SlideShare a Scribd company logo
Ā© 2019
A Diet of Poisoned Fruit:
Designing Implants & OT Payloads
for ICS Embedded Devices
Jos Wetzels, Marina Krotofil
2
Marina Krotofil
@marmusha
www.basf.com
ā€¢ Senior Security Engineer
ā€¢ Specializing on offensive security
of Critical Infrastructures
ā€¢ Focus: Physical Damage or how
to make somethings go bad,
crash or blow up by means of
cyber-attacks
3
ā€¢ Principal Consultant &
Security Researcher
ā€¢ Focus: Embedded Systems
Security (ICS, Automotive,
IoT, ā€¦)
ā€¢ (previously) Security Researcher
@ University of Twente on
protection of critical
infrastructure
Jos Wetzels
@s4mvartaka
www.pexels.com
4Ā© 2019
AGENDA
1. Introduction
2. Cyber-Physical Attack Lifecycle
3. Implants
4. OT Payloads
5. Conclusion
5Ā© 2019
Here is a Plant. What is Your Plan?
http://www.amerpipe.com/sites/default/files/refinery-pipe.jpg
6Ā© 2019
Two Common View on Cyber-Physical
Attacks
6
ā€¢ ā€œTrivial! Look at the state of ICS
security!ā€
ā€¢ ā€œBorderline impossible! These
processes are extremely complex
& engineered for safety!ā€
https://image.shutterstock.com/image-illustration/six-nine-matter-perspectives-
260nw-1024980271.jpg
7Ā© 2019
Typical Expectation: MAGIC BUTTON
http://www.amerpipe.com/sites/default/files/refinery-pipe.jpg
Ā© 2019
Attacks with Strategic and Long Lasting
Effect
8
ā€¢ Attacks with strategic, lasting damage will be process specific
& require good process comprehension
ā€¢ Wil require attacker to develop detailed ā€˜damage scenarioā€™
āˆ’ What causes a pipeline to explode?
āˆ’ What causes the right pipeline to explode?
āˆ’ What causes the right pipeline to explode at the right
moment?
Ā© 2019
Industrial Control Systems (ICS)
9
Physical
process
Attacker
target
Computer science
(IT security)
Engineering
(OT security)
Ā© 2019
IT Security vs. OT Security
10
IT security
(cyber-security ->
taking over the
infrastructure)
OT security
(causing impact on the
operations -> process and
equipment)
ICS security
Attack payload
Marina & Jos
Ā© 2019
Industrial Plants Work on Control Loop
Concept
11
0 10 20 30 40 50 60 70
3550
3600
3650
3700
3750
D Feed
Hours
kg/h
0 10 20 30 40 50 60 70
62.6
62.8
63
63.2
63.4
63.6
D feed
Hours
%
Actuators
Control
system
Sensors
SET POINT
HMI
Process
Optimization
Applications
https://upload.wikimedia.org/wikipedia/commons/
thumb/0/03/Leitstand_2.jpg/327px-Leitstand_2.jpg
Ā© 2019
Industrial Network Architecture
DefinitionofRealTime
Field
Instrumentation
Controllers
(Regulatory
control)
HMI
(Supervisory
control)
Optimization
Applications
Planning and
management
Ā© 2019
Physical Process and Control Equipment
13
https://vecer.mk/files/article/2017/05/02/485749-saudiska-arabija-ja-kupi-najgolemata-naftena-rafinerija-vo-sad.jpg http://www.jfwhite.com/Collateral/Images/English-US/Galleries/middleboro9115kvbreakers.jpg https://www.roboticsbusinessreview.com/wp-content/uploads/2016/05/jaguar-factory.jpg
https://selinc.com/uploadedImages/Web/Videos/Playlists/Playlist_RTAC_1280x720.png?n=6358475812600
0
http://www02.abb.com/global/seitp/seitp202.nsf/0/0601d25ed243cfb0c1257d7e0043e50e/$file/7184_lvl2.jpg
https://www.oilandgasproductnews.com/files/slides/locale_image/medium/0089/22183_en_16f9d_8738_honeywell-
process-solutions-rtu2020-process-controller.jpg
Ā© 2019
Physical Process and Control Equipment
14
https://vecer.mk/files/article/2017/05/02/485749-saudiska-arabija-ja-kupi-najgolemata-naftena-rafinerija-vo-sad.jpg http://www.jfwhite.com/Collateral/Images/English-US/Galleries/middleboro9115kvbreakers.jpg https://www.roboticsbusinessreview.com/wp-content/uploads/2016/05/jaguar-factory.jpg
http://magazine.scientificmalaysian.com/wp-content/uploads/2013/12/Oil-refinery-explosion.png
CYBER
PHYSICAL
Ā© 2019
Security vs. Safety
15
Time
Incident
Safety measuresSecurity infridgements
Security
incident
Layers of security
protections
Layers of safety
protections
Threats Hazards
Ā© 2019
Hazards and Layers of Safety Protections
16
Ā© 2019
Designing Cyber-Physical Payload
17
Evil
Motivation
Cyber-physical
Payload
https://cdn5.vectorstock.com/i/1000x1000/32/14/skull-
and-crossbones-with-binary-code-vector-20603214.jpg
18Ā© 2019
AGENDA
1. Introduction
2. Cyber-Physical Attack Lifecycle
3. Implants
4. OT Payloads
5. Conclusion
Ā© 2019
Cyber-Physical Attack Development
Lifecycle
ā€¢ If you know how attackers work, you can figure out
how to stop them
ā€¢ Attack lifecycle is a common method to describe a
process of conducting cyber attacks
19
Ā© 2019
Cyber-Physical Attack Development
Lifecycle
20
Access Discovery Control Damage Cleanup
Obtaining
Feedback
Preventing
Response
How Does This Fit
into Other Attack
Frameworks?
Ā© 2019
Lockheed Martin, the Cyber Kill ChainĀ®
22
You are here
https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Ā© 2019
Mandiant Attack Lifecycle
23
You are here
http://www.iacpcybercenter.org/resource-center/what-is-cyber-crime/cyber-attack-lifecycle/
Ā© 2019
SANS Industrial Control System Cyber
Kill Chain
24
You are here
https://www.sans.org/reading-room/whitepapers/ICS/paper/36297
Ā© 2019
ICS MITRE ATT&CKā„¢
25
Persistence Privilege Escalation Defense Evasion Operator Evasion Credential Access Discovery Lateral Movement Execution Command and Control Disruption Destruction
Valid Accounts Rootkit Network Sniffing Exploitation of Vulnerability Connection Proxy Module Firmware
Module Firmware Exploitation of Vulnerability File Deletion Block Serial Comm Port Brute Force Device Information Default Credentials Scripting Commonly Used Port Spoof Command Message
External Remote Service Modify Event Log Modify I/O Image Default Credentials Control Process Valid Accounts Graphical User Interface Block Command Message
Modify Control Logic Alternate Modes of Operation Modify Reporting Settings Exploitation of Vulnerability Role Identification External Remote Service Command-Line Interface Modify I/O Image
Modify System Settings Masquerading Modify Reporting Message Credential Dumping Location Identification Modify Control Logic Modify System Settings Exploitation of Vulnerability
Memory Residence Modify System Settings Block Reporting Message
Network Connection
Enumeration
Man in the Middle Modify Reporting Settings
System Firmware Spoof Reporting Message Serial Connection Enumeration Alternate Modes of Operation Modify Reporting Message
Modify Tag I/O Module Enumeration Block Reporting Message
Modify Control Logic Remote System Discovery Spoof Reporting Message
Modify Physical Device Display Network Service Scanning Modify Tag
Modify HMI/Historian
Reporting
Modify Control Logic
Modify Parameter Device Shutdown
Modify Parameter
System Firmware
Modify Command Message
Block Serial Comm Port
Modify System Settings
Alternate Modes of Operation
Masquerading
We donā€™t know
where we are in this
model just yet :-)
https://attack.mitre.org/
Otis Alexander. Modeling Adversarial Behavior against ICS, S4ā€™19
Overview of Stages
Ā© 2019
Access
ā€¢ Target facility
ā€¢ Discovery
ā€¢ Access to needed assets
ā€¢ Attack execution
ā€¢ Trusted 3rd party (staging target)
ā€¢ Access to target facility
ā€¢ Access to needed assets
ā€¢ Process comprehension
ā€¢ Non-targeted/Opportunistic
27
Access
Target
facility
Trusted 3rd
party
Ā© 2019
Targeting
ā€¢ There are few known cases of strategic targeting
ā€¢ Target might be also selected as best suitable
certain criteria
ā€¢ Collateral victim
ā€¢ Opportunistic
28
Ā© 2019
Venezuela, 2019
ā€¢ Suspected cyber-attack on Guri hydroelectric power plant
ā€¢ Produces 80% of countryā€™s electricity
ā€¢ Details of plantā€™s upgrade are publicly available, including
possible remote access
29
https://twitter.com/cherepanov74/status/1104352761028722688
Ā© 2019
Venezuela, 2019
ā€¢ Produces 80% of countryā€™s electricity
ā€¢ Details of plantā€™s upgrade are publicly available,
includible possible remote access
30
https://twitter.com/cherepanov74/status/1104352761028722688
Ā© 2019
Ukraine, 2016
ā€¢ INDUSTROYER malware was deployed to shutdown electricity
distribution at Pivnichna substation
ā€¢ There is no strong indications that victim substation was strategic
target
ā€¢ Details of substation upgrade are publicly available
31
Ā© 2019
Ukraine, 2016
ā€¢ INDUSTROYER malware work was used to shutdown electricity
distribution at Pivnichna substation
ā€¢ There is no strong indications that victim substation was strategic
target
ā€¢ Details of substation upgrade are publicly available
32
https://w3.siemens.com/smartgrid/global/en/products-systems-
solutions/protection/distance-protection/pages/7sa63.aspx
Targeted by
malware
Ā© 2019
Saudi Arabia, 2017
33
ā€¢ TRITON malware targeted Safety Instrumented Systems at
petrochemical plant
ā€¢ There is no strong indication that TRITON victim was
strategic target
ā€¢ Affected site could have been used as live drill and testing
platform before attacking strategic target
https://www.schneider-
electric.com/ww/en/Images/tricon-IC-654x654.jpg
Ā© 2019
Saudi Arabia, 2017
34
ā€¢ TRITON malware targeted Safety Instrumented Systems at
petrochemical plant
ā€¢ There is no strong indication that TRITON victim was
strategic target
ā€¢ Affected site could have been used as live drill and testing
platform before attacking strategic target
https://www.schneider-
electric.com/ww/en/Images/tricon-IC-654x654.jpg
Ā© 2019
Role of OSINT in Targeting
ā€¢ The Internet is full of proprietary and confidential
industrial documentation.
