SlideShare a Scribd company logo
Contemporary	
  threats	
  to	
  
cri0cal	
  and	
  mobile	
  infrastructures	
  
Are	
  we	
  soon	
  deaf,	
  blind	
  and	
  muted	
  ?	
  
	
  
ANSES	
  Rah	
  Rah	
  7,	
  Singapore	
  
January	
  2010	
  
	
  
	
  
Filip	
  Maertens	
  
Avydian	
  Cyber	
  Defense	
  




                                                               Cyber	
  Defense	
  Group	
  
Agenda	
  

➤  About	
  the	
  speaker	
  
➤  CriEcal	
  Infrastructures:	
  state	
  of	
  affairs	
  
➤  Trending	
  threats	
  for	
  criEcal	
  infrastructures	
  
➤  The	
  imminent	
  risk	
  of	
  our	
  mobile	
  networks	
  
➤  What	
  are	
  we	
  up	
  against	
  ?	
  




                                                                    Cyber	
  Defense	
  Group	
  
About	
  the	
  speaker	
  

➤  CEO	
  and	
  Founder	
  Avydian	
  Cyber	
  Defense	
  Group	
  
➤  President	
  Cyber-­‐Security	
  at	
  European	
  Corporate	
  Security	
  AssociaEon	
  
➤  Cybercrime	
  invesEgator	
  
➤  CISSP,	
  CISM,	
  CISA,	
  CPO,	
  CFE	
  and	
  CCSP	
  (“cer7fied	
  common	
  sense	
  prac77oner”)	
  
➤  MSc.	
  InformaEon	
  Risk	
  and	
  BSc.	
  InformaEon	
  OperaEons	
  
➤  Guest	
  professor	
  on	
  capita	
  selecta	
  on	
  Cyber	
  Warfare	
  
➤  Cyber	
  Security	
  Auditor	
  &	
  Advisor	
  for	
  <this_is_where_you_go_bleep>	
  


                                                                                                          Cyber	
  Defense	
  Group	
  
Cri0cal	
  Infrastructures:	
  state	
  of	
  affairs	
  
                        	
  
    (no,	
  not	
  another	
  stuxnet	
  talk)	
  




                                                           Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  Where	
  do	
  we	
  find	
  IT	
  components	
  and	
  
   other	
  modern	
  technologies	
  within	
  
   criEcal	
  infrastructures:	
  
      ➤  Nuclear,	
  oil	
  and	
  gas	
  industry	
  
      ➤  Air	
  traffic	
  and	
  railways	
  
      ➤  Power	
  generaEon,	
  transmission	
  and	
  metering	
  
      ➤  Water	
  management	
  
      ➤  Satellites	
  




                                                                      Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  What	
  do	
  industrial	
  systems	
  do	
  for	
  you	
  ?	
  
      ➤  Supply	
  power	
  to	
  your	
  home	
  
      ➤  Provide	
  drinkable	
  water	
  to	
  your	
  home	
  
      ➤  Traffic	
  lights	
  
      ➤  Control	
  commuter	
  trains	
  
      ➤  Regulate	
  the	
  air	
  condiEoning	
  in	
  the	
  office	
  
      ➤  Ensure	
  you	
  can	
  make	
  mobile	
  and	
  landline	
  
         phone	
  calls	
  
      ➤  …	
  


                                                                          Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  But,	
  let’s	
  not	
  cry	
  wolf:	
  
       ➤  2003	
  U.S.	
  East	
  Cast	
  Black	
  out	
  
       ➤  2008	
  Spanair	
  Crash	
  

➤  Who	
  benefits	
  from	
  FUD:	
  
       ➤  IT	
  Security:	
  New	
  Business	
  =	
  Profit	
  (2016:	
  7	
  billion	
  USD)	
  
       ➤  Safety:	
  Loss	
  of	
  Business	
  =	
  Loss	
  

➤  Reliable	
  incident	
  reports	
  is	
  what	
  we	
  need	
  !	
  



                                                                                                   Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  




                                                           Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  Basic	
  SCADA	
  architecture:	
                             Blaster	
  
     ➤  Human	
  Management	
  Interface	
  (HMI)	
  
     ➤  Remote	
  Terminal	
  Unit	
  (RTU)	
  
     ➤  Programmable	
  Logic	
  Controller	
  (PLC)	
  
     ➤  CommunicaEon	
  Infrastructure	
  

➤  Typical	
  SCADA	
  protocols:	
  
     ➤  Raw	
  data	
  protocols:	
  modbus,	
  DNP3,	
  …	
  
     ➤  High	
  level	
  protocols:	
  ICCP,	
  OPC,	
  …	
  



                                                                               Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  0.01%	
  of	
  recorded	
  incidents	
  (that	
  make	
  you	
  think):	
  
      ➤  2000,	
  Russian	
  hackers	
  seized	
  control	
  of	
  the	
  gas	
  pipeline	
  network	
  
      ➤  2003,	
  Ohio	
  Davis-­‐Besse	
  nuclear	
  plant	
  safety	
  monitoring	
  system	
  down	
  for	
  five	
  hours	
  
      ➤  2007,	
  Simple	
  PING	
  sweep	
  acEvated	
  roboEc	
  arm	
  (huh?	
  Simple	
  PING?)	
  
      ➤  2010,	
  Stuxnet	
  Incident	
  

➤  Main	
  scenario	
  is	
  where	
  viruses	
  degrade	
  the	
  system	
  to	
  make	
  it	
  useless:	
  
      ➤  2005,	
  Windmill	
  incident	
  Belgium	
  




                                                                                                                        Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  Some	
  basic	
  test	
  you	
  go	
  use	
  against	
  your	
  system:	
  
      ➤  nmap	
  –sV	
  –A	
  
      ➤  Ping	
  –f	
  –s	
  >56200	
  
      ➤  Traffic	
  >	
  10	
  Mb/s	
  
      ➤  SQL	
  InjecEon	
  through	
  the	
  HMI	
  
      ➤  Usage	
  of	
  simple	
  passwords	
  
      ➤  Using	
  SenEent	
  Hyper-­‐OpEmized	
  Data	
  Access	
  Network	
  (SHODAN)	
  as	
  search	
  engine	
  

➤  As	
  of	
  2008,	
  Metasploit	
  Framework	
  has	
  SCADA	
  tesEng	
  modules	
  built-­‐in	
  


                                                                                                               Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  Some	
  of	
  the	
  common	
  SCADA	
  challenges	
  we	
  experience:	
  
     ➤  Security	
  patching	
  (problem	
  in	
  IT,	
  nightmare	
  in	
  SCADA)	
  ?	
  
     ➤  AuthenEcaEon	
  of	
  machines	
  ?	
  	
  Logging	
  ?	
  
     ➤  EncrypEon	
  ?	
  
     ➤  AuthorizaEon	
  for	
  transacEons	
  /	
  commands	
  ?	
  Remote	
  login	
  ?	
  
     ➤  Code	
  review	
  and	
  secure	
  development	
  ?	
  
     ➤  Protocol	
  specific	
  firewalls	
  ?	
  

➤  Many	
  challenges	
  !	
  


                                                                                               Cyber	
  Defense	
  Group	
  
Cri0cal	
  infrastructures:	
  state	
  of	
  affairs	
  

➤  It’s	
  an	
  emerging	
  trend,	
  so	
  we	
  are	
  scared	
  and	
  
   we	
  have	
  poor	
  risk	
  management	
  abiliEes.	
  
➤  EsEmate	
  the	
  risk:	
  
      ➤  Q:	
  How	
  many	
  people	
  killed	
  by	
  sharks	
  in	
  U.S.	
  ?	
  A:	
  40	
  
      ➤  Q:	
  How	
  many	
  people	
  killed	
  by	
  pigs	
  in	
  U.S.	
  ?	
  A:	
  23.589	
  

➤  EsEmate	
  the	
  impact	
  (today)	
  of:	
  
      ➤  Q:	
  Terrorists	
  ?	
  
      ➤  Q:	
  Cyber-­‐terrorists	
  ?	
  



                                                                                                      Cyber	
  Defense	
  Group	
  
“	
  There	
  is	
  no	
  cause	
  for	
  panic	
  nor	
  cause	
  to	
  ignore	
  the	
  issue	
  ”	
  
                                                   	
  
              We	
  should	
  be	
  concerned.	
  	
  And	
  so	
  we	
  are.	
  	
  That’s	
  good.	
  




                                                                                                           Cyber	
  Defense	
  Group	
  
Trending	
  threats	
  for	
  cri0cal	
  infrastructures	
  




                                                               Cyber	
  Defense	
  Group	
  
Before:	
  proprietary,	
  isolated,	
  obscure	
  and	
  robust	
  
                                  	
  
Trend:	
  documented,	
  standardized,	
  connected	
  and	
  open	
  
                                  	
  




                                                                 Cyber	
  Defense	
  Group	
  
Trending	
  threats	
  for	
  cri0cal	
  infrastructures	
  

➤  Industry	
  standards	
  take	
  security	
  into	
  consideraEon:	
  
     ➤  BS7799-­‐ISO27000                    	
  InformaEon	
  sec.	
  management	
  systems	
  –	
  SpecificaEon	
  with	
  guidance	
  for	
  use	
  
     ➤  NISTIR	
  7628            	
         	
  Guidelines	
  for	
  Smart	
  Grid	
  Cyber	
  Security	
  v1.0	
  
     ➤  ANSI/ISA	
  S.99.1	
   	
            	
  Security	
  for	
  Manufacturing	
  and	
  Control	
  Systems	
  

     ➤  ANSI/ISA	
  SP99	
   	
              	
  TR2	
  IntegraEng	
  Electronic	
  Sec.	
  into	
  Manufacturing	
  and	
  Control	
  Systems	
  Env.	
  
     ➤  ISO/IEC	
  15408	
   	
              	
  Common	
  Criteria	
  

     ➤  CIDX            	
        	
         	
  Chemical	
  Industry	
  Data	
  Exchange	
  -­‐	
  Vulnerability	
  Assessment	
  Methodology	
  (VAM)	
  Guidance	
  
     ➤  ISPE/GAMP4	
              	
         	
  Good	
  Automated	
  Manufacturing	
  PracEces	
  
     ➤  NIST	
  System	
  ProtecEon	
  Profile	
  for	
  Industrial	
  Control	
  Systems	
  (SPP-­‐ICS)	
  

     ➤  PCSF	
  Process	
  Control	
  System	
  Forum	
  ;	
  NERC	
  standards	
  ;	
  AGA	
  standards	
  ;	
  NISCC	
  Guidelines	
  




                                                                                                                                                             Cyber	
  Defense	
  Group	
  
Trending	
  threats	
  for	
  cri0cal	
  infrastructures	
  

➤  Root	
  causes	
  for	
  SCADA	
  vulnerabiliEes	
  today	
  (and	
  tomorrow):	
  
     ➤  ISO	
  27000	
  vs.	
  ISA-­‐99.00.01	
  have	
  contradicEng	
  prioriEes;	
  SCADA	
  wants	
  AIC,	
  while	
  
        INFOSEC	
  wants	
  CIA	
  
     ➤  The	
  human	
  communicaEon	
  conflict:	
  INFOSEC	
  and	
  SCADA	
  people	
  just	
  don’t	
  understand	
  
        each	
  other	
  !	
  

➤  The	
  human	
  element	
  remains	
  a	
  largely	
  ignored	
  weakness:	
  
     ➤  You	
  get	
  bored	
  at	
  night,	
  right	
  ?	
  
     ➤  You	
  want	
  to	
  browse	
  the	
  Internet	
  on	
  your	
  shiu,	
  right	
  ?	
  
     ➤  You	
  want	
  to	
  logon	
  from	
  your	
  home	
  to	
  the	
  HMI,	
  right	
  ?	
  


                                                                                                                      Cyber	
  Defense	
  Group	
  
Trending	
  threats	
  for	
  cri0cal	
  infrastructures	
  

➤  Bad	
  Trends	
  Top	
  5	
  :	
  Things	
  that	
  probably	
  will	
  stay	
  around	
  for	
  a	
  while	
  
       ➤  Office	
  AutomaEon	
  and	
  Industrial	
  Networks	
  become	
  connected	
  
       ➤  Cyber	
  Security	
  remains	
  an	
  auerthought	
  during	
  design	
  of	
  soluEons	
  
       ➤  Protocols	
  are	
  in	
  clear-­‐text	
  (speed	
  reasons)	
  
       ➤  Inadequately	
  developed	
  firewalls	
  that	
  naEvely	
  speak	
  SCADA	
  protocols	
  
       ➤  Insecure	
  coding	
  pracEces	
  

➤  Old	
  protocols,	
  old	
  systems:	
  
       ➤  Basic	
  hacking	
  techniques	
  most	
  likely	
  will	
  work	
  



                                                                                                                Cyber	
  Defense	
  Group	
  
Trending	
  threats	
  for	
  cri0cal	
  infrastructures	
  

➤  Focus	
  on	
  Top	
  3	
  CriEcal	
  Infrastructures:	
  




         Oil	
  and	
  Gas	
                  Smart	
  Grid	
     TelecommunicaEon	
  


                                                                                 Cyber	
  Defense	
  Group	
  
Trending	
  threats	
  for	
  cri0cal	
  infrastructures	
  

➤  Ongoing	
  developments:	
  Smart	
  Grids	
  /	
  Smart	
  Metering	
  
      ➤  Metering	
  and	
  control	
  of	
  intelligent	
  electricity	
  delivery	
  to	
  the	
  household	
  
      ➤  Privacy	
  by	
  Design:	
  Achieving	
  the	
  Gold	
  Standard	
  in	
  Data	
  ProtecEon	
  for	
  the	
  Smart	
  Grid	
  as	
  
         a	
  guideline	
  on	
  best	
  pracEces	
  (actually,	
  prewy	
  good)	
  

➤  High	
  Priority	
  on	
  security:	
  
     U.S.	
  Na7onal	
  Coordinator	
  for	
  Security,	
  Infrastructure	
  Protec7on,	
  and	
  Counter-­‐Terrorism,	
  has	
  stated	
  that	
  
     a	
  cyber	
  aSack	
  aimed	
  at	
  energy	
  infrastructure	
  “could	
  disable	
  trains	
  all	
  over	
  the	
  country	
  and	
  it	
  could	
  blow	
  
     up	
  pipelines.	
  It	
  could	
  cause	
  blackouts	
  and	
  damage	
  electrical	
  power	
  grids…It	
  could	
  wipe	
  out	
  and	
  confuse	
  
     financial	
  records…	
  It	
  could	
  do	
  things	
  like	
  disrupt	
  traffic	
  in	
  urban	
  areas	
  by	
  knocking	
  out	
  control	
  computers.	
  
     It	
  could…wipe	
  out	
  medical	
  records.	
  




                                                                                                                                                     Cyber	
  Defense	
  Group	
  
Trending	
  threats	
  for	
  cri0cal	
  infrastructures	
  




    Replace	
  exisEng	
       New	
  SCADA	
                                      Controlled	
  
                                                         Improvement	
  of	
  
    SCADA	
  systems	
       based	
  soluEons	
                                   Industrial	
  
                                                          SCADA	
  security	
  
       with	
  new	
         are	
  deployed	
  in	
                              Environment	
  
                                                             controls	
  
       soluEons	
                   society	
  




                                                                                        Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  




                                                                   Cyber	
  Defense	
  Group	
  
If	
  you	
  have	
  the	
  ability	
  to	
  deliver	
  a	
  reasonably	
  strong	
  radio	
  signal,	
  	
  
                                  then	
  those	
  around	
  you	
  are	
  compromised.	
  	
  
                                                                     	
  
Any	
  informa7on	
  that	
  goes	
  across	
  a	
  cell	
  phone	
  you	
  can	
  now	
  intercept.	
  	
  Even	
  though	
  the	
  
          GSM	
  spec	
  requires	
  it,	
  this	
  is	
  a	
  deliberate	
  choice	
  on	
  the	
  cell	
  phone	
  makers	
  




                                                                                                                       Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  

➤  Security	
  by	
  obscurity	
  :	
  
      ➤  GSM	
  is	
  one	
  of	
  the	
  oldest	
  protocols	
  (and	
  most	
  insecure;	
  it’s	
  like	
  telnet)	
  
      ➤  Extremely	
  liwle	
  scruEny	
  on	
  3G/GSM	
  protocols	
  
      ➤  Only	
  4	
  closed-­‐source	
  GSM	
  stacks	
  produced	
  
      ➤  GSM	
  chipset	
  makers	
  never	
  release	
  any	
  hardware	
  documentaEon	
  
      ➤  Access	
  to	
  firmware	
  source	
  (3.5G	
  baseband	
  codes)	
  are	
  only…	
  some	
  lucky	
  few	
  
      ➤  Prices	
  for	
  BTS’s,	
  etc.	
  are	
  very	
  steep	
  

➤  Open	
  source	
  research	
  is	
  on	
  its	
  way	
  (and	
  advancing	
  rapidly)	
  !	
  


                                                                                                                            Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  

➤  GSMA	
  is	
  not	
  too	
  worried,	
  though	
  :	
  

     “	
  …	
  intercept	
  approach	
  has	
  underes0mated	
  its	
  pracEcal	
  complexity	
  
     A	
  hacker	
  would	
  need	
  a	
  radio	
  receiver	
  system	
  and	
  the	
  signal	
  processing	
  
	
          soDware	
  necessary	
  to	
  process	
  the	
  raw	
  radio	
  data.	
  CSMA,	
  Aug	
  2009	
  

      ✓  Underes0mated	
  complexity:	
  Ability	
  to	
  decrypt	
  A5	
  family	
  in	
  (near)	
  real	
  Eme	
  (2009)	
  
      ✓  Underes0mated	
  complexity:	
  IMSI	
  catching,	
  bypass	
  A3/A8,	
  …	
  (2010)	
  
      ✓  Radio	
  receiver	
  system:	
  USRP	
  /	
  USRP2	
  +	
  GNUradio	
  +	
  OpenBTS	
  (you	
  know,	
  the	
  soDware)	
  

                                                                                                                       Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  
                                                                                                       Trixie	
  
➤  Become	
  your	
  own	
  operator:	
                               R/TFX900	
                      Priceless	
  
                                                                           175	
  USD	
  
       ➤  Universal	
  Souware	
  Radio	
  Peripheral	
  
       ➤  GNUradio	
  Project	
  
       ➤  OpenBTS	
  /	
  OpenBSC	
  /	
  SMSqueue	
           USRP	
  
                                                               800	
  USD	
  
       ➤  OsmocomBB	
  
       ➤  Asterisk	
  
                                                                      52	
  Mhz	
  
➤  Under	
  1.500	
  USD	
  you	
  cover	
  up	
  to	
                   37	
  USD	
  

   300	
  m	
  of	
  GSM	
  signal	
  (indoor)	
  +	
  2	
  
   channels	
  (850/900/1800/1900).	
  

                                                                                            Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  

➤  Or	
  become	
  your	
  own	
  DIY	
  mobile	
  
   intelligence	
  unit:	
  
      ➤  4	
  x	
  USRP2	
  (Xilinx	
  Spartan	
  FPGA’s)	
  
      ➤  4	
  x	
  quad	
  core	
  i7	
  CPU’s	
  
      ➤  2	
  x	
  nvidia	
  Tesla	
  CUDA	
  C2070	
  cores	
  
      ➤  Power	
  generator	
  +	
  antennas	
  
      ➤  4	
  TB	
  storage	
  

➤  Costs	
  about	
  20.000	
  USD.	
  Cheap	
  eh?	
  


                                                                   Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  

➤  The	
  mobile	
  network	
  threat	
  vectors:	
  

          ConfidenEality	
                         Availability	
                     Integrity	
  

                     AcEve	
  Intercept	
                 Power	
  Jamming	
         InserEng	
  audio	
  streams	
  

                   Passive	
  Intercept	
  	
              Call	
  Blackholing	
      Fuzzing	
  GSM	
  handsets	
  

                        IMSI	
  Catching	
  

                LocaEon	
  Monitoring	
  




                                                                                                                        Cyber	
  Defense	
  Group	
  
“	
  Cell	
  phones	
  behave	
  like	
  ducks	
  ”	
  
                             	
  
           (you	
  may	
  quote	
  me	
  on	
  this)	
  




                                                           Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (confidenEality)	
  

 If	
  it	
  looks	
  like	
  a	
  duck	
   ,	
  walks	
  like	
  a	
  duck	
        ,	
  talks	
  like	
  a	
  duck	
              =	
     it’s	
  a	
  duck	
  !	
  




                                                                                                                                                      ?	
  


MCC=525,	
  MNC=010	
                  Handset	
  registers	
  to	
  who	
  ?	
   This	
  is	
  where	
  you	
  do	
  “Hello”	
  
                                                                                                                                             Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (confidenEality)	
  

➤  Listening	
  in	
  on	
  phone	
  calls	
  +	
  SMS	
  (“unlawful	
  
   intercept”):	
  
      ➤  Using	
  the	
  Berlin	
  A5	
  Codebooks	
  (2.3	
  TB)	
  
      ➤  Decode	
  A5.1	
  within	
  seconds	
  /	
  minutes	
  

➤  Ac0ve	
  intercept:	
                                                   ➤  Passive	
  intercept:	
  
      ➤  AcEve	
  downgrade	
  of	
  A5.1/.2/.3	
  to	
  A5.0	
                 ➤  Time-­‐Memory	
  Tradeoff	
  Awack	
  
      ➤  OpenBTS	
  +	
  Asterisk	
                                             ➤  OpenBTS	
  +	
  Airprobe	
  
      ➤  Basically,	
  man-­‐in-­‐the-­‐middle	
  awack	
  on	
  GSM	
          ➤  DecrypEon	
  required	
  



                                                                                                                  Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (confidenEality)	
  

➤  How	
  handsets	
  get	
  connected	
  to	
  a	
  rogue	
  base	
  
   staEon	
  so	
  an	
  awacker	
  can	
  intercept:	
  
      ➤  Receive	
  gain	
  override	
  (“so,	
  you	
  are	
  a	
  100db	
  
         tower?”)	
  (used	
  for	
  IMSI	
  catchers	
  by	
  R&S)	
  
      ➤  Changing	
  LAC	
  (LocaEon	
  Area	
  Code)	
  to	
  enEce	
  
         handsets	
  to	
  handoff	
  to	
  new	
  (your)	
  BTS	
  
      ➤  Short	
  jam	
  burst,	
  so	
  handsets	
  are	
  forced	
  to	
  execute	
  
         handset	
  power-­‐up	
  process	
  
      ➤  ConEnuous	
  jam	
  3G	
  bands,	
  so	
  fail-­‐over	
  to	
  GSM	
  




                                                                                          Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (confidenEality)	
  

➤  Remote	
  and	
  local	
  tracking	
  of	
  users,	
  using	
  a	
  
   blend	
  of	
  RRLP,	
  GPS,	
  GSM,	
  SMS,	
  mobile	
  
   applicaEons	
  and	
  Google	
  technologies:	
  
      ➤  Google	
  GSM	
  GeolocaEon	
  API	
  (not	
  LaEtude)	
  
      ➤  Cell-­‐locaEons	
  stored	
  on	
  local	
  smartphones	
  
      ➤  Using	
  applicaEons	
  to	
  covertly	
  send	
  out	
  logs	
  




                                                                             Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (availability)	
  

➤  By	
  accident.	
  Jammed	
  my	
  neighborhood	
  in	
  a	
  
   800m	
  radius	
  using	
  GNUradio,	
  2W	
  and	
  a	
  noise	
  
   generator	
  =>	
  Impossible	
  to	
  defend!	
  
➤  Purposeful:	
  
      ➤  Camping	
  GSM	
  signals	
  and	
  sink-­‐holing	
  them	
  
      ➤  Noise	
  generators	
  in	
  the	
  GSM	
  spectrum	
  
      ➤  Frequency	
  division	
  duplexing	
  flooding	
  
      ➤  Sending	
  IMSI	
  DETACH	
  messages	
  
      ➤  Channel	
  Request	
  Flooding	
  of	
  the	
  RACH	
  


                                                                                Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (availability)	
  

➤  Channel	
  Request	
  Flooding	
  of	
  the	
  Random	
  
   Access	
  Channel	
  (RACH)	
  burst:	
  
     ➤  Anonymous	
  awack	
  
     ➤  Successfully	
  executed	
  under	
  a	
  few	
  seconds	
  
     ➤  Cell-­‐phone	
  registers	
  (Channel	
  Request),	
  when	
  the	
  
        channel	
  is	
  not	
  established	
  (Eme-­‐out),	
  the	
  channel	
  is	
  
        released	
  by	
  the	
  BSC	
  
     ➤  Only	
  affects	
  one	
  BTS	
  at	
  a	
  Eme	
  




                                                                                          Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (availability)	
  

                                                                                DoS	
  




                                                                                Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (availability)	
  

➤  Isolated	
  noise	
  output	
  test:	
  892	
  mode	
  test	
  
➤  Results:	
  
       ➤  Upset	
  neighbors,	
  but	
  peace	
  of	
  mind	
  
       ➤  Completely	
  knocked	
  out	
  the	
  850/900	
  GSM	
  signal	
  in	
  
          800	
  meter	
  radius,	
  using	
  a	
  short	
  (45sec)	
  burst	
  

➤  Test	
  (but	
  I’m	
  not	
  doing	
  it):	
  
       ➤  100	
  W	
  amplifier	
  (450	
  USD)	
  (1.500	
  W	
  HAM	
  limit!!)	
  
       ➤  Will	
  knock	
  out	
  GSM/3G/CDMA	
  over	
  large	
  secEon	
  of	
  
          Singapore	
  


                                                                                       Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (integrity)	
  

➤  ManipulaEng	
  voice	
  conversaEons	
  
➤  AcEve	
  intercepEon	
  required,	
  as	
  we	
  do	
  not	
  
   modify	
  GSM	
  signal,	
  but	
  ulaw	
  data	
  packets:	
  
      ➤  Should	
  be	
  easy	
  to	
  manipulate	
  (given	
  IMSI	
  spoofing)	
  

➤  No	
  pracEcal	
  usage,	
  unless	
  you	
  really	
  want	
  to	
  
   annoy	
  people	
  :-­‐)	
  
➤  …	
  manipulaEng	
  SMS	
  messages	
  however,	
  is	
  a	
  
   threat	
  (OTP	
  over	
  SMS,	
  anyone?).	
  


                                                                                      Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (integrity)	
  




                       Free	
  McDonalds!	
  




                                                                                  Cyber	
  Defense	
  Group	
  
The	
  imminent	
  threat	
  of	
  our	
  mobile	
  networks	
  (integrity)	
  

➤  Fuzzing	
  target:	
  
      ➤  GSM	
  stack	
  in	
  baseband	
  processor	
  
      ➤  GSM	
  funcEon	
  libraries	
  in	
  operaEng	
  system	
  

➤  Fuzzing	
  results	
  auer	
  one	
  month	
  (using	
  scapy):	
  
      ➤  iPhone	
  IOS	
  4.2,	
  already	
  2	
  crashes	
  
      ➤  Windows	
  Mobile	
  7,	
  already	
  5	
  crashes	
  
      ➤  Android	
  2.2,	
  already	
  3	
  crashes	
  

➤  Not	
  sure	
  if	
  they	
  are	
  exploitable	
  yet.	
  


                                                                                  Cyber	
  Defense	
  Group	
  
What	
  are	
  we	
  up	
  against	
  ?	
  




                                              Cyber	
  Defense	
  Group	
  
What	
  are	
  we	
  up	
  against	
  ?	
  

➤  Vital	
  and	
  criEcal	
  infrastructures	
  keeps	
  
   humans	
  safe,	
  alive	
  and	
  comfortable,	
  but:	
  
      ➤  Closed	
  source	
  protocols	
  are	
  being	
  leveraged	
  over	
  
         vulnerable	
  transportaEon	
  media	
  and	
  protocols	
  
         (think	
  TCP/IP,	
  RPC,	
  …)	
  
      ➤  Full	
  disclosure	
  research	
  increasingly	
  brings	
  exploits	
  
         and	
  vulnerabiliEes	
  in	
  the	
  open	
  
      ➤  It	
  is	
  100%	
  target	
  of	
  terrorist	
  awacks	
  and	
  asymmetric	
  
         warfare	
  tacEcs	
  
      ➤  Alot	
  of	
  Fear-­‐Uncertainty	
  and	
  –Doubt	
  (FUD)	
  


                                                                                            Cyber	
  Defense	
  Group	
  
What	
  are	
  we	
  up	
  against	
  ?	
  

➤  Mobile	
  telecommunicaEons	
  and	
  wireless	
  
   technologies	
  are	
  connecEng	
  everyone	
  and	
  
   everything,	
  yet	
  they	
  are	
  mostly	
  based	
  on	
  
   insecure	
  protocols:	
  
      ➤  SCADA	
  systems	
  using	
  GSM	
  for	
  large	
  plant	
  coverage	
  
      ➤  SCADA	
  systems	
  using	
  Bluetooth	
  (e.g.	
  smart	
  meters)	
  
      ➤  SCADA	
  systems	
  using	
  Wi-­‐Fi	
  /	
  ZigBee	
  protocols	
  

➤  Our	
  day-­‐to-­‐day	
  lives	
  and	
  safety	
  inherently	
  
   depend	
  on	
  IT	
  systems	
  and	
  networks	
  (*gulp*)	
  


                                                                                     Cyber	
  Defense	
  Group	
  
What	
  are	
  we	
  up	
  against	
  ?	
  

➤  Hackers	
  will	
  conEnue	
  to	
  awack	
  embedded	
  
   and	
  industrial	
  systems	
  (“stuxnet	
  is	
  only	
  the	
  
   beginning”).	
  
➤  Within	
  five	
  years,	
  a	
  large	
  scale	
  electronic	
  
   awack	
  will	
  disrupt	
  a	
  modern	
  society	
  to	
  its	
  
   inner	
  fabric.	
  
➤  Security	
  industry	
  will	
  need	
  to	
  rapidly	
  
   embrace	
  industrial	
  standards	
  and	
  collaborate	
  
   on	
  establishing	
  secure	
  and	
  robust	
  protocols.	
  


                                                                         Cyber	
  Defense	
  Group	
  
“	
  Unless	
  cyber	
  security	
  controls	
  can	
  guarantee	
  	
  
our	
  safety,	
  it	
  is	
  irresponsible	
  to	
  merge	
  industrial	
  protocols	
  
 with	
  vulnerable	
  IT	
  technologies	
  	
  (law	
  of	
  weakest	
  link)”	
  
                                                  	
  
                         (you	
  may	
  quote	
  me	
  on	
  this	
  one	
  too)	
  




                                                                                       Cyber	
  Defense	
  Group	
  
If	
  not,	
  one	
  day	
  we	
  will	
  wake	
  up	
  and	
  find	
  ourselves:	
  
                                           	
  
                                    deafened	
  
                                           	
  
                                     blinded	
  
                                           	
  
                                   and	
  muted	
  



                                                                                 Cyber	
  Defense	
  Group	
  
Contemporary	
  threats	
  to	
  
cri0cal	
  and	
  mobile	
  infrastructures	
  
Are	
  we	
  soon	
  deaf,	
  blind	
  and	
  muted	
  ?	
  
	
  
ANSES	
  Rah	
  Rah	
  7,	
  Singapore	
  
January	
  2010	
  
	
  
	
  
Thank	
  You,	
  




                                                               Cyber	
  Defense	
  Group	
  

More Related Content

What's hot

White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
Dragos, Inc.
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
Kaspersky
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
Ivan