SlideShare a Scribd company logo
1 of 23
Download to read offline
Project SHINE
[UPDATED] Findings Report Results
Bob Radvanovsky, CIFI, CISM, CIPS
rsradvan@infracritical.com
Jake Brodsky, PE
jbrodsky@infracritical.com
1
10th SANS ICS Security Summit, Orlando, FL, February 23-24, 2015
Project SHINE (SHodan INtelligence Extraction)
Tuesday, February 24, 2015
SHodan INtelligence Extraction
• Project SHINE was dependent upon SHODAN search engine;
• SHODAN incepted circa 2008;
• SHINE development started mid-2008, ended 31-Jan-2014;
• Question raised: Are industrial control systems directly
exposed to the Internet?
• No one appeared to know the magnitude of the issue,
or how widespread the issue was; and,
• In doing so, this was how Project “SHINE” got started...
2
Project SHINE
Mission Objectives
● To selectively perform searches from definable, searchable
term criteria sets using open intelligence sources;
● To correlate data into meaningful, abstractive and relevant
data that could be utilized to demonstrate further trending
and/or correlation analysis based on the data given;
● To seek a baseline of how many control systems’ devices exist
on the Internet (as of the conclusion of Project SHINE on 31-
Jan-2014, we were unable to establish a baseline); and,
● To raise public awareness via governments & media outlets.
3
Data Artifacts
● The crux of this project was choosing suitable, meaningful
search terms that identified control systems devices;
● The project was looking for not just control systems, but also
any infrastructure supporting it, such as HVAC systems, serial
converters, etc.;
● There were matches not related to actual infrastructure;
● Some units were not counted as some manufacturers’ names
changed as firms were bought and sold; and,
● Other devices may have been spuriously counted as similar
software may have been used by multiple manufacturers.
4
Types of Devices Discovered
5
• Traditional SCADA/ICS
 RTU Systems
 PLC Systems
 IEDs/Sensory Equipment
 SCADA/HMI Servers
 Building Automation
 Medical Devices (DAS)
• Non-Traditional SCADA/ICS
 Intelligent Traffic Control
 Automotive Control
 Traffic/Lighting Control
 HVAC/Environment Control
 Power Regulators/UPS
 Security/Access Control
 Serial Port Servers
 Data Radios
 Mining Equipment
 Traffic Cameras
Manufacturer Results
6
927
total number of
search terms
886
unique number
of search terms;
traditional and
non-traditional
578
unique number
of search terms;
non-traditional
removed
207
total number of
manufacturers
182
unique number
of traditional
manufacturers
41
total search term difference;
traditional and non-traditional
349
total search
term difference;
non-traditional
removed
25
total manufacturer difference
Top 11 Manufacturers
7
Manufacturer Count % Out of 100%
ENERGYICT 106235 18.10%
SIEMENS 84328 14.37%
MOXA 78309 13.34%
LANTRONIX 56239 9.58%
NIAGARA 54437 9.27%
GOAHEAD-WEB 42473 7.24%
VXWORKS 34759 5.92%
INTOTO 34686 5.91%
ALLIED-TELESYS 34573 5.89%
DIGI INTERNATIONAL 30557 5.21%
EMBEDTHIS-WEB 30381 5.17%
The devices found
estimated at
586,997, approx.
26.84% of total
2,186,971 devices
Top 16 HVAC/BACNet Manufacturers
8
The devices found
estimated at
13,475, approx.
0.62% of total
2,186,971 devices
Manufacturer Count % Out of 100%
HEATMISER 6487 48.13%
HONEYWELL 3588 26.63%
YORK 921 6.83%
BACNET INTERNATIONAL 560 4.16%
TRANE 506 3.76%
JOHNSON CONTROLS 460 3.41%
CARRIER 234 1.74%
TEMPERATURE GUARD 180 1.34%
LG ELECTRONICS 145 1.08%
LIEBERT 126 0.94%
CENTRALINE 81 0.60%
STULZ 77 0.57%
CONTROL4 38 0.28%
BOSCH AUTOMATION 37 0.27%
LENNOX 24 0.18%
CUMMINGS 11 0.08%
Top 6 Serial->Ethernet Manufacturers
9
The devices found
estimated at
204,416, approx.
9.35% of total
2,186,971 devices
Manufacturer Count % Out of 100%
MOXA 78309 38.31%
LANTRONIX 56239 27.51%
ALLIED TELESYS 34573 16.91%
DIGI INTERNATIONAL 30557 14.95%
ATOP SYSTEMS 3846 1.88%
MULTITECH SYSTEMS 892 0.44%
Example: MODBUS
10
Create a search
entry, and look
for MODBUS
devices
Search string would be:
http://www.shodanhq.com/search?q=modbus
Example: MODBUS