ā€¢ Discovering helpful information about certain
industrial facility may provoke targeting
35
https://www.amazon.com/Hack-World-OSINT-https://www.amazon.com/Open-Source-Intelligence-
Techniques-Information/dp/1530508908
Ā© 2019
Role of OSINT in Targeting
ā€¢ The Internet is full of proprietary and confidential
industrial documentation.
ā€¢ Discovering helpful information about certain
industrial facility may provoke targeting
36
https://www.amazon.com/Hack-World-OSINT-https://www.amazon.com/Open-Source-Intelligence-
Techniques-Information/dp/1530508908
Ā© 2019
Targeting 3rd parties (supply chain)
ā€¢ Getting access to into target facilities
ā€¢ Getting access to needed assets/equipment,
āˆ’E.g. through maintenance support contracts
ā€¢ Obtaining information related to target or
potential victims
āˆ’Engineering/networking/config documentation
āˆ’User application (control logic), etc.
37
Ā© 2019
Targeting 3rd parties (supply chain)
ā€¢ Getting access to into target facilities
ā€¢ Getting access to needed assets/equipment,
āˆ’E.g. through maintenance support contracts
ā€¢ Obtaining information related to target or
potential victims
āˆ’Engineering/networking/config documentation
āˆ’User application (control logic), etc.
38
Ā© 2019
National Advisories on the Threat
39
https://www.us-cert.gov/ncas/alerts/TA18-074A
https://www.ncsc.gov.uk/news/ho
stile-state-actors-compromising-
uk-organisations-focus-
engineering-and-industrial-control
Ā© 2019
National Advisories on the Threat
40
https://www.us-cert.gov/ncas/alerts/TA18-074A
https://www.ncsc.gov.uk/news/ho
stile-state-actors-compromising-
uk-organisations-focus-
engineering-and-industrial-control
Ā© 2019
Data Exposure is Penalizable in Regulated
Facilities
41
ā€¢ NERC CIP-003-3 standard
ā€¢ Sensitive utilityā€™s network
infrastructure data were
exposed via server of third-
party service provider
Ā© 2019
Role of Access Stage
ā€¢ Access stage largely defines the selection
of damage scenario
ā€¢ Access driven
āˆ’E.g., obtained access to specific equipment
via 3rd party remote maintenance contract
āˆ’Did not manage to access Safety Systems
ā€¢ Information driven
āˆ’E.g., obtained specific information about
unhealthy state or repairs of equipment
42
Ā© 2019
Discovery
43
Discovery
Network
Infrastructure
Reconnaissance
Process
Comprehension
http://eprints.lancs.ac.uk/88089/1/sample_sigconf.pdf
ā€¢ Network reconnaissance
ā€¢ Majority of this stage is similar to traditional IT
recon process/attack life cycle, tools may differ
ā€¢ Information enumeration
ā€¢ Process comprehension
ā€¢ Understanding exactly what the process is doing,
how it is built, configured and programmed
Ā© 2019
Discovery
44
Discovery
Network
Infrastructure
Reconnaissance
Process
Comprehension
http://eprints.lancs.ac.uk/88089/1/sample_sigconf.pdf
ā€¢ Network reconnaissance
ā€¢ Majority of this stage is similar to traditional IT
recon process/attack life cycle, tools may differ
ā€¢ Information enumeration
ā€¢ Process comprehension
ā€¢ Understanding exactly what the process is doing,
how it is built, configured and programmed
Ā© 2019
Control
ā€¢ Least understood and studied stage among all
ā€¢ It is about discovering:
ā€¢ Dynamic model of the process and its limits
ā€¢ Ability to control process
ā€¢ Attack effect propagation
ā€¢ Active stage in live environment
45
http://library.usc.edu.ph/ACM/SIGSAC%202017/cpss/p3.pdf
Case Study: Water
Treatment Plant
Ā© 2019
Use Case: Killing UF Filter in Water
Treatment Facility
Acknowledgement: Sridhar Adepu and Prof. Aditya Mathur, SUTD, Singapore
for conducting an experiment for this talk
47
https://itrust.sutd.edu.sg/testbeds/secure-water-treatment-swat/
Ā© 2019
Use Case: Killing UF Filter in Water
Treatment Facility
ā€¢ Water treatment process consists of multiple stages, including
several stages of filtering
ā€¢ Water filters are expensive
ā€¢ When broken, water supply is interrupted
48https://en.wikipedia.org/wiki/Ultrafiltration https://en.wikipedia.org/wiki/Reverse_osmosis
Ā© 2019
UF Filtering: HMI Screen
49
Ā© 2019
UF Filtering: PI&D Diagram
50
Ā© 2019
UF Backwash: HMI and PI&D Diagram
51
Ā© 2019
How Do We Pull This off?
52
ā€¢ There are tree conditions which can trigger backwash
process, each guided by a state machine
ā€¢ Preset timer (every 30 minutes)
ā€¢ UF filter differential pressure (DP) ā‰„ 40 kPa
ā€¢ Plant shutdown
Ā© 2019
How Do We Pull This off?
53
ā€¢ There are tree conditions which can trigger backwash process,
each guided by a state machine
ā€¢ Preset timer (every 30 minutes)
ā€¢ UF filter differential pressure (DP) ā‰„ 40 kPa
ā€¢ Plant shutdown
Ā© 2019
How Do We Pull This off?
54
ā€¢ There are tree conditions which can trigger backwash process,
each guided by a state machine
ā€¢ Preset timer (every 30 minutes)
ā€¢ UF filter differential pressure (DP) ā‰„ 40 kPa
ā€¢ Plant shutdown
Ā© 2019
One Possible Attack Execution Scenario
55
L
Tank
T301
UF
Pump
P301Stage 3 ON
LIT301
UF is active
Valve
MV303
Pump
P602
Stage 4
Stage 6 1.1 MV303
OPEN
1.2 P602
ON
Attckr
Pressure in UF
membrane will increase.
But HOW MUCH?
