SlideShare a Scribd company logo
1 of 15
1
ADVANCED METERING INFRASTRUCTURE
(AMI)
SECURITY TEST
2
agenda
AMI Infrastructure (simplified)
AMI Threat Model
Approach to AMI Security Testing
3
Central System
RF Point to Point
RF Mesh
Cell Tower
Data Concentrator
Smart Meter
RF Tower
Data Concentrator
Power line
Data Concentrator
Direct Link
Smart Meter
AMI INFRASTRUCTURE
SIMPLIFIED VIEW
4
Smart Meter
Data Concentrator
Central System
• Firmware Manipulation
• Connection Tampering
• Integrity Loss
• Authentication bypass
• Frauds
• MiTM
• Assurance Loss
• Information Leaks (GDPR/privacy)
Threats
Threats
Actors
Impacts
• Fraudsters
• Malicious Insider
• Malicious Customers
• Skilled Attacker
• Malicious Insider
• Malicious Customers
• Skilled Attacker
• Hacktivists
• Malicious Insider
• Hacktivists
• High Profile Attackers
• Rogue Data Concentrator
• Data Concentrator SW Flaws
• Connection Tampering
• Smart Meters compromission
• MiTM
• Authentication bypass
• Targeted Attacks
• Frauds
• Provisioning Loss
• Information Leaks (GDPR/privacy)
• Network Flaws
• Applications Flaws
• Internal Systems Compromission
• Data Loss
• Infrastructure Control Loss
• Provisioning Loss
• Assurance Loss
• Reputation Loss
• Information Leaks (GDPR/privacy)
AMI THREAT MODEL
OVERVIEW
5
Component Threat Explanation Exposure Difficulty
Smart Meter Firmware Manipulation
Attackers can extract firmware from Meter, manipulate it
and/or redeploy firmware in order to :
• Extract authentication data and reuse for an
authentication attack
• Extract crypto keys and reuse them for connection
tampering attack
• Reprogram firmware for billing fraud
• Physical Harm
Physical access
Medium :
Attackers need
deep knowledge of
Meter (more simple
for an insider)
Smart Meter Connection Tampering
Attackers can accomplish MiTM attacks; with this kind of
attacks is possible access to exchanged data between Meter
and collectors and analyze communication protocols in order
to:
• intercept data from Meter to central systems/data
concentrator and change values to spoof the Meter
identity and/or billing data
Remote
High :
Attackers need
deep knowledge of
infrastructure and
crypto used on
data in motion
AMI THREAT MODEL
DRILL DOWN (1/3)
6
Component Threat Explanation Exposure Difficulty
Data Concentrator Rogue Data Concentrator
Attackers can build a fake Data Concentrator, this kind of
attack can be exploited to send down a large number of
Meters (out of grid) and generate :
• Grid instability
• Drop/Spike in demand (provisioning systems
failures)
• Push Manipulated firmware to Meters
Remote
High :
Attackers need
deep knowledge of
infrastructure ad
must be skilled
technology
Data Concentrator Connection Tampering
Data Concentrator usually is in the middle between Meters
and central system, the best place to perform a MiTM attack,
exploiting DC through an application flaw or physically in
order to :
• Disaggregation attacks for profiling customer
energy consumption behavior - Privacy Breach -
• Disruption of grid (DoG)
• Tamper Data for billing frauds
Remote
Medium :
Attackers need
deep knowledge of
Data Concentrator
(more simple for an
insider/developer)
AMI THREAT MODEL
DRILL DOWN (2/3)
7
Component Threat Explanation Exposure Difficulty
Central System Network Flaws
Attackers can obtain access to AMI Central Systems exploiting
various network flaws (VPN leaked credentials,
misconfigurations in network devices, …)
This kind of attack can be focused on :
• Disrupt of grid (DoG)
• Customer data theft
• Billing Frauds
• ….
Local and Remote
High :
Attackers must be
skilled and leverage
on 0days (network
devices) or high
profile attack
vectors
Central System Application Flaws
High skilled attackers can target Central System Applications
with conventional or unconventional attack vector
(spearphishing, account theft, account leaks…) in order to :
• Disrupt of grid (DoG)
• Customer data theft
• Billing Frauds
• ….
Local and Remote
Medium :
Attackers must be
skilled and use high
profile attack
vectors
AMI THREAT MODEL
DRILL DOWN (3/3)
8
Firmware Manipulation – Meter
Connection Tampering – Meter
Rogue Data Concentrator – Data Concentrator
Connection Tampering – Data Concentrator
Network Flaws – Central System
Application Flaws – Central System
Exposure
Difficulty
A
B
C
D
E
F
A
B
C
D
E
F
AMI THREAT MODEL
APPLICABILITY
9
Insider carry out information on
Meter Infrastructure like meter
firmware, radio configuration, on-
board security keys and certificates
Attackers analyze hardware components and attack surface:
- Eye-contact / Datasheet-based analysis of board trying to
identify chip / memory components / IO/UART ports
- Tools for assisted discovery of on-chip debug interfaces
- Bus step-by-step reconstruction, identifying useless and
useful PINs
Billing systems are misled
due to untrusted data
sent by Meters
Identify optical port, useful for
reprogramming firmware without deep
hardware interaction
Try to sell the
“service” to retail and
business customers
Develop a firmware
with a billing
mechanism bypass
logic
CASE STUDY
METER FRAUD
10
Meter hardware analysis
Using appropriate tools in order to disassemble
hardware enclosure and perform inspection of logic
board underlining:
• Chip manufacture, models and packaging (TSOP
,
BGA, TLGA)
• Research of related datasheet
• Identify I/O ports like UART, Optical, JTAG with visual
inspection or tool’s aided inspection (ex: JTAGulator,
Bus-Pirate)
• Identify bus using components datasheet and step-
by-step reconstruction, identifying useless and
useful PINs
• Dumping memory (chip-off or JTAG) and firmware
extraction
• Analysis on going data with logic analyzer
• Shaping possible attack points
Immagine a scopo illustrativo
CASE STUDY
METER FRAUD > DRILL DOWN
11
Attackers analyze Data
Collectors physical deploy
location, exposed services
scanning by connecting to it and
system fingerprinting
Find some design and software
flaws (deployed services and OS) /
misconfigurations / weak
credentials (Telnet, SSH, etc…) /
MiTM (ex: GPRS network via Fake-
BTS)
Exploit weaknesses in
order to take device
control (ex: weak SSH
or Telnet credentials)
Attackers can perform :
MiTM attack and on going
data tampering (ex: on
DLMS-COSEM protocol)
Meters are under control of
attackers that can perform :
• Denial of Grid (DoG)
• Billing Frauds
• Etc …
Privacy of customers is
compromised
New manipulated firmware
is pushed to Meters
After compromission a
disaggregation attacks is
carried on
Customers data are
monitored and
under control of
attackers
Attackers acquire
radio configuration,
security keys and
certificates
contained in
memory or on the
file system
CASE STUDY
DATA CONCENTRATOR MULTI-VECTOR ATTACK
12
Immagine a scopo illustrativo
Data Collector analysis starts from physical analysis:
"where is deployed, accessibility and packaging"
and goes beyond to understand which kind of
technology is deployed :
• Communication analysis (RF, ZigBee, GPRS etc…)
to try a MiTM using specialized hardware like fake-
BTS and SDR radio
• Trying a physical access in order to identify
Ethernet ports, serials etc…
When entry point is found, next step is to analyze
exposed network services and exploitation :
• Port scan, banner grabbing and OS fingerprint
• Default credentials brute-force / exploit known
vulnerabilities on exposed services
• System access and privilege escalation
• Firmware dumping for sensitive data extraction
(certificates, keychains, sensitive executables for
further analysis)
Data Concentrator analysis
CASE STUDY
DATA CONCENTRATOR MULTI-VECTOR ATTACK > DRILL DOWN
13
Spear phishing to gain
access to the business
networks of the energy
company
Theft of credentials
from the business
networks using ad-
hoc malware
The use of virtual
private networks
(VPNs) to enter the
Internal network
Serial-to-ethernet communications
devices impacted at a firmware level
(e.g. ModBus over Ethernet
converters)
Utilizing UPS systems to
impact connected load
with a scheduled
service outage
Telephone denial-
of-service attack
on the call center
The use of existing
remote access tools
within the environment
(VNC, access to remote
Dashboard over HTTP)
or issuing commands
directly from a remote
station similar to an
operator HMI
Access to BSS sytems and
Billing Data theft,
exfiltrated to a remote
C&C (ex: over HTTP or
DNS)
Infrastructure
Break Down
The use of a modified
KillDisk to erase the
master boot record of
impacted
organization systems
Access to OSS
sytems and OT
infrastructure
(SCADA control
systems)
CASE STUDY
CENTRAL SYSTEM MULTI-VECTOR ATTACK
14
Immagine a scopo illustrativo
Central System is a complex system where Business
Support Systems and Operational Support Systems
live together, with no well-defined boundaries and
security problems are inherited from both IT and OT
systems. The first step to analyze CS is
understanding the perimeter:
• External exposure on Internet
• People working in and eventually being targeted
• IT and OT boundaries and network segregation
The second one is understanding security maturity
with:
• Deployed security countermeasure review (SIEM,
Policies, Firewall/IPS rules, Patch management
etc..)
• Perform scans to find exposed services and
known vulnerabilities
• Perform Penetration Tests to uncover undisclosed
vulnerabilities on IT and OT infrastructure
Central System analysis
CASE STUDY
CENTRAL SYSTEM MULTI-VECTOR ATTACK > DRILL DOWN
GRAZIE

More Related Content

Similar to Advanced Metering Infrastructure Security Test.pptx

Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationAuliaArifWardana
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems aswanthmrajeev112
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkPrecisely
 
2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel AvilaReenergize
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 

Similar to Advanced Metering Infrastructure Security Test.pptx (20)

Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Avila 3 b
Avila 3 bAvila 3 b
Avila 3 b
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Data diode
Data diode Data diode
Data diode
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
 
2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 

More from Francesco Faenzi

Industry 4.0 CyberSecurity Assessment.pptx
Industry 4.0 CyberSecurity Assessment.pptxIndustry 4.0 CyberSecurity Assessment.pptx
Industry 4.0 CyberSecurity Assessment.pptxFrancesco Faenzi
 
Customer digital identity and consent management
Customer digital identity and consent managementCustomer digital identity and consent management
Customer digital identity and consent managementFrancesco Faenzi
 
Identità digitale e identità in real-life: rischi e rimedi
Identità digitale e identità in real-life: rischi e rimediIdentità digitale e identità in real-life: rischi e rimedi
Identità digitale e identità in real-life: rischi e rimediFrancesco Faenzi
 
Telegram chatbot - considerazioni di sicurezza
Telegram chatbot - considerazioni di sicurezzaTelegram chatbot - considerazioni di sicurezza
Telegram chatbot - considerazioni di sicurezzaFrancesco Faenzi
 
Cyber Threat Intelligence - La rilevanza del dato per il business
Cyber Threat  Intelligence - La rilevanza del dato per il businessCyber Threat  Intelligence - La rilevanza del dato per il business
Cyber Threat Intelligence - La rilevanza del dato per il businessFrancesco Faenzi
 
Cybercrime underground: Vendita ed evoluzione del carding
Cybercrime underground: Vendita ed evoluzione del cardingCybercrime underground: Vendita ed evoluzione del carding
Cybercrime underground: Vendita ed evoluzione del cardingFrancesco Faenzi
 
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in EuropeUPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in EuropeFrancesco Faenzi
 
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...Francesco Faenzi
 
Analisi del fenomeno carding nei blackmarket
Analisi del fenomeno carding nei blackmarketAnalisi del fenomeno carding nei blackmarket
Analisi del fenomeno carding nei blackmarketFrancesco Faenzi
 
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case studyAdvanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case studyFrancesco Faenzi
 
Analysis of exposed ICS//SCADA/IoT systems in Europe
Analysis of exposed ICS//SCADA/IoT systems in EuropeAnalysis of exposed ICS//SCADA/IoT systems in Europe
Analysis of exposed ICS//SCADA/IoT systems in EuropeFrancesco Faenzi
 
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...Francesco Faenzi
 

More from Francesco Faenzi (12)

Industry 4.0 CyberSecurity Assessment.pptx
Industry 4.0 CyberSecurity Assessment.pptxIndustry 4.0 CyberSecurity Assessment.pptx
Industry 4.0 CyberSecurity Assessment.pptx
 
Customer digital identity and consent management
Customer digital identity and consent managementCustomer digital identity and consent management
Customer digital identity and consent management
 
Identità digitale e identità in real-life: rischi e rimedi
Identità digitale e identità in real-life: rischi e rimediIdentità digitale e identità in real-life: rischi e rimedi
Identità digitale e identità in real-life: rischi e rimedi
 
Telegram chatbot - considerazioni di sicurezza
Telegram chatbot - considerazioni di sicurezzaTelegram chatbot - considerazioni di sicurezza
Telegram chatbot - considerazioni di sicurezza
 
Cyber Threat Intelligence - La rilevanza del dato per il business
Cyber Threat  Intelligence - La rilevanza del dato per il businessCyber Threat  Intelligence - La rilevanza del dato per il business
Cyber Threat Intelligence - La rilevanza del dato per il business
 
Cybercrime underground: Vendita ed evoluzione del carding
Cybercrime underground: Vendita ed evoluzione del cardingCybercrime underground: Vendita ed evoluzione del carding
Cybercrime underground: Vendita ed evoluzione del carding
 
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in EuropeUPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
 
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
 
Analisi del fenomeno carding nei blackmarket
Analisi del fenomeno carding nei blackmarketAnalisi del fenomeno carding nei blackmarket
Analisi del fenomeno carding nei blackmarket
 
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case studyAdvanced Persistent Threat in ICS/SCADA/IOT world: a case study
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
 
Analysis of exposed ICS//SCADA/IoT systems in Europe
Analysis of exposed ICS//SCADA/IoT systems in EuropeAnalysis of exposed ICS//SCADA/IoT systems in Europe
Analysis of exposed ICS//SCADA/IoT systems in Europe
 
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
 

Recently uploaded

Balancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptxBalancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptxjoshuaclack73
 
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...Amil Baba Dawood bangali
 
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhMatrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhjoshuaclack73
 
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证mestb
 
NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...
NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...
NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...Amil baba
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
Vibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxVibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxjoshuaclack73
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.ECoyShastriBhawan
 
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec QatarBuy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatarsamsungultra782445
 
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...Amil baba
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...drjose256
 
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...daisycvs
 
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证mestb
 

Recently uploaded (15)

Balancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptxBalancing of rotating bodies questions.pptx
Balancing of rotating bodies questions.pptx
 
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
 
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhMatrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
 
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
 
NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...
NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...
NO1 Qari Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In R...
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
 
Vibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxVibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptx
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
 
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec QatarBuy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
 
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
Top^Clinic Soweto ^%[+27838792658_termination in florida_Safe*Abortion Pills ...
 
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
[[Jeddah]] IN RIYADH +2773-7758557]] Abortion pills in Jeddah Cytotec in Riya...
 
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
 

Advanced Metering Infrastructure Security Test.pptx

  • 2. 2 agenda AMI Infrastructure (simplified) AMI Threat Model Approach to AMI Security Testing
  • 3. 3 Central System RF Point to Point RF Mesh Cell Tower Data Concentrator Smart Meter RF Tower Data Concentrator Power line Data Concentrator Direct Link Smart Meter AMI INFRASTRUCTURE SIMPLIFIED VIEW
  • 4. 4 Smart Meter Data Concentrator Central System • Firmware Manipulation • Connection Tampering • Integrity Loss • Authentication bypass • Frauds • MiTM • Assurance Loss • Information Leaks (GDPR/privacy) Threats Threats Actors Impacts • Fraudsters • Malicious Insider • Malicious Customers • Skilled Attacker • Malicious Insider • Malicious Customers • Skilled Attacker • Hacktivists • Malicious Insider • Hacktivists • High Profile Attackers • Rogue Data Concentrator • Data Concentrator SW Flaws • Connection Tampering • Smart Meters compromission • MiTM • Authentication bypass • Targeted Attacks • Frauds • Provisioning Loss • Information Leaks (GDPR/privacy) • Network Flaws • Applications Flaws • Internal Systems Compromission • Data Loss • Infrastructure Control Loss • Provisioning Loss • Assurance Loss • Reputation Loss • Information Leaks (GDPR/privacy) AMI THREAT MODEL OVERVIEW
  • 5. 5 Component Threat Explanation Exposure Difficulty Smart Meter Firmware Manipulation Attackers can extract firmware from Meter, manipulate it and/or redeploy firmware in order to : • Extract authentication data and reuse for an authentication attack • Extract crypto keys and reuse them for connection tampering attack • Reprogram firmware for billing fraud • Physical Harm Physical access Medium : Attackers need deep knowledge of Meter (more simple for an insider) Smart Meter Connection Tampering Attackers can accomplish MiTM attacks; with this kind of attacks is possible access to exchanged data between Meter and collectors and analyze communication protocols in order to: • intercept data from Meter to central systems/data concentrator and change values to spoof the Meter identity and/or billing data Remote High : Attackers need deep knowledge of infrastructure and crypto used on data in motion AMI THREAT MODEL DRILL DOWN (1/3)
  • 6. 6 Component Threat Explanation Exposure Difficulty Data Concentrator Rogue Data Concentrator Attackers can build a fake Data Concentrator, this kind of attack can be exploited to send down a large number of Meters (out of grid) and generate : • Grid instability • Drop/Spike in demand (provisioning systems failures) • Push Manipulated firmware to Meters Remote High : Attackers need deep knowledge of infrastructure ad must be skilled technology Data Concentrator Connection Tampering Data Concentrator usually is in the middle between Meters and central system, the best place to perform a MiTM attack, exploiting DC through an application flaw or physically in order to : • Disaggregation attacks for profiling customer energy consumption behavior - Privacy Breach - • Disruption of grid (DoG) • Tamper Data for billing frauds Remote Medium : Attackers need deep knowledge of Data Concentrator (more simple for an insider/developer) AMI THREAT MODEL DRILL DOWN (2/3)
  • 7. 7 Component Threat Explanation Exposure Difficulty Central System Network Flaws Attackers can obtain access to AMI Central Systems exploiting various network flaws (VPN leaked credentials, misconfigurations in network devices, …) This kind of attack can be focused on : • Disrupt of grid (DoG) • Customer data theft • Billing Frauds • …. Local and Remote High : Attackers must be skilled and leverage on 0days (network devices) or high profile attack vectors Central System Application Flaws High skilled attackers can target Central System Applications with conventional or unconventional attack vector (spearphishing, account theft, account leaks…) in order to : • Disrupt of grid (DoG) • Customer data theft • Billing Frauds • …. Local and Remote Medium : Attackers must be skilled and use high profile attack vectors AMI THREAT MODEL DRILL DOWN (3/3)
  • 8. 8 Firmware Manipulation – Meter Connection Tampering – Meter Rogue Data Concentrator – Data Concentrator Connection Tampering – Data Concentrator Network Flaws – Central System Application Flaws – Central System Exposure Difficulty A B C D E F A B C D E F AMI THREAT MODEL APPLICABILITY
  • 9. 9 Insider carry out information on Meter Infrastructure like meter firmware, radio configuration, on- board security keys and certificates Attackers analyze hardware components and attack surface: - Eye-contact / Datasheet-based analysis of board trying to identify chip / memory components / IO/UART ports - Tools for assisted discovery of on-chip debug interfaces - Bus step-by-step reconstruction, identifying useless and useful PINs Billing systems are misled due to untrusted data sent by Meters Identify optical port, useful for reprogramming firmware without deep hardware interaction Try to sell the “service” to retail and business customers Develop a firmware with a billing mechanism bypass logic CASE STUDY METER FRAUD
  • 10. 10 Meter hardware analysis Using appropriate tools in order to disassemble hardware enclosure and perform inspection of logic board underlining: • Chip manufacture, models and packaging (TSOP , BGA, TLGA) • Research of related datasheet • Identify I/O ports like UART, Optical, JTAG with visual inspection or tool’s aided inspection (ex: JTAGulator, Bus-Pirate) • Identify bus using components datasheet and step- by-step reconstruction, identifying useless and useful PINs • Dumping memory (chip-off or JTAG) and firmware extraction • Analysis on going data with logic analyzer • Shaping possible attack points Immagine a scopo illustrativo CASE STUDY METER FRAUD > DRILL DOWN
  • 11. 11 Attackers analyze Data Collectors physical deploy location, exposed services scanning by connecting to it and system fingerprinting Find some design and software flaws (deployed services and OS) / misconfigurations / weak credentials (Telnet, SSH, etc…) / MiTM (ex: GPRS network via Fake- BTS) Exploit weaknesses in order to take device control (ex: weak SSH or Telnet credentials) Attackers can perform : MiTM attack and on going data tampering (ex: on DLMS-COSEM protocol) Meters are under control of attackers that can perform : • Denial of Grid (DoG) • Billing Frauds • Etc … Privacy of customers is compromised New manipulated firmware is pushed to Meters After compromission a disaggregation attacks is carried on Customers data are monitored and under control of attackers Attackers acquire radio configuration, security keys and certificates contained in memory or on the file system CASE STUDY DATA CONCENTRATOR MULTI-VECTOR ATTACK
  • 12. 12 Immagine a scopo illustrativo Data Collector analysis starts from physical analysis: "where is deployed, accessibility and packaging" and goes beyond to understand which kind of technology is deployed : • Communication analysis (RF, ZigBee, GPRS etc…) to try a MiTM using specialized hardware like fake- BTS and SDR radio • Trying a physical access in order to identify Ethernet ports, serials etc… When entry point is found, next step is to analyze exposed network services and exploitation : • Port scan, banner grabbing and OS fingerprint • Default credentials brute-force / exploit known vulnerabilities on exposed services • System access and privilege escalation • Firmware dumping for sensitive data extraction (certificates, keychains, sensitive executables for further analysis) Data Concentrator analysis CASE STUDY DATA CONCENTRATOR MULTI-VECTOR ATTACK > DRILL DOWN
  • 13. 13 Spear phishing to gain access to the business networks of the energy company Theft of credentials from the business networks using ad- hoc malware The use of virtual private networks (VPNs) to enter the Internal network Serial-to-ethernet communications devices impacted at a firmware level (e.g. ModBus over Ethernet converters) Utilizing UPS systems to impact connected load with a scheduled service outage Telephone denial- of-service attack on the call center The use of existing remote access tools within the environment (VNC, access to remote Dashboard over HTTP) or issuing commands directly from a remote station similar to an operator HMI Access to BSS sytems and Billing Data theft, exfiltrated to a remote C&C (ex: over HTTP or DNS) Infrastructure Break Down The use of a modified KillDisk to erase the master boot record of impacted organization systems Access to OSS sytems and OT infrastructure (SCADA control systems) CASE STUDY CENTRAL SYSTEM MULTI-VECTOR ATTACK
  • 14. 14 Immagine a scopo illustrativo Central System is a complex system where Business Support Systems and Operational Support Systems live together, with no well-defined boundaries and security problems are inherited from both IT and OT systems. The first step to analyze CS is understanding the perimeter: • External exposure on Internet • People working in and eventually being targeted • IT and OT boundaries and network segregation The second one is understanding security maturity with: • Deployed security countermeasure review (SIEM, Policies, Firewall/IPS rules, Patch management etc..) • Perform scans to find exposed services and known vulnerabilities • Perform Penetration Tests to uncover undisclosed vulnerabilities on IT and OT infrastructure Central System analysis CASE STUDY CENTRAL SYSTEM MULTI-VECTOR ATTACK > DRILL DOWN