11
If searched on Google,
this device is…
HTTP/1.0 401 Unauthorized
Date: Thu, 18 Sep 2008 16:06:08 GMT
Server: Boa/0.93.15
Connection: close
WWW-Authenticate: Basic
realm="ModbusGW"
Content-Type: text/html
Returned HTTP header information from
one of the sites searched by SHODAN;
the detail information to that entry looks
like this…
Search Terms Found (Per Day)
12
0
50
100
150
200
250
300
350
400
450
500
14-Apr-2012
31-Jan-2014
654 days
Max Search Terms Found = 469 (out of 927)
Total Counts(Per Day)
13
14-Apr-2012
31-Jan-2014
654 days
0
2000
4000
6000
8000
10000
12000
14000
16000
Max Total Count = 13498
Counts by Country
14
Project RUGGEDTRAX
Mission Objectives
• To provide substantiation that directly connecting an ICS device
onto the Internet could have consequences;
• Obtain current ICS equipment through public sources (eBay), and
deploy equipment as actual cyber assets controlling perceived
critical infrastructure environments;
• Ascertain any pertinent threat/attack vectors, and magnitude of any
attacks against perceived critical infrastructure environments;
• Record access attempts, analyze network packets for patterns; and,
• Report redacted public awareness to governments & media outlets.
15
Device Specifications
● Serial->Ethernet converter
● Two-ports; supports both
MODBUS/TCP and DNP3
● Device is Siemens
RuggedCom RS910
● Firmware is v3.8.0
● Device connected directly
to Internet (NO FIREWALL)
● Supports: TELNET, TFTP,
RSH, SSH, SNMP,
HTTP/HTTPS, MODBUS/TCP
and DNP3
16
Device Configuration
● Disabled TELNET, TFTP, RSH,
SNMP and MODBUS/TCP
● SSH and HTTP/HTTPS
limited to ONE connection
● DNP3 cannot be disabled
● Device may be connected
via network (SSH), web
(HTTP/HTTPS), or serial
(console)
17
Project RUGGEDTRAX
Statistical Results
• Devices acquired from eBay were not properly “cleaned”, but were
“lobotomized” ; contained “residual data” from previous owner:
– Configuration information
– IP address and pertinent networking information
– Contact information
• Device placed online 13-Oct-2014 (Monday) @ 1917 hrs CDT
• First attack begins 13-Oct-2014 @ 2104 hrs CDT (< 2 hrs after incept)
• Device appears on SHODAN 15-Oct-2014 (Wednesday) @ 1229 hrs CDT
• Project concluded 27-Dec-2014 @ 1021 hrs CDT
• Total count of access attempts: 140,430 (from 651 IPs)
• Top country counted: China @ 125,299 (or 89.23%) (from 269 IPs)
18
Flaws and Potential Errors
• Countries identified do not implicate any specific nationality;
• IP addresses are based on country assignment -- nothing else;
• IP addresses may be:
– Falsified
– Spoofed
– Proxied, or
– Black-holed
• Unknown if human or “robot” attacking the device, although
it is highly probable that it is predominately automated
19
Project RUGGEDTRAX
Top 4 Countries
20
China 92.17% (60,318)
United States 1.44%
(945)
Germany 1.74% (1136)
France 4.65%
(3044)
Countries found
represent Top 50
entries of access
attempts of approx.
65,443 attempts,
of 140,430 attempts,
or approx. 46.60%
47 entries
1 entry per
country
Conclusion
● New legislation is needed to curb this behavior;
● Industry practices need to be modified;
● Diagnostic practices and configuration management schemes
need to improve dramatically;
● Sites may technically be in compliance with regulations --
only because the asset owners may have no idea that they
really are exposed; and,
● The community must get past this terrible practice of
compliance-based security and focus instead on an attitude
of safety, vigilance, and performance awareness.
21
Useful Information
• Project SHINE Findings Report [1 Oct 2014]:
– http://01m.us/l/ltjify8p2a1r
• Project RUGGEDTRAX Preliminary Report [21 Oct 2014]:
– http://01m.us/l/gltlhotyw69j
• Quantitatively Assessing and Visualising Industrial System
Attack Surfaces, Eireann Leverett [Jun 2011]:
– http://01m.us/l/hsjlqz
• 10th SANS ICS Security Summit Presentation [24 Feb 2015]:
– http://01m.us/l/72ikss
22
Questions?
Bob Radvanovsky, (630) 673-7740
rsradvan@infracritical.com
Jake Brodsky, (443) 285-3514
jbrodsky@infracritical.com