PLC3
PLC6
Ā© 2019
Control Stage of Process Comprehension
56
ā€¢ Average UF filter DP is ā‰ˆ 12-13 kPa
ā€¢ Max DP is 98 kPa, reached in 8 sec
ā€¢ Process recovery (return to normal) is 5 sec
ā€¢ Note, this data still does not tell us whether this pressure kills
the UF filter and how quickly
Ā© 2019
Control Stage of Process Comprehension
57
ā€¢ Average UF filter DP is ā‰ˆ 12-13 kPa
ā€¢ Max DP is 98 kPa, reached in 8 sec
ā€¢ Process recovery (return to normal) is 5 sec
ā€¢ Note, this data still does not tell us whether this pressure kills
the UF filter and how quickly
https://www.controlglobal.com/articles/2015/a-lasting-plan-for-managing-alarms/
Ā© 2019
Damage
58
ā€¢ Requires subject-matter knowledge
(engineering)
ā€¢ Cant take several forms
ā€¢ Explosions (of course!)
ā€¢ Equipment breakage
ā€¢ Pollution
ā€¢ Product Out of Specification
ā€¢ Increased production costs, etc.
https://img.izismile.com/img/img5/20120306/640/chemical_plant_accident_in_germany_640_04.jpg
Damage
Obtaining
Feedback
Preventing
Response
Ā© 2019
Attack Design != Implementation Success
59
Tank
T401
Pump
P401
Stage 4
LIT401
De-Chlorinator
UV401
Flow meter
FIT401
Stage 5
Reverse Osmosis
filtering
Attckr
1.1 FIT401
Spoofing to 0.4
FIT401
Spoofed value
1.1 UV401
OFF
ORP meter
AIT502
Attckr 2.1 AIT502
Spoof to Low
PLC4
PLC5
Ā© 2019
Cleanup
ā€¢ In traditional hacking it is possible to execute the
entire attack without being ever detected
ā€¢ In process control it is not an option because of
physical effect
ā€¢ Create forensic footprint of what the investigators
should identify as cause of the incident/accident
āˆ’E.g. time attack to process troubleshooting
60
Why Implant?
Implant
ā€œHardware or software modification
designed to gain unauthorized control
over specific system functionality.ā€
OT Payload
ā€œDigital implementation of (part of) a
cyber-physical attackā€
64Ā© 2019
Why Implant
ā€¢ Why not just modify control logic / change setpoints / send
malicious command?
ā€¢ For more complicated attacks
ā€¢ Coordination, Feedback, Speed, Low-level functionality access
ā€¢ Many scenarios possible without implants
ā€¢ Eg. Ukraine 2015 & 2016
Where to Implant?
66Ā© 2019
Where to Implant?
67Ā© 2019
Network Equipment
Observing &
learning OT traffic
Manipulating
OT traffic
Dropping traffic to
cause loss of
control / view by
suppressing alarm
or signal
68Ā© 2019
Process & Safety
Controllers
Manipulate IO
Prevent Safety
Response
Measure attack
progress
Suppress condition
monitoring alerts
69Ā© 2019
Field Devices
Spoofing
sensor data at
high speed
Overriding
digital safety
mechanisms
How to Implant?
Ā© 2019
We want smooth native code execution
71
ā€¢ Need access to low-level, privileged functionality
ā€¢ Memory-/Port-Mapped IO (MMIO/PMIO)
ā€¢ Kernel memory objects
ā€¢ Logic runtime memory
ā€¢ Persistence mechanisms
ā€¢ Ideally via silent hot-patching
ā€¢ No reboots, no service restarts, no process upsets
Ā© 2019
Implant Delivery Vectors
72
Ā© 2019
PLC 101 - Architecture
73
Standalone Modular
Power Supply, CPU, I/O, Comms, ā€¦
Ā© 2019
PLC 101 - Backplane
74
Inter-Module Databus
Multibus, P-Bus, VMEbus, X-Bus, STD-32, PCIe, ā€¦
Ā© 2019
PLC 101 ā€“ CPU Module Internals
75
Ā© 2019
PLC 101 ā€“ Boot Sequence
76
Ā© 2019
PLC 101 ā€“ Logic Program Execution
77
Ā© 2019
PLC 101 - Scan Cycle
78
Ā© 2019
Implant Access
79
Ā© 2019
Implant Installation
80
Escalate
Privileges*
Disable
Diagnostics
Relocate
Implant
Ensure
Persistence*
Set Hooks Go Resident
* Optional
Implant stability Eg. modify firmware or
stored logic in flash
Ā© 2019
Implant Design Considerations
81
Active Implant
ā€¢ Includes OT
payload
ā€¢ Limits
detection /
network
forensics
exposure
Dormant
Implant
ā€¢ OT payload
delivered
later
ā€¢ Limits
forensics
exposure
Persistence
ā€¢ Complicated
by code
signing
ā€¢ Need ability
write to flash
& enough
space
Memory
Residence
ā€¢ No reboot
survival
ā€¢ Limits
forensics
exposure
Ā© 2019
We want scalability
82
ā€¢ Target different vendorsā€™ systems
with similar implant functionality
ā€¢ But limited number of players out
there
ā€¢ Eg. construct arsenal of generic
templates for key DCS & safety
controllers
ā€¢ One-time upfront investment, no
huge turnover
Ā© 2019
Complication: Heterogeneity
83
Processor OS Runtime
IO
Interaction
Memory
Organization
Security
Features
Ā© 2019
Complication: In-House vs Commercial
84
Proprietary SoC
/ ASIC*
Proprietary OS
/ Executive
Proprietary
Runtime
* https://sec-consult.com/en/blog/2019/02/reverse-engineering-architecture-pinout-plc/
Ā© 2019
Example: Triconex SIS
85
ā€¢ In-House OS + Runtime, different processors & OS variants
between versions of same product
Triconex MP
9 (3006)
Triconex MP
10 (3008)
Triconex MP
11 (3009)
Ā© 2019
Counter-Example: Rise of Commercial
RTOSes & Runtimes
86
Ā© 2019
Complication: Resource Constraints
87
ā€¢ MPC860, 50 MHz
ā€¢ 6 MB Flash
ā€¢ 16 MB DRAM
ā€¢ 32 KB SRAM
ā€¢ ARM9, 14 MHz
ā€¢ 512 KB Boot Flash
ā€¢ 8 MB RW Flash
ā€¢ 2 MB SRAM
You better enjoy
Will need to fit implant in there
ā€¢ Signals processing? Malicious
logic? Comms?
Often stretched by normal
functionality already
programmingā€¦
Ā© 2019
Complication: Security Engineering
88
Domain &
Privilege
Separation
Firmware & Logic
Signing
Sandboxing
Exploit
Mitigations
Programming
Key-locks
https://images-na.ssl-images-amazon.com/images/I/41jr93jKzML._SX466_.jpg,
https://security.cs.pub.ro/summer-school/wiki/session/10
Case Study: TRITON
Ā© 2019 90
TRITON / Trisis / HatMan (2017)
Ā© 2019
TRITON Attack Overview
91
https://www.cyberark.com/threat-research-blog/anatomy-triton-malware-attack/
Ā© 2019
TRITON injects ā€˜dormantā€™ implant into
Triconex controller memory
92
TriStation Engineering Protocol
Eng. Workstation
ā€œYour wish is
my commandā€
Logic Download
(compiled for PPC, executed on CPU)
trilog.exe
ā€¢ script_test.py
ā€¢ library.zip
ā€¢ inject.bin
ā€¢ imain.bin
ā€œExecute my shellcode pleaseā€
Ā© 2019
Why not just modify firmware?
93
Firmware Download
(FC 0x50: unauthenticated, unsigned)
Controller reboots into download mode,
logic execution interrupted!
Logic Append
(FC 0x01: unauthenticated, unsigned)
New logic appended to circular linked
program list, logic continues running!
Ā© 2019
Implant Installation
94
ā€¢ Safety program executed
in user mode
ā€¢ Need supervisor to flush
icache & apply mods
ā€¢ Privilege level set in PPC
MSR register, NW for user
* ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
Requires Supervisor Privileges
Ā© 2019
Stage 2: Privilege Escalation
95
Escalate
Privileges*
Disable
Diagnostics
Relocate
Implant
Ensure
Persistence*
Set Hooks Go Resident
* ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
ā€¢ Exploit syscall 0x13 (SOE Status) to modify MSR
while in supervisor mode, set saved MSR bit
ā€¢ No memory permissions, can write anywhere in
user mode, including kernel globals. Exploit
write-what-where.
Ā© 2019
Stage 2: Disable RAM Check
96
Escalate
Privileges*
Disable
Diagnostics
Relocate
Implant
Ensure
Persistence*
Set Hooks Go Resident
* ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
Originally conditional branch
Ā© 2019
Stage 2: Relocate Implant
97
Escalate
Privileges*
Disable
Diagnostics
Relocate
Implant
Ensure
Persistence*
Set Hooks Go Resident
* ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
Ensures Residence
Even with full logic
wipe
Ā© 2019
Stage 2: Modify Network Command Handler
98
Escalate
Privileges*
Disable
Diagnostics
Relocate
Implant
Ensure
Persistence*
Set Hooks Go Resident
* ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
ā€¢ Entry 0x1D (Get MP Status)
ā€¢ Allows for network comms
Ā© 2019
Stage 3: Implant
99
* ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
Ā© 2019
Stage 3: Implant
100
* ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
Ā© 2019
Stage 4: OT Payload
101
ā€¢ Once implant is injected we have dormant ā€˜god modeā€™
ā€¢ Arbitrary supervisor RWX over network
ā€¢ Deliver OT payload at later moment
ā€¢ Not recovered from incident, but we can speculate ā€¦
102Ā© 2019
AGENDA
1. Introduction
2. Cyber-Physical Attack Lifecycle
3. Implants
4. OT Payloads
5. Conclusion
Ā© 2019
Damage Stage
103
1
Manipulate the
process
Prevent response
Direct Indirect
Manipulation
of actuators
Deceive controller/
operator about
process state
(e.g. spoof sensor)
2
Operators Control / Safety System
Blind Mislead
Modify
operational /
safety limits
Blind about
process
state
3
Obtain
Feedback
Direct or Derived
(e.g., via proxy sensors
/calculations)
I/O Manipulation
Ā© 2019
I/O Manipulation
105
ā€¢ Simple concept, non-trivial execution
ā€¢ Many different approaches
ā€¢ Depends on how IO image tables are populated, how IO is
wired to chip executing logic
ā€¢ Different technical ways to achieve same goal
Ā© 2019
I/O Manipulation
106
* Ghost in the PLC ā€“ Ali Abbasi & Majid Hashemi, BlackHat EU 2016
ā€¢ Memory Breakpoint
ā€¢ Patch Instructions
ā€¢ Change Memory Permissions
Ā© 2019
I/O Manipulation
107
* https://www.nrc.gov/docs/ML0932/ML093290420.pdf
Hook accesses to
IO portion of
shared memory
Hook bus
handler routines
* www.amikonplc.com/,
www.kenosha-reuse.com
Ā© 2019
Complication: Field Device Limitations
108
ā€¢ Cyber limitations might be placed on theoretically feasible
functionality for protective reasons*
ā€¢ Valve closing speed
ā€¢ Non-digitally alterable VFD skip frequences
ā€¢ Prevents IO manipulation from achieving desired result
ā€¢ Overcoming this requires implanting field device
ā€¢ Patch out limitations / sanity checks
* Similar problem in automotive where certain diagnostic messages are disallowed above certain speeds
Alarm Suppression
Ā© 2019
Alarm Suppression
110
ā€¢ Again: simple concept, non-trivial execution
ā€¢ We want to prevent an outgoing alarm being raised or
incoming alarm being acted upon
ā€¢ Might require very different approaches
ā€¢ Alarm raised with dedicated protocol message
ā€¢ Alarm signal via IO
ā€¢ Alarm bit in flag accompanying read PV
Ā© 2019
Alarm Propagation
111
Safety
shutdown
Alarm
Alarm
Goal: catalyst
deactivation
Ā© 2019
Hiding Alarms
112
Ā© 2019
Suppressing Alarms
113
Ā© 2019
Example: Simple water tank level alarm
114
Safety program resides in
memory as code, modify
to set alarm to fixed false
Ā© 2019
Finding Instructions to Patch
115
Ā© 2019
Hot-Patching Safety Program
116
Ā© 2019
Alarm Suppression
117
Alarm Relaxation &
Tightening
Ā© 2019
Why relax or tighten instead of suppress?
119
ā€¢ Donā€™t prevent alarm from being raised but change
conditions
ā€¢ Limits, deadband, priority
ā€¢ Relax: Stealth during scheduled testing
ā€¢ Tighten: Cause hard-to-resolve alarm storms
Ā© 2019
Hook functionality that decides whether
to raise alarm
120
ā€¢ Can be data (limit, priority, deadband): overwrite in RAM
ā€¢ Make sure to spoof values when queried!
ā€¢ Or code (alarm logic): patch instructions
Implant Communication
Ā© 2019
Implants need to synchronize
122
* https://en.wikipedia.org/wiki/Bioreactor
Pressure, temperature, pH,
moisture, ā€¦
4. Change
agitator speed
2. Change air /
medium inflow
1. Process state A
3. Process state B
Ā© 2019
Expectation vs Reality
123
These can be in completely
different parts of the process,
on different networks
Might not see much electronic
chatter after implanting
Ā© 2019
Process state change detection
124
* https://github.com/sysml/blockmon, https://godbolt.org/
* CPS: Driving Cyber-Physical Systems to Unsafe Operating Conditions by Timing DoS Attacks on Sensor Signals ā€“ M. Krotofil et al.
17640 bytes ~= 0.11% of DRAM
(unoptimized)
Non-Parametric Cumulative Sum (NCUSUM)
125Ā© 2019
AGENDA
1. Introduction
2. Cyber-Physical Attack Lifecycle
3. Implants
4. OT Payloads
5. Conclusion
Ā© 2019
Conclusion
126
Attack
Integration
& Testing
OT Payload
Integration
& Testing
Implant
Integration
& Testing
Damage
Scenario
Design
OT Payload
Design
Implant
Design
Exploit
Implementa
tion
Implant
Implementa
tion
OT Payload
Implementa
tion
Marina Jos
Ā© 2019
Appreciation
127
ā€¢ Sridhar Adepu & Prof. Aditya Mathur
ā€¢ Jason Larsen

More Related Content

What's hot

Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
Narinrit Prem-apiwathanokul
Ā 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
guest85a34f
Ā 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
Digital Bond
Ā 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
EnergySec
Ā 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
Digital Bond
Ā 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
infracritical
Ā 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
pgmaynard
Ā 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
OWASP Delhi
Ā 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
EnergySec
Ā 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
Digital Bond
Ā 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
Chris Sistrunk
Ā 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
Filip Maertens
Ā 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
Deepakraj Sahu
Ā 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
Chris Sistrunk
Ā 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Digital Bond
Ā 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
Chris Sistrunk
Ā 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
Rapid7
Ā 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
Ā 
How to Increase ICS Cybersecurity Return on Investment (ROI)
How to Increase ICS Cybersecurity Return on Investment (ROI) How to Increase ICS Cybersecurity Return on Investment (ROI)
How to Increase ICS Cybersecurity Return on Investment (ROI)
Dragos, Inc.
Ā 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Jaap van Ekris
Ā 

What's hot (20)

Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
Ā 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
Ā 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
Ā 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
Ā 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
Ā 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
Ā 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
Ā 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
Ā 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
Ā 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
Ā 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
Ā 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
Ā 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
Ā 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
Ā 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Ā 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
Ā 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
Ā 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Ā 
How to Increase ICS Cybersecurity Return on Investment (ROI)
How to Increase ICS Cybersecurity Return on Investment (ROI) How to Increase ICS Cybersecurity Return on Investment (ROI)
How to Increase ICS Cybersecurity Return on Investment (ROI)
Ā 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Ā 

Similar to A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
iQHub
Ā 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
iQHub
Ā 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
EnergySec
Ā 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET Journal
Ā 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
Ā 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
PROFIBUS and PROFINET InternationaI - PI UK
Ā 
TWISummit 2019 - Build Security In
TWISummit 2019 - Build Security InTWISummit 2019 - Build Security In
TWISummit 2019 - Build Security In
Thoughtworks
Ā 
S4x20 - Tuning ICS Security Alerts: An Alarm Management Approach
S4x20 - Tuning ICS Security Alerts: An Alarm Management ApproachS4x20 - Tuning ICS Security Alerts: An Alarm Management Approach
S4x20 - Tuning ICS Security Alerts: An Alarm Management Approach
Chris Sistrunk
Ā 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
PrinceGupta789219
Ā 
Tonight, March 5th ā€“ Class 7 (last class) your testā€ on ICS.docx
Tonight, March 5th ā€“ Class 7 (last class)   your testā€ on ICS.docxTonight, March 5th ā€“ Class 7 (last class)   your testā€ on ICS.docx
Tonight, March 5th ā€“ Class 7 (last class) your testā€ on ICS.docx
turveycharlyn
Ā 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
Ā 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
Ā 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas
Ā 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
Waterfall Security Solutions
Ā 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET Journal
Ā 
Whatā€™s the State of Your Endpoint Security?
Whatā€™s the State of Your    Endpoint Security?Whatā€™s the State of Your    Endpoint Security?
Whatā€™s the State of Your Endpoint Security?
IBM Security
Ā 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
Ā 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
George Wainblat
Ā 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
CSA Argentina
Ā 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
Ā 

Similar to A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices (20)

DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
Ā 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
Ā 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
Ā 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
Ā 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
Ā 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
Ā 
TWISummit 2019 - Build Security In
TWISummit 2019 - Build Security InTWISummit 2019 - Build Security In
TWISummit 2019 - Build Security In
Ā 
S4x20 - Tuning ICS Security Alerts: An Alarm Management Approach
S4x20 - Tuning ICS Security Alerts: An Alarm Management ApproachS4x20 - Tuning ICS Security Alerts: An Alarm Management Approach
S4x20 - Tuning ICS Security Alerts: An Alarm Management Approach
Ā 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
Ā 
Tonight, March 5th ā€“ Class 7 (last class) your testā€ on ICS.docx
Tonight, March 5th ā€“ Class 7 (last class)   your testā€ on ICS.docxTonight, March 5th ā€“ Class 7 (last class)   your testā€ on ICS.docx
Tonight, March 5th ā€“ Class 7 (last class) your testā€ on ICS.docx
Ā 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Ā 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
Ā 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Ā 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
Ā 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
Ā 
Whatā€™s the State of Your Endpoint Security?
Whatā€™s the State of Your    Endpoint Security?Whatā€™s the State of Your    Endpoint Security?
Whatā€™s the State of Your Endpoint Security?
Ā 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
Ā 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
Ā 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
Ā 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
Ā 

More from Marina Krotofil

S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsics
Marina Krotofil
Ā 
Dhs icsjwg 2015_v3
Dhs icsjwg 2015_v3Dhs icsjwg 2015_v3
Dhs icsjwg 2015_v3
Marina Krotofil
Ā 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
Marina Krotofil
Ā 
S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017
Marina Krotofil
Ā 
S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017
Marina Krotofil
Ā 
New wave of attacks in Ukraine 2016
New wave of attacks in Ukraine 2016New wave of attacks in Ukraine 2016
New wave of attacks in Ukraine 2016
Marina Krotofil
Ā 
S4x16_Europe_Krotofil
S4x16_Europe_KrotofilS4x16_Europe_Krotofil
S4x16_Europe_KrotofilMarina Krotofil
Ā 
presentation_sas2016_V3
presentation_sas2016_V3presentation_sas2016_V3
presentation_sas2016_V3Marina Krotofil
Ā 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
Marina Krotofil
Ā 
BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALMarina Krotofil
Ā 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenMarina Krotofil
Ā 

More from Marina Krotofil (12)

S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsics
Ā 
Dhs icsjwg 2015_v3
Dhs icsjwg 2015_v3Dhs icsjwg 2015_v3
Dhs icsjwg 2015_v3
Ā 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
Ā 
S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017
Ā 
S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017
Ā 
New wave of attacks in Ukraine 2016
New wave of attacks in Ukraine 2016New wave of attacks in Ukraine 2016
New wave of attacks in Ukraine 2016
Ā 
S4x16_Europe_Krotofil
S4x16_Europe_KrotofilS4x16_Europe_Krotofil
S4x16_Europe_Krotofil
Ā 
presentation_sas2016_V3
presentation_sas2016_V3presentation_sas2016_V3
presentation_sas2016_V3
Ā 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
Ā 
MKAD_black_V2
MKAD_black_V2MKAD_black_V2
MKAD_black_V2
Ā 
BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINAL
Ā 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
Ā 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
Ā 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
Ā 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Ā 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Ā 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Ā 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 

A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices

  • 1. Ā© 2019 A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices Jos Wetzels, Marina Krotofil
  • 2. 2 Marina Krotofil @marmusha www.basf.com ā€¢ Senior Security Engineer ā€¢ Specializing on offensive security of Critical Infrastructures ā€¢ Focus: Physical Damage or how to make somethings go bad, crash or blow up by means of cyber-attacks
  • 3. 3 ā€¢ Principal Consultant & Security Researcher ā€¢ Focus: Embedded Systems Security (ICS, Automotive, IoT, ā€¦) ā€¢ (previously) Security Researcher @ University of Twente on protection of critical infrastructure Jos Wetzels @s4mvartaka www.pexels.com
  • 4. 4Ā© 2019 AGENDA 1. Introduction 2. Cyber-Physical Attack Lifecycle 3. Implants 4. OT Payloads 5. Conclusion
  • 5. 5Ā© 2019 Here is a Plant. What is Your Plan? http://www.amerpipe.com/sites/default/files/refinery-pipe.jpg
  • 6. 6Ā© 2019 Two Common View on Cyber-Physical Attacks 6 ā€¢ ā€œTrivial! Look at the state of ICS security!ā€ ā€¢ ā€œBorderline impossible! These processes are extremely complex & engineered for safety!ā€ https://image.shutterstock.com/image-illustration/six-nine-matter-perspectives- 260nw-1024980271.jpg
  • 7. 7Ā© 2019 Typical Expectation: MAGIC BUTTON http://www.amerpipe.com/sites/default/files/refinery-pipe.jpg
  • 8. Ā© 2019 Attacks with Strategic and Long Lasting Effect 8 ā€¢ Attacks with strategic, lasting damage will be process specific & require good process comprehension ā€¢ Wil require attacker to develop detailed ā€˜damage scenarioā€™ āˆ’ What causes a pipeline to explode? āˆ’ What causes the right pipeline to explode? āˆ’ What causes the right pipeline to explode at the right moment?
  • 9. Ā© 2019 Industrial Control Systems (ICS) 9 Physical process Attacker target Computer science (IT security) Engineering (OT security)
  • 10. Ā© 2019 IT Security vs. OT Security 10 IT security (cyber-security -> taking over the infrastructure) OT security (causing impact on the operations -> process and equipment) ICS security Attack payload Marina & Jos
  • 11. Ā© 2019 Industrial Plants Work on Control Loop Concept 11 0 10 20 30 40 50 60 70 3550 3600 3650 3700 3750 D Feed Hours kg/h 0 10 20 30 40 50 60 70 62.6 62.8 63 63.2 63.4 63.6 D feed Hours % Actuators Control system Sensors SET POINT HMI Process Optimization Applications https://upload.wikimedia.org/wikipedia/commons/ thumb/0/03/Leitstand_2.jpg/327px-Leitstand_2.jpg
  • 12. Ā© 2019 Industrial Network Architecture DefinitionofRealTime Field Instrumentation Controllers (Regulatory control) HMI (Supervisory control) Optimization Applications Planning and management
  • 13. Ā© 2019 Physical Process and Control Equipment 13 https://vecer.mk/files/article/2017/05/02/485749-saudiska-arabija-ja-kupi-najgolemata-naftena-rafinerija-vo-sad.jpg http://www.jfwhite.com/Collateral/Images/English-US/Galleries/middleboro9115kvbreakers.jpg https://www.roboticsbusinessreview.com/wp-content/uploads/2016/05/jaguar-factory.jpg https://selinc.com/uploadedImages/Web/Videos/Playlists/Playlist_RTAC_1280x720.png?n=6358475812600 0 http://www02.abb.com/global/seitp/seitp202.nsf/0/0601d25ed243cfb0c1257d7e0043e50e/$file/7184_lvl2.jpg https://www.oilandgasproductnews.com/files/slides/locale_image/medium/0089/22183_en_16f9d_8738_honeywell- process-solutions-rtu2020-process-controller.jpg
  • 14. Ā© 2019 Physical Process and Control Equipment 14 https://vecer.mk/files/article/2017/05/02/485749-saudiska-arabija-ja-kupi-najgolemata-naftena-rafinerija-vo-sad.jpg http://www.jfwhite.com/Collateral/Images/English-US/Galleries/middleboro9115kvbreakers.jpg https://www.roboticsbusinessreview.com/wp-content/uploads/2016/05/jaguar-factory.jpg http://magazine.scientificmalaysian.com/wp-content/uploads/2013/12/Oil-refinery-explosion.png CYBER PHYSICAL
  • 15. Ā© 2019 Security vs. Safety 15 Time Incident Safety measuresSecurity infridgements Security incident Layers of security protections Layers of safety protections Threats Hazards
  • 16. Ā© 2019 Hazards and Layers of Safety Protections 16
  • 17. Ā© 2019 Designing Cyber-Physical Payload 17 Evil Motivation Cyber-physical Payload https://cdn5.vectorstock.com/i/1000x1000/32/14/skull- and-crossbones-with-binary-code-vector-20603214.jpg
  • 18. 18Ā© 2019 AGENDA 1. Introduction 2. Cyber-Physical Attack Lifecycle 3. Implants 4. OT Payloads 5. Conclusion
  • 19. Ā© 2019 Cyber-Physical Attack Development Lifecycle ā€¢ If you know how attackers work, you can figure out how to stop them ā€¢ Attack lifecycle is a common method to describe a process of conducting cyber attacks 19
  • 20. Ā© 2019 Cyber-Physical Attack Development Lifecycle 20 Access Discovery Control Damage Cleanup Obtaining Feedback Preventing Response
  • 21. How Does This Fit into Other Attack Frameworks?
  • 22. Ā© 2019 Lockheed Martin, the Cyber Kill ChainĀ® 22 You are here https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
  • 23. Ā© 2019 Mandiant Attack Lifecycle 23 You are here http://www.iacpcybercenter.org/resource-center/what-is-cyber-crime/cyber-attack-lifecycle/
  • 24. Ā© 2019 SANS Industrial Control System Cyber Kill Chain 24 You are here https://www.sans.org/reading-room/whitepapers/ICS/paper/36297
  • 25. Ā© 2019 ICS MITRE ATT&CKā„¢ 25 Persistence Privilege Escalation Defense Evasion Operator Evasion Credential Access Discovery Lateral Movement Execution Command and Control Disruption Destruction Valid Accounts Rootkit Network Sniffing Exploitation of Vulnerability Connection Proxy Module Firmware Module Firmware Exploitation of Vulnerability File Deletion Block Serial Comm Port Brute Force Device Information Default Credentials Scripting Commonly Used Port Spoof Command Message External Remote Service Modify Event Log Modify I/O Image Default Credentials Control Process Valid Accounts Graphical User Interface Block Command Message Modify Control Logic Alternate Modes of Operation Modify Reporting Settings Exploitation of Vulnerability Role Identification External Remote Service Command-Line Interface Modify I/O Image Modify System Settings Masquerading Modify Reporting Message Credential Dumping Location Identification Modify Control Logic Modify System Settings Exploitation of Vulnerability Memory Residence Modify System Settings Block Reporting Message Network Connection Enumeration Man in the Middle Modify Reporting Settings System Firmware Spoof Reporting Message Serial Connection Enumeration Alternate Modes of Operation Modify Reporting Message Modify Tag I/O Module Enumeration Block Reporting Message Modify Control Logic Remote System Discovery Spoof Reporting Message Modify Physical Device Display Network Service Scanning Modify Tag Modify HMI/Historian Reporting Modify Control Logic Modify Parameter Device Shutdown Modify Parameter System Firmware Modify Command Message Block Serial Comm Port Modify System Settings Alternate Modes of Operation Masquerading We donā€™t know where we are in this model just yet :-) https://attack.mitre.org/ Otis Alexander. Modeling Adversarial Behavior against ICS, S4ā€™19
  • 27. Ā© 2019 Access ā€¢ Target facility ā€¢ Discovery ā€¢ Access to needed assets ā€¢ Attack execution ā€¢ Trusted 3rd party (staging target) ā€¢ Access to target facility ā€¢ Access to needed assets ā€¢ Process comprehension ā€¢ Non-targeted/Opportunistic 27 Access Target facility Trusted 3rd party
  • 28. Ā© 2019 Targeting ā€¢ There are few known cases of strategic targeting ā€¢ Target might be also selected as best suitable certain criteria ā€¢ Collateral victim ā€¢ Opportunistic 28
  • 29. Ā© 2019 Venezuela, 2019 ā€¢ Suspected cyber-attack on Guri hydroelectric power plant ā€¢ Produces 80% of countryā€™s electricity ā€¢ Details of plantā€™s upgrade are publicly available, including possible remote access 29 https://twitter.com/cherepanov74/status/1104352761028722688
  • 30. Ā© 2019 Venezuela, 2019 ā€¢ Produces 80% of countryā€™s electricity ā€¢ Details of plantā€™s upgrade are publicly available, includible possible remote access 30 https://twitter.com/cherepanov74/status/1104352761028722688
  • 31. Ā© 2019 Ukraine, 2016 ā€¢ INDUSTROYER malware was deployed to shutdown electricity distribution at Pivnichna substation ā€¢ There is no strong indications that victim substation was strategic target ā€¢ Details of substation upgrade are publicly available 31
  • 32. Ā© 2019 Ukraine, 2016 ā€¢ INDUSTROYER malware work was used to shutdown electricity distribution at Pivnichna substation ā€¢ There is no strong indications that victim substation was strategic target ā€¢ Details of substation upgrade are publicly available 32 https://w3.siemens.com/smartgrid/global/en/products-systems- solutions/protection/distance-protection/pages/7sa63.aspx Targeted by malware
  • 33. Ā© 2019 Saudi Arabia, 2017 33 ā€¢ TRITON malware targeted Safety Instrumented Systems at petrochemical plant ā€¢ There is no strong indication that TRITON victim was strategic target ā€¢ Affected site could have been used as live drill and testing platform before attacking strategic target https://www.schneider- electric.com/ww/en/Images/tricon-IC-654x654.jpg
  • 34. Ā© 2019 Saudi Arabia, 2017 34 ā€¢ TRITON malware targeted Safety Instrumented Systems at petrochemical plant ā€¢ There is no strong indication that TRITON victim was strategic target ā€¢ Affected site could have been used as live drill and testing platform before attacking strategic target https://www.schneider- electric.com/ww/en/Images/tricon-IC-654x654.jpg
  • 35. Ā© 2019 Role of OSINT in Targeting ā€¢ The Internet is full of proprietary and confidential industrial documentation. ā€¢ Discovering helpful information about certain industrial facility may provoke targeting 35 https://www.amazon.com/Hack-World-OSINT-https://www.amazon.com/Open-Source-Intelligence- Techniques-Information/dp/1530508908
  • 36. Ā© 2019 Role of OSINT in Targeting ā€¢ The Internet is full of proprietary and confidential industrial documentation. ā€¢ Discovering helpful information about certain industrial facility may provoke targeting 36 https://www.amazon.com/Hack-World-OSINT-https://www.amazon.com/Open-Source-Intelligence- Techniques-Information/dp/1530508908
  • 37. Ā© 2019 Targeting 3rd parties (supply chain) ā€¢ Getting access to into target facilities ā€¢ Getting access to needed assets/equipment, āˆ’E.g. through maintenance support contracts ā€¢ Obtaining information related to target or potential victims āˆ’Engineering/networking/config documentation āˆ’User application (control logic), etc. 37
  • 38. Ā© 2019 Targeting 3rd parties (supply chain) ā€¢ Getting access to into target facilities ā€¢ Getting access to needed assets/equipment, āˆ’E.g. through maintenance support contracts ā€¢ Obtaining information related to target or potential victims āˆ’Engineering/networking/config documentation āˆ’User application (control logic), etc. 38
  • 39. Ā© 2019 National Advisories on the Threat 39 https://www.us-cert.gov/ncas/alerts/TA18-074A https://www.ncsc.gov.uk/news/ho stile-state-actors-compromising- uk-organisations-focus- engineering-and-industrial-control
  • 40. Ā© 2019 National Advisories on the Threat 40 https://www.us-cert.gov/ncas/alerts/TA18-074A https://www.ncsc.gov.uk/news/ho stile-state-actors-compromising- uk-organisations-focus- engineering-and-industrial-control
  • 41. Ā© 2019 Data Exposure is Penalizable in Regulated Facilities 41 ā€¢ NERC CIP-003-3 standard ā€¢ Sensitive utilityā€™s network infrastructure data were exposed via server of third- party service provider
  • 42. Ā© 2019 Role of Access Stage ā€¢ Access stage largely defines the selection of damage scenario ā€¢ Access driven āˆ’E.g., obtained access to specific equipment via 3rd party remote maintenance contract āˆ’Did not manage to access Safety Systems ā€¢ Information driven āˆ’E.g., obtained specific information about unhealthy state or repairs of equipment 42
  • 43. Ā© 2019 Discovery 43 Discovery Network Infrastructure Reconnaissance Process Comprehension http://eprints.lancs.ac.uk/88089/1/sample_sigconf.pdf ā€¢ Network reconnaissance ā€¢ Majority of this stage is similar to traditional IT recon process/attack life cycle, tools may differ ā€¢ Information enumeration ā€¢ Process comprehension ā€¢ Understanding exactly what the process is doing, how it is built, configured and programmed
  • 44. Ā© 2019 Discovery 44 Discovery Network Infrastructure Reconnaissance Process Comprehension http://eprints.lancs.ac.uk/88089/1/sample_sigconf.pdf ā€¢ Network reconnaissance ā€¢ Majority of this stage is similar to traditional IT recon process/attack life cycle, tools may differ ā€¢ Information enumeration ā€¢ Process comprehension ā€¢ Understanding exactly what the process is doing, how it is built, configured and programmed
  • 45. Ā© 2019 Control ā€¢ Least understood and studied stage among all ā€¢ It is about discovering: ā€¢ Dynamic model of the process and its limits ā€¢ Ability to control process ā€¢ Attack effect propagation ā€¢ Active stage in live environment 45 http://library.usc.edu.ph/ACM/SIGSAC%202017/cpss/p3.pdf
  • 47. Ā© 2019 Use Case: Killing UF Filter in Water Treatment Facility Acknowledgement: Sridhar Adepu and Prof. Aditya Mathur, SUTD, Singapore for conducting an experiment for this talk 47 https://itrust.sutd.edu.sg/testbeds/secure-water-treatment-swat/
  • 48. Ā© 2019 Use Case: Killing UF Filter in Water Treatment Facility ā€¢ Water treatment process consists of multiple stages, including several stages of filtering ā€¢ Water filters are expensive ā€¢ When broken, water supply is interrupted 48https://en.wikipedia.org/wiki/Ultrafiltration https://en.wikipedia.org/wiki/Reverse_osmosis
  • 49. Ā© 2019 UF Filtering: HMI Screen 49
  • 50. Ā© 2019 UF Filtering: PI&D Diagram 50
  • 51. Ā© 2019 UF Backwash: HMI and PI&D Diagram 51
  • 52. Ā© 2019 How Do We Pull This off? 52 ā€¢ There are tree conditions which can trigger backwash process, each guided by a state machine ā€¢ Preset timer (every 30 minutes) ā€¢ UF filter differential pressure (DP) ā‰„ 40 kPa ā€¢ Plant shutdown
  • 53. Ā© 2019 How Do We Pull This off? 53 ā€¢ There are tree conditions which can trigger backwash process, each guided by a state machine ā€¢ Preset timer (every 30 minutes) ā€¢ UF filter differential pressure (DP) ā‰„ 40 kPa ā€¢ Plant shutdown
  • 54. Ā© 2019 How Do We Pull This off? 54 ā€¢ There are tree conditions which can trigger backwash process, each guided by a state machine ā€¢ Preset timer (every 30 minutes) ā€¢ UF filter differential pressure (DP) ā‰„ 40 kPa ā€¢ Plant shutdown
  • 55. Ā© 2019 One Possible Attack Execution Scenario 55 L Tank T301 UF Pump P301Stage 3 ON LIT301 UF is active Valve MV303 Pump P602 Stage 4 Stage 6 1.1 MV303 OPEN 1.2 P602 ON Attckr Pressure in UF membrane will increase. But HOW MUCH? PLC3 PLC6
  • 56. Ā© 2019 Control Stage of Process Comprehension 56 ā€¢ Average UF filter DP is ā‰ˆ 12-13 kPa ā€¢ Max DP is 98 kPa, reached in 8 sec ā€¢ Process recovery (return to normal) is 5 sec ā€¢ Note, this data still does not tell us whether this pressure kills the UF filter and how quickly
  • 57. Ā© 2019 Control Stage of Process Comprehension 57 ā€¢ Average UF filter DP is ā‰ˆ 12-13 kPa ā€¢ Max DP is 98 kPa, reached in 8 sec ā€¢ Process recovery (return to normal) is 5 sec ā€¢ Note, this data still does not tell us whether this pressure kills the UF filter and how quickly https://www.controlglobal.com/articles/2015/a-lasting-plan-for-managing-alarms/
  • 58. Ā© 2019 Damage 58 ā€¢ Requires subject-matter knowledge (engineering) ā€¢ Cant take several forms ā€¢ Explosions (of course!) ā€¢ Equipment breakage ā€¢ Pollution ā€¢ Product Out of Specification ā€¢ Increased production costs, etc. https://img.izismile.com/img/img5/20120306/640/chemical_plant_accident_in_germany_640_04.jpg Damage Obtaining Feedback Preventing Response
  • 59. Ā© 2019 Attack Design != Implementation Success 59 Tank T401 Pump P401 Stage 4 LIT401 De-Chlorinator UV401 Flow meter FIT401 Stage 5 Reverse Osmosis filtering Attckr 1.1 FIT401 Spoofing to 0.4 FIT401 Spoofed value 1.1 UV401 OFF ORP meter AIT502 Attckr 2.1 AIT502 Spoof to Low PLC4 PLC5
  • 60. Ā© 2019 Cleanup ā€¢ In traditional hacking it is possible to execute the entire attack without being ever detected ā€¢ In process control it is not an option because of physical effect ā€¢ Create forensic footprint of what the investigators should identify as cause of the incident/accident āˆ’E.g. time attack to process troubleshooting 60
  • 62. Implant ā€œHardware or software modification designed to gain unauthorized control over specific system functionality.ā€
  • 63. OT Payload ā€œDigital implementation of (part of) a cyber-physical attackā€
  • 64. 64Ā© 2019 Why Implant ā€¢ Why not just modify control logic / change setpoints / send malicious command? ā€¢ For more complicated attacks ā€¢ Coordination, Feedback, Speed, Low-level functionality access ā€¢ Many scenarios possible without implants ā€¢ Eg. Ukraine 2015 & 2016
  • 67. 67Ā© 2019 Network Equipment Observing & learning OT traffic Manipulating OT traffic Dropping traffic to cause loss of control / view by suppressing alarm or signal
  • 68. 68Ā© 2019 Process & Safety Controllers Manipulate IO Prevent Safety Response Measure attack progress Suppress condition monitoring alerts
  • 69. 69Ā© 2019 Field Devices Spoofing sensor data at high speed Overriding digital safety mechanisms
  • 71. Ā© 2019 We want smooth native code execution 71 ā€¢ Need access to low-level, privileged functionality ā€¢ Memory-/Port-Mapped IO (MMIO/PMIO) ā€¢ Kernel memory objects ā€¢ Logic runtime memory ā€¢ Persistence mechanisms ā€¢ Ideally via silent hot-patching ā€¢ No reboots, no service restarts, no process upsets
  • 73. Ā© 2019 PLC 101 - Architecture 73 Standalone Modular Power Supply, CPU, I/O, Comms, ā€¦
  • 74. Ā© 2019 PLC 101 - Backplane 74 Inter-Module Databus Multibus, P-Bus, VMEbus, X-Bus, STD-32, PCIe, ā€¦
  • 75. Ā© 2019 PLC 101 ā€“ CPU Module Internals 75
  • 76. Ā© 2019 PLC 101 ā€“ Boot Sequence 76
  • 77. Ā© 2019 PLC 101 ā€“ Logic Program Execution 77
  • 78. Ā© 2019 PLC 101 - Scan Cycle 78
  • 80. Ā© 2019 Implant Installation 80 Escalate Privileges* Disable Diagnostics Relocate Implant Ensure Persistence* Set Hooks Go Resident * Optional Implant stability Eg. modify firmware or stored logic in flash
  • 81. Ā© 2019 Implant Design Considerations 81 Active Implant ā€¢ Includes OT payload ā€¢ Limits detection / network forensics exposure Dormant Implant ā€¢ OT payload delivered later ā€¢ Limits forensics exposure Persistence ā€¢ Complicated by code signing ā€¢ Need ability write to flash & enough space Memory Residence ā€¢ No reboot survival ā€¢ Limits forensics exposure
  • 82. Ā© 2019 We want scalability 82 ā€¢ Target different vendorsā€™ systems with similar implant functionality ā€¢ But limited number of players out there ā€¢ Eg. construct arsenal of generic templates for key DCS & safety controllers ā€¢ One-time upfront investment, no huge turnover
  • 83. Ā© 2019 Complication: Heterogeneity 83 Processor OS Runtime IO Interaction Memory Organization Security Features
  • 84. Ā© 2019 Complication: In-House vs Commercial 84 Proprietary SoC / ASIC* Proprietary OS / Executive Proprietary Runtime * https://sec-consult.com/en/blog/2019/02/reverse-engineering-architecture-pinout-plc/
  • 85. Ā© 2019 Example: Triconex SIS 85 ā€¢ In-House OS + Runtime, different processors & OS variants between versions of same product Triconex MP 9 (3006) Triconex MP 10 (3008) Triconex MP 11 (3009)
  • 86. Ā© 2019 Counter-Example: Rise of Commercial RTOSes & Runtimes 86
  • 87. Ā© 2019 Complication: Resource Constraints 87 ā€¢ MPC860, 50 MHz ā€¢ 6 MB Flash ā€¢ 16 MB DRAM ā€¢ 32 KB SRAM ā€¢ ARM9, 14 MHz ā€¢ 512 KB Boot Flash ā€¢ 8 MB RW Flash ā€¢ 2 MB SRAM You better enjoy Will need to fit implant in there ā€¢ Signals processing? Malicious logic? Comms? Often stretched by normal functionality already programmingā€¦
  • 88. Ā© 2019 Complication: Security Engineering 88 Domain & Privilege Separation Firmware & Logic Signing Sandboxing Exploit Mitigations Programming Key-locks https://images-na.ssl-images-amazon.com/images/I/41jr93jKzML._SX466_.jpg, https://security.cs.pub.ro/summer-school/wiki/session/10
  • 90. Ā© 2019 90 TRITON / Trisis / HatMan (2017)
  • 91. Ā© 2019 TRITON Attack Overview 91 https://www.cyberark.com/threat-research-blog/anatomy-triton-malware-attack/
  • 92. Ā© 2019 TRITON injects ā€˜dormantā€™ implant into Triconex controller memory 92 TriStation Engineering Protocol Eng. Workstation ā€œYour wish is my commandā€ Logic Download (compiled for PPC, executed on CPU) trilog.exe ā€¢ script_test.py ā€¢ library.zip ā€¢ inject.bin ā€¢ imain.bin ā€œExecute my shellcode pleaseā€
  • 93. Ā© 2019 Why not just modify firmware? 93 Firmware Download (FC 0x50: unauthenticated, unsigned) Controller reboots into download mode, logic execution interrupted! Logic Append (FC 0x01: unauthenticated, unsigned) New logic appended to circular linked program list, logic continues running!
  • 94. Ā© 2019 Implant Installation 94 ā€¢ Safety program executed in user mode ā€¢ Need supervisor to flush icache & apply mods ā€¢ Privilege level set in PPC MSR register, NW for user * ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A) Requires Supervisor Privileges
  • 95. Ā© 2019 Stage 2: Privilege Escalation 95 Escalate Privileges* Disable Diagnostics Relocate Implant Ensure Persistence* Set Hooks Go Resident * ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A) ā€¢ Exploit syscall 0x13 (SOE Status) to modify MSR while in supervisor mode, set saved MSR bit ā€¢ No memory permissions, can write anywhere in user mode, including kernel globals. Exploit write-what-where.
  • 96. Ā© 2019 Stage 2: Disable RAM Check 96 Escalate Privileges* Disable Diagnostics Relocate Implant Ensure Persistence* Set Hooks Go Resident * ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A) Originally conditional branch
  • 97. Ā© 2019 Stage 2: Relocate Implant 97 Escalate Privileges* Disable Diagnostics Relocate Implant Ensure Persistence* Set Hooks Go Resident * ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A) Ensures Residence Even with full logic wipe
  • 98. Ā© 2019 Stage 2: Modify Network Command Handler 98 Escalate Privileges* Disable Diagnostics Relocate Implant Ensure Persistence* Set Hooks Go Resident * ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A) ā€¢ Entry 0x1D (Get MP Status) ā€¢ Allows for network comms
  • 99. Ā© 2019 Stage 3: Implant 99 * ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
  • 100. Ā© 2019 Stage 3: Implant 100 * ICS-CERT MAR-17-352-01 HatManā€”Safety System Targeted Malware (Update A)
  • 101. Ā© 2019 Stage 4: OT Payload 101 ā€¢ Once implant is injected we have dormant ā€˜god modeā€™ ā€¢ Arbitrary supervisor RWX over network ā€¢ Deliver OT payload at later moment ā€¢ Not recovered from incident, but we can speculate ā€¦
  • 102. 102Ā© 2019 AGENDA 1. Introduction 2. Cyber-Physical Attack Lifecycle 3. Implants 4. OT Payloads 5. Conclusion
  • 103. Ā© 2019 Damage Stage 103 1 Manipulate the process Prevent response Direct Indirect Manipulation of actuators Deceive controller/ operator about process state (e.g. spoof sensor) 2 Operators Control / Safety System Blind Mislead Modify operational / safety limits Blind about process state 3 Obtain Feedback Direct or Derived (e.g., via proxy sensors /calculations)
  • 105. Ā© 2019 I/O Manipulation 105 ā€¢ Simple concept, non-trivial execution ā€¢ Many different approaches ā€¢ Depends on how IO image tables are populated, how IO is wired to chip executing logic ā€¢ Different technical ways to achieve same goal
  • 106. Ā© 2019 I/O Manipulation 106 * Ghost in the PLC ā€“ Ali Abbasi & Majid Hashemi, BlackHat EU 2016 ā€¢ Memory Breakpoint ā€¢ Patch Instructions ā€¢ Change Memory Permissions
  • 107. Ā© 2019 I/O Manipulation 107 * https://www.nrc.gov/docs/ML0932/ML093290420.pdf Hook accesses to IO portion of shared memory Hook bus handler routines * www.amikonplc.com/, www.kenosha-reuse.com
  • 108. Ā© 2019 Complication: Field Device Limitations 108 ā€¢ Cyber limitations might be placed on theoretically feasible functionality for protective reasons* ā€¢ Valve closing speed ā€¢ Non-digitally alterable VFD skip frequences ā€¢ Prevents IO manipulation from achieving desired result ā€¢ Overcoming this requires implanting field device ā€¢ Patch out limitations / sanity checks * Similar problem in automotive where certain diagnostic messages are disallowed above certain speeds
  • 110. Ā© 2019 Alarm Suppression 110 ā€¢ Again: simple concept, non-trivial execution ā€¢ We want to prevent an outgoing alarm being raised or incoming alarm being acted upon ā€¢ Might require very different approaches ā€¢ Alarm raised with dedicated protocol message ā€¢ Alarm signal via IO ā€¢ Alarm bit in flag accompanying read PV
  • 114. Ā© 2019 Example: Simple water tank level alarm 114 Safety program resides in memory as code, modify to set alarm to fixed false
  • 119. Ā© 2019 Why relax or tighten instead of suppress? 119 ā€¢ Donā€™t prevent alarm from being raised but change conditions ā€¢ Limits, deadband, priority ā€¢ Relax: Stealth during scheduled testing ā€¢ Tighten: Cause hard-to-resolve alarm storms
  • 120. Ā© 2019 Hook functionality that decides whether to raise alarm 120 ā€¢ Can be data (limit, priority, deadband): overwrite in RAM ā€¢ Make sure to spoof values when queried! ā€¢ Or code (alarm logic): patch instructions
  • 122. Ā© 2019 Implants need to synchronize 122 * https://en.wikipedia.org/wiki/Bioreactor Pressure, temperature, pH, moisture, ā€¦ 4. Change agitator speed 2. Change air / medium inflow 1. Process state A 3. Process state B
  • 123. Ā© 2019 Expectation vs Reality 123 These can be in completely different parts of the process, on different networks Might not see much electronic chatter after implanting
  • 124. Ā© 2019 Process state change detection 124 * https://github.com/sysml/blockmon, https://godbolt.org/ * CPS: Driving Cyber-Physical Systems to Unsafe Operating Conditions by Timing DoS Attacks on Sensor Signals ā€“ M. Krotofil et al. 17640 bytes ~= 0.11% of DRAM (unoptimized) Non-Parametric Cumulative Sum (NCUSUM)
  • 125. 125Ā© 2019 AGENDA 1. Introduction 2. Cyber-Physical Attack Lifecycle 3. Implants 4. OT Payloads 5. Conclusion
  • 126. Ā© 2019 Conclusion 126 Attack Integration & Testing OT Payload Integration & Testing Implant Integration & Testing Damage Scenario Design OT Payload Design Implant Design Exploit Implementa tion Implant Implementa tion OT Payload Implementa tion Marina Jos
  • 127. Ā© 2019 Appreciation 127 ā€¢ Sridhar Adepu & Prof. Aditya Mathur ā€¢ Jason Larsen