Computer Science. Currently pursuing PhD. Normal security certifications, CISSP, GCIH, GCFE, etc… • Research: -Malware detection/reversing -Persistent Threats (Malware based espionage) -ICS/SCADA Security -Vulnerabilities and the “Underground”
  • 3. This presentation will focus on: • Concerns/Overview of ICS Security • How terrible the security profiles of ICS devices are • Are ICS devices attacked? • Who attacks ICS devices?
  • 4. Agenda • ICS Overview • Typical ICS Deployment • Overview of two SCADA protocols • ICS Vulnerabilities • SCADA on the Internet? • Story Time! • Findings • Attacker Profile • Recommendations
  • 5. ICS Overview What are ICS devices? • Used in production of virtually anything • Used in water, gas, energy, automobile manufacturing, etc. • Notoriously insecure…in every way • Software is sometimes embedded, sometimes not • Typically proprietary
  • 7. DNP3 • Used to send and receive messages • Complex • No authentication or encryption • Several published vulnerabilities
  • 8. Modbus • Oldest ICS Protocol • Controls I/O Interfaces (MOSTLY!!!!) • No authentication or encryption! (Surprise!!!) • No broadcast suppression • Vulnerabilities are published
  • 9. Security Concerns- ICS vs. Traditional IT Systems ICS • Productivity • Up-time • Reliability of data IT • Protect the data • Protect comms • Limit interruptions
  • 10. ICS Vulnerabilities • In 2012, 171 unique vulnerabilities affecting ICS products. • 55 Vendors…
  • 11. SCADA on the Internet??? • Google-fu • Shodan
  • 12. SCADA on the Internet??? • Pastebin • ERIPP • Twitter
  • 13. Story Time! • Small town in rural America • Water pump controlling water pressure/availability • Population 18,000~
  • 14. • WRONG!• WRONG! Story Time! • Water pressure system Internet facing • No firewalls/security measures in place • Could cause catastrophic water pressure failures
  • 15. • WRONG!• WRONG! Story Time! • Attacked several times…During Q3-Q4 • Attackers successfully gained access • Has not been made public • This is not a story… • Real life event..
  • 16. • WRONG!• WRONG! Story Time! This Happened.
  • 17. • WRONG! Story Time! In my basement…
  • 19. • WRONG!• WRONG! Honeypot Overview • Two low-interaction • One high-interaction • Ran for 28 days in total • One Windows Server 08 • Two Ubuntu 12.04 Servers
  • 24. Vulnerabilities Presented “If you can ping it, you own it” • SNMP vulns (read/write SNMP, packet sniffing, IP spoofing) • Authentication limitations • Limits of Modbus/DNP3 authentication/encryption • VxWorks Vulnerability (FTP) • Open access for certain ICS modifications- fan speed, temperature, and utilization.
  • 25. • WRONG! What is an “attack”? • ONLY attacks that were targeted • ONLY attempted modification of pump system (FTP, Telnet, etc.) • ONLY attempted modification via Modbus/DNP3 • DoS/DDoS will be considered attacks
  • 26. • WRONG! Attack Profile Countries US, 9 LAOS, 6 UK, 4 CHINA, 17 NETHERLANDS, 1 JAPAN, 1 BRAZIL, 2 POLAND, 1 VIETNAM, 1 RUSSIA, 3 PALESTINE, 1 CHILE, 1 CROATIA, 1 NORTH KOREA, 1 • Not Just IP’s
  • 27. • WRON! Attack Overview 0 2 4 6 8 10 12 14 Modification of CPU fan speed Modbus traffic modification Secured area access attempt Modify pump pressure Modify temperature output Attempt to shutdown pump system Vxworks exploitation attempt Count Count
  • 28. Snort Findings • Used Digital Bond’s Quickdraw SCADA Snort Rules • Custom Snort Rules Created 1111006 Modbus TCP – Unauthorized Read Request to a PLC 1111007 Modbus TCP – Unauthorized Write Request to a PLC 1111206 / 11112061 DNP3 – Unauthorized Read Request to a PLC 1111207DNP3 – Unauthorized Write Request to a PLC 1111208 DNP3 – Unauthorized Miscellaneous Request to a PLC
  • 29. • WRONG!• WRONG! Spear Phished! TO: CITYWORKX@<HOSTNAME OF OUR CITY>.COM “ Hello sir, I am <name of city administrator> and would like the attached statistics filled out and sent back to me. Kindly Send me the doc and also advise if you have questions. Look forward you hear from you soon ....Mr. <city administrator name> ”
  • 31. • WRONG!• WRONG! Malware • CityRequest.doc • File gh.exe dumps all local password hashes – <gh.exe –w> • File ai.exe shovels a shell back to a dump server. – < ai.exe –d1 (Domain) –c1 (Compare IP) –s (Service) > • Malware communicating to a drop/CnC server in China. • exploiting CVE 2012-0158
  • 33. • WRONG!• WRONG! Execution • Upon execution of CityRequest.docx, files leaving the server in question after 5 days. – Fake VPN config file – Network statistics dump – SAM database dump – Gain persistence via process migration • Won’t execute on Office 2010.
  • 34. • WRONG!• Monitors reg keys for value changes • Creates guard pages • Dropped PE files • Communicates to C2 IP’s • Creates files • Creates fake document and opens it Malware Features
  • 38. • WRONG!• WRONG! • Chose most prevalent attacker(s) • Profiled, poked, and researched who they were • Malware was code-reuse Targeted? Who Knows… Attacker Profile
  • 39. Motivation? • Motivation is hard to establish…
  • 40.
  • 41. Recommendations • Disable Internet access to your trusted resources. Where possible. • Maintain your trusted resources at the latest patch levels, and ensure you are diligent in monitoring when new patches/fixes are released. • Require username/password (two-factor if possible) combinations for all systems, including those that are not deemed “trusted”. • Control contractor access- Many SCADA/ICS networks utilize remote contractors, and controlling how they access trusted resources is imperative.
  • 42. Recommendations • Utilize SSL/TLS for all communications to web-based ICS/SCADA systems. • Control access to trusted devices. For instance, for access to a segmented network, use a bastion host with ACL’s for ingress/egress access. • Improve logging on trusted environments, in addition to passing logs to SIEM devices for third party backup/analysis. • Utilize Zones- such as “BLAN”, “WLAN”, and “SCADA”. • Develop a threat modeling system to your organization- understand who’s attacking you, and why.
  • 43. REMEMBER: • These attacks are happening… In the USA, and many other places…
  • 44. Shout Twitter: @lowcalspam Email: kyle_wilhoit@trendmicro.com Non-Work: kylewilhoit@gmail.com Please complete the speaker feedback surveys! (m.blackhat.com)

Editor's Notes

  1. today I&apos;m going to be talking about who&apos;s really attacking your ICS devices. There is a lot of hype about ICS devices, and are they attacked, and I felt this needed more research to prove or disprove the data behind this. This talk isn’t going to cover 0-days of ICS devices, nor is it going to cover some new tool to exploit ICS devices- it’s to cover who’s really attacking your ICS devices. Before we get started, I&apos;m going to share a little bit about who I am.
  2. I’m part of a team called “Future Threat Research”. We look at threats from the current to five years out.
  3. -Likewise, I will also be discussing the security profiles of ICS, and how terrible they are.-In addition, I will cover how ICS devices are traditionally attacked, and who would usually do the attacking.
  4. Before we get started on our talk today, let&apos;s quickly cover what I&apos;m going to discuss. This is a full talk, so we&apos;re going to have breeze through these slides quickly- covering a lot of topics in a short period of time.A.) First, were going to cover what in the hell ICS devices are, and where they are used.B.)Second, I&apos;m going to give an overview of the two most widely used SCADA protocols- Modbus and DNP3.
  5. So…what are ICS devices? Typically proprietary based on manufacturer/function!!!!
  6. This is a typical ICS deployment. A few things to take note of here:A.) The SCADA network sits on top, under &quot;Supervisory Network&quot; You would typically see these in office locations of a mining site for instance.B.) The Control networks sit below, labled &quot;Control systems&quot;. These control systems are typically found in remote areas of an industrial site, and can seen as controllers on an assembly belt for instance.C.) There are no security devies anywhere to be found. THIS IS TYPICAL!!!!TYPICAL ICS DEVICES HAVE NO SECURITY WHATSOEVER.
  7. The assumption exists that DNP3 traffic comes from the same subnet…TRUST FLAW!!!!!!!!!!!A DNP3 frame consists of a header and data section. The header specifies the frame size, contains data link control information and identifies the DNP3 source and destination device addresses. The data section is commonly called the payload and contains data passed down from the layers above. The assumption exists that DNP3 traffic comes from the same subnet…TRUST FLAW!!!!!!!!!!!A DNP3 frame consists of a header and data section. The header specifies the frame size, contains data link control information and identifies the DNP3 source and destination device addresses. The data section is commonly called the payload and contains data passed down from the layers above.
  8. Used to read/write input/output interfaces. Very simple and usage is limited in nature.
  9. 26% of incidents revolved around Internet-facing and Water…
  10. -Many ICS devices are Internet facing, and have VERY little security-Target Rich environment-THESE DEVICES THAT ARE INTERNET FACING BRING ME TO OUR STORY TIME.
  11. ----- Meeting Notes (3/8/13 16:08) -----Recent water plant in IL FOR INSTANCE
  12. This is where the presentation gets fun. I’m not going to talk about how I exploited a vulnerability in an ICS or SCADA device, nor am I going to talk about a zero-day affecting SCADA devices. What I’m going to do is share a story about a small town in rural Missouri, in the US.
  13. -THE HONEYPOT ARCHITECTURE IS FAIRLY STRAIGHT FORWARD, I USED TWO LOW-…-YOU SEE IN TEH SCREENSHOTS THAT THE FIELDS ARE IDENTICLE TO WHAT YOU WOULD SEE IN A TRADITIONAL ICS DEVICE CONTROL PAGE.
  14. WHAT THESE ATTACKERS SEE IS WHAT AN ATTACKER WOULD SEE IN A TRADITIONAL ICS SETUP. HAVING PEN TESTED ICS/SCADA ENVIRONMENTS, I REPLICATED THIS HONEYPOT ARCHITECTURE TO DIRECTLY MIMIC COMMONLY FOUND ICS DEVICE DEPLOYMENTS.EXTERNAL IP COULD BE CONSIDERED “HMI”PLC IS WHAT DIRECTLY MIMCS THE WATER PRESSURE PLANT.
  15. THESE ADMINSTRATIVE FUNCTIONS WOULD BE CONSIDERED MODBUS AND DNP3.THESE SALTED DOCUMENTS ARE WHAT YOU WOULD TRADITIONALLY FIND ON ICS BOXES…SUCH AS ENGINEERING DOCUMENTS, GEO SPATIAL INFORMATION, LOAD CONTROL DOCUMENTS, ETC.
  16. THIS HONEYWALL ALLOWS US TO DO SEVERAL THINGS. FIRST, IT ALLOWS US TO PASS TRAFFIC TO TWO DIFFERENT AMAZON EC2 INSTANCES, THAT MAY NOT BE LOGICALLY OR PHYSICALLY CONNECTED.Again, “External IP” would be considered the HMI. (Human Machine Interface)SECOND, IT ALLOWS TO HAVE A SECONDARY POINT OF LOGGING SHOULD THE ATTACKER GAIN ACCESS
  17. Snort (Digital Bond Modbus TCP Rules)]BeEFDionaneaTcpdumpHoneydNano-10Siemens SIMATIC S7-1200 CPU 1212CDell DL360Amazon EC2SMTPSalted sample data
  18. AUTHENTICATION LIMITATIONS- WE SET THE USERNAME/PASSWORD MORE COMPLEX THEN ADMIN/ADMIN TO ENSURE WE WERE SEEING WHAT WE CONSIDERED &quot;TARGETED&quot; ATTACKS. WE WERE REALLY ONLY INTERESTED IN &quot;TARGETED ATTACKS&quot;
  19. Not port scans, or non-targeted attacks.Not automated attacksNot drive-byWE ARE ONLY CONCERNED WITH TARGETED ATTACKS AGAINST ICS DEVICES. WE SAW MULTIPLE ATTACK ATTEMPTS VIA THE STANDARD DRIVE-BY&apos;S AND AUTOMATED ATTACKS, Think of these classifications:Information DisclosureCommunications WeaknessAccess Control and Permission ErrorsConfiguration ErrorsInput Validation Errors
  20. 49 attacks in total. 17 were considered “catastrophic” the rest were considered “attacks” that “could” cause massive issues.1.) CHINA2.) USA3.) LAOSAN INTERESTING COUNTRY OF ATTACK ORGIN: NORTH KOREA - MORE INFORMATION ON THAT IN A SECOND
  21. THERE WAS A LOT OF ATTACKERS INTERESTED IN NOT PROVIDING WATER TO THE PEOPLE OF ARNOLD DURING OUR TESTING.ALSO INTERESTED IN HAVING PEOPLE DRINK WARM WATER. (NORTH KOREA- MODBUS TRAFFIC MOD)----- Meeting Notes (3/8/13 16:08) -----Authenticated realm- PUMP SYSTEM AND TEMP OUTPUT
  22. Custom rules created for SCADA controllers, vulnerabilities, and protocols. Highly effective for low-interaction honeypots. In addition, it works well for high-interaction honeypots.----- Meeting Notes (3/5/13 13:17) -----DIRECT MODIFICATIONS TO MODBUS AND DNP3. THESE WOULD BE CONSIDERED THE MOST TARGETED OF ALL ATTACKS WE SAW DURING OUR TESTING PERIOD.AS IF ALL THAT INFORMATION ISN&apos;T INTERESTING ENOUGH, IT&apos;S ABOUT TO GET EVEN MORE INTERESTING.
  23. IT GOT WEIRD WHEN I CHECKED OUR EMAIL AT CITYWORKX@&lt;HOSTNAME OF OUR CITY&gt;.COMHAD AN ATTACHMENT, NAMED CITYREQUEST.DOC
  24. Document dropped two PE files- gh.exe and ai.exeNOTE (NOT TO DISCLOSE): THIS IS COMMENT CREW HACKSFASE. CONFIRMED.
  25. Will execute on Office 03/07 with various Service Packs
  26. -Mutexes created-process migration-IOC’s available
  27. Attacker days 1-4
  28. Attacker days 5-17
  29. Just a super sweet venn to show “WHO” could be interested in pwnage of water goodness.