More Related Content

What's hot

47 убеждений по поводу денег
47 убеждений по поводу денег47 убеждений по поводу денег
47 убеждений по поводу денегСергей Калинин
 
Download - Cerimônia
Download - CerimôniaDownload - Cerimônia
Download - CerimôniaAPaC Elo 2
 
Icebreaker questions-for-small-groups
Icebreaker questions-for-small-groupsIcebreaker questions-for-small-groups
Icebreaker questions-for-small-groupsHarsha MV
 
História dos desbravadores
História dos desbravadoresHistória dos desbravadores
História dos desbravadoresIsmael Rosa
 
ბლოგის პრეზენტაცია (1)
ბლოგის პრეზენტაცია (1)ბლოგის პრეზენტაცია (1)
ბლოგის პრეზენტაცია (1)MariDjabbarovaa
 
Apostila _secretaria_da_igreja
Apostila  _secretaria_da_igrejaApostila  _secretaria_da_igreja
Apostila _secretaria_da_igrejaBispoAlberto
 
Biblia sagrada joao ferreira de almeida
Biblia sagrada   joao ferreira de almeidaBiblia sagrada   joao ferreira de almeida
Biblia sagrada joao ferreira de almeidazeusmorfeu
 
ნაადრევი ქორწინება.
ნაადრევი ქორწინება.ნაადრევი ქორწინება.
ნაადრევი ქორწინება.MariDjabbarovaa
 
A Páscoa em outros países do mundo
A Páscoa em outros países do mundoA Páscoa em outros países do mundo
A Páscoa em outros países do mundoANDRÉA LEMOS
 
Історія Української вишиванки.pptx
Історія Української вишиванки.pptxІсторія Української вишиванки.pptx
Історія Української вишиванки.pptxVasylKishlar
 
Портфоліо майстра виробничого навчання Гусевик Алли Василівни
Портфоліо майстра виробничого навчання Гусевик Алли ВасилівниПортфоліо майстра виробничого навчання Гусевик Алли Василівни
Портфоліо майстра виробничого навчання Гусевик Алли ВасилівниOlga Poslovska
 

What's hot (12)

47 убеждений по поводу денег
47 убеждений по поводу денег47 убеждений по поводу денег
47 убеждений по поводу денег
 
Download - Cerimônia
Download - CerimôniaDownload - Cerimônia
Download - Cerimônia
 
Icebreaker questions-for-small-groups
Icebreaker questions-for-small-groupsIcebreaker questions-for-small-groups
Icebreaker questions-for-small-groups
 
História dos desbravadores
História dos desbravadoresHistória dos desbravadores
História dos desbravadores
 
ბლოგის პრეზენტაცია (1)
ბლოგის პრეზენტაცია (1)ბლოგის პრეზენტაცია (1)
ბლოგის პრეზენტაცია (1)
 
Apostila _secretaria_da_igreja
Apostila  _secretaria_da_igrejaApostila  _secretaria_da_igreja
Apostila _secretaria_da_igreja
 
Manual especialidades scouts Peru
Manual especialidades scouts PeruManual especialidades scouts Peru
Manual especialidades scouts Peru
 
Biblia sagrada joao ferreira de almeida
Biblia sagrada   joao ferreira de almeidaBiblia sagrada   joao ferreira de almeida
Biblia sagrada joao ferreira de almeida
 
ნაადრევი ქორწინება.
ნაადრევი ქორწინება.ნაადრევი ქორწინება.
ნაადრევი ქორწინება.
 
A Páscoa em outros países do mundo
A Páscoa em outros países do mundoA Páscoa em outros países do mundo
A Páscoa em outros países do mundo
 
Історія Української вишиванки.pptx
Історія Української вишиванки.pptxІсторія Української вишиванки.pptx
Історія Української вишиванки.pptx
 
Портфоліо майстра виробничого навчання Гусевик Алли Василівни
Портфоліо майстра виробничого навчання Гусевик Алли ВасилівниПортфоліо майстра виробничого навчання Гусевик Алли Василівни
Портфоліо майстра виробничого навчання Гусевик Алли Василівни
 

Similar to 10th SANS ICS Security Summit Project SHINE Presentation

CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackersShawn Wells
 
Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?BalaBit
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security IntelligenceSplunk
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...Priyanka Aash
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...TI Safe
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Amazon Web Services
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldAgile Testing Alliance
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Robert Greer
 
Check Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriCheck Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriAnthony Scudieri
 
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE - ATT&CKcon
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using BlockchainIRJET Journal
 

Similar to 10th SANS ICS Security Summit Project SHINE Presentation (20)

CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real World
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)
 
Check Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriCheck Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, Scudieri
 
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
 

More from Bob Radvanovsky

Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Bob Radvanovsky
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Bob Radvanovsky
 
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...Bob Radvanovsky
 
CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'Bob Radvanovsky
 
U.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran MissionU.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran MissionBob Radvanovsky
 
CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)Bob Radvanovsky
 
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)Bob Radvanovsky
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Bob Radvanovsky
 

More from Bob Radvanovsky (11)

Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)
 
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
 
CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'
 
U.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran MissionU.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran Mission
 
CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)
 
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)
 
IANS-2008
IANS-2008IANS-2008
IANS-2008
 
ACS-2010
ACS-2010ACS-2010
ACS-2010
 
ABA-ISC-2009
ABA-ISC-2009ABA-ISC-2009
ABA-ISC-2009
 

Recently uploaded

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 

Recently uploaded (20)

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 

10th SANS ICS Security Summit Project SHINE Presentation

  • 1. Project SHINE [UPDATED] Findings Report Results Bob Radvanovsky, CIFI, CISM, CIPS rsradvan@infracritical.com Jake Brodsky, PE jbrodsky@infracritical.com 1 10th SANS ICS Security Summit, Orlando, FL, February 23-24, 2015 Project SHINE (SHodan INtelligence Extraction) Tuesday, February 24, 2015
  • 2. SHodan INtelligence Extraction • Project SHINE was dependent upon SHODAN search engine; • SHODAN incepted circa 2008; • SHINE development started mid-2008, ended 31-Jan-2014; • Question raised: Are industrial control systems directly exposed to the Internet? • No one appeared to know the magnitude of the issue, or how widespread the issue was; and, • In doing so, this was how Project “SHINE” got started... 2
  • 3. Project SHINE Mission Objectives ● To selectively perform searches from definable, searchable term criteria sets using open intelligence sources; ● To correlate data into meaningful, abstractive and relevant data that could be utilized to demonstrate further trending and/or correlation analysis based on the data given; ● To seek a baseline of how many control systems’ devices exist on the Internet (as of the conclusion of Project SHINE on 31- Jan-2014, we were unable to establish a baseline); and, ● To raise public awareness via governments & media outlets. 3
  • 4. Data Artifacts ● The crux of this project was choosing suitable, meaningful search terms that identified control systems devices; ● The project was looking for not just control systems, but also any infrastructure supporting it, such as HVAC systems, serial converters, etc.; ● There were matches not related to actual infrastructure; ● Some units were not counted as some manufacturers’ names changed as firms were bought and sold; and, ● Other devices may have been spuriously counted as similar software may have been used by multiple manufacturers. 4
  • 5. Types of Devices Discovered 5 • Traditional SCADA/ICS  RTU Systems  PLC Systems  IEDs/Sensory Equipment  SCADA/HMI Servers  Building Automation  Medical Devices (DAS) • Non-Traditional SCADA/ICS  Intelligent Traffic Control  Automotive Control  Traffic/Lighting Control  HVAC/Environment Control  Power Regulators/UPS  Security/Access Control  Serial Port Servers  Data Radios  Mining Equipment  Traffic Cameras
  • 6. Manufacturer Results 6 927 total number of search terms 886 unique number of search terms; traditional and non-traditional 578 unique number of search terms; non-traditional removed 207 total number of manufacturers 182 unique number of traditional manufacturers 41 total search term difference; traditional and non-traditional 349 total search term difference; non-traditional removed 25 total manufacturer difference
  • 7. Top 11 Manufacturers 7 Manufacturer Count % Out of 100% ENERGYICT 106235 18.10% SIEMENS 84328 14.37% MOXA 78309 13.34% LANTRONIX 56239 9.58% NIAGARA 54437 9.27% GOAHEAD-WEB 42473 7.24% VXWORKS 34759 5.92% INTOTO 34686 5.91% ALLIED-TELESYS 34573 5.89% DIGI INTERNATIONAL 30557 5.21% EMBEDTHIS-WEB 30381 5.17% The devices found estimated at 586,997, approx. 26.84% of total 2,186,971 devices
  • 8. Top 16 HVAC/BACNet Manufacturers 8 The devices found estimated at 13,475, approx. 0.62% of total 2,186,971 devices Manufacturer Count % Out of 100% HEATMISER 6487 48.13% HONEYWELL 3588 26.63% YORK 921 6.83% BACNET INTERNATIONAL 560 4.16% TRANE 506 3.76% JOHNSON CONTROLS 460 3.41% CARRIER 234 1.74% TEMPERATURE GUARD 180 1.34% LG ELECTRONICS 145 1.08% LIEBERT 126 0.94% CENTRALINE 81 0.60% STULZ 77 0.57% CONTROL4 38 0.28% BOSCH AUTOMATION 37 0.27% LENNOX 24 0.18% CUMMINGS 11 0.08%
  • 9. Top 6 Serial->Ethernet Manufacturers 9 The devices found estimated at 204,416, approx. 9.35% of total 2,186,971 devices Manufacturer Count % Out of 100% MOXA 78309 38.31% LANTRONIX 56239 27.51% ALLIED TELESYS 34573 16.91% DIGI INTERNATIONAL 30557 14.95% ATOP SYSTEMS 3846 1.88% MULTITECH SYSTEMS 892 0.44%
  • 10. Example: MODBUS 10 Create a search entry, and look for MODBUS devices Search string would be: http://www.shodanhq.com/search?q=modbus
  • 11. Example: MODBUS 11 If searched on Google, this device is… HTTP/1.0 401 Unauthorized Date: Thu, 18 Sep 2008 16:06:08 GMT Server: Boa/0.93.15 Connection: close WWW-Authenticate: Basic realm="ModbusGW" Content-Type: text/html Returned HTTP header information from one of the sites searched by SHODAN; the detail information to that entry looks like this…
  • 12. Search Terms Found (Per Day) 12 0 50 100 150 200 250 300 350 400 450 500 14-Apr-2012 31-Jan-2014 654 days Max Search Terms Found = 469 (out of 927)
  • 13. Total Counts(Per Day) 13 14-Apr-2012 31-Jan-2014 654 days 0 2000 4000 6000 8000 10000 12000 14000 16000 Max Total Count = 13498
  • 15. Project RUGGEDTRAX Mission Objectives • To provide substantiation that directly connecting an ICS device onto the Internet could have consequences; • Obtain current ICS equipment through public sources (eBay), and deploy equipment as actual cyber assets controlling perceived critical infrastructure environments; • Ascertain any pertinent threat/attack vectors, and magnitude of any attacks against perceived critical infrastructure environments; • Record access attempts, analyze network packets for patterns; and, • Report redacted public awareness to governments & media outlets. 15
  • 16. Device Specifications ● Serial->Ethernet converter ● Two-ports; supports both MODBUS/TCP and DNP3 ● Device is Siemens RuggedCom RS910 ● Firmware is v3.8.0 ● Device connected directly to Internet (NO FIREWALL) ● Supports: TELNET, TFTP, RSH, SSH, SNMP, HTTP/HTTPS, MODBUS/TCP and DNP3 16
  • 17. Device Configuration ● Disabled TELNET, TFTP, RSH, SNMP and MODBUS/TCP ● SSH and HTTP/HTTPS limited to ONE connection ● DNP3 cannot be disabled ● Device may be connected via network (SSH), web (HTTP/HTTPS), or serial (console) 17
  • 18. Project RUGGEDTRAX Statistical Results • Devices acquired from eBay were not properly “cleaned”, but were “lobotomized” ; contained “residual data” from previous owner: – Configuration information – IP address and pertinent networking information – Contact information • Device placed online 13-Oct-2014 (Monday) @ 1917 hrs CDT • First attack begins 13-Oct-2014 @ 2104 hrs CDT (< 2 hrs after incept) • Device appears on SHODAN 15-Oct-2014 (Wednesday) @ 1229 hrs CDT • Project concluded 27-Dec-2014 @ 1021 hrs CDT • Total count of access attempts: 140,430 (from 651 IPs) • Top country counted: China @ 125,299 (or 89.23%) (from 269 IPs) 18
  • 19. Flaws and Potential Errors • Countries identified do not implicate any specific nationality; • IP addresses are based on country assignment -- nothing else; • IP addresses may be: – Falsified – Spoofed – Proxied, or – Black-holed • Unknown if human or “robot” attacking the device, although it is highly probable that it is predominately automated 19
  • 20. Project RUGGEDTRAX Top 4 Countries 20 China 92.17% (60,318) United States 1.44% (945) Germany 1.74% (1136) France 4.65% (3044) Countries found represent Top 50 entries of access attempts of approx. 65,443 attempts, of 140,430 attempts, or approx. 46.60% 47 entries 1 entry per country
  • 21. Conclusion ● New legislation is needed to curb this behavior; ● Industry practices need to be modified; ● Diagnostic practices and configuration management schemes need to improve dramatically; ● Sites may technically be in compliance with regulations -- only because the asset owners may have no idea that they really are exposed; and, ● The community must get past this terrible practice of compliance-based security and focus instead on an attitude of safety, vigilance, and performance awareness. 21
  • 22. Useful Information • Project SHINE Findings Report [1 Oct 2014]: – http://01m.us/l/ltjify8p2a1r • Project RUGGEDTRAX Preliminary Report [21 Oct 2014]: – http://01m.us/l/gltlhotyw69j • Quantitatively Assessing and Visualising Industrial System Attack Surfaces, Eireann Leverett [Jun 2011]: – http://01m.us/l/hsjlqz • 10th SANS ICS Security Summit Presentation [24 Feb 2015]: – http://01m.us/l/72ikss 22
  • 23. Questions? Bob Radvanovsky, (630) 673-7740 rsradvan@infracritical.com Jake Brodsky, (443) 285-3514 jbrodsky@infracritical.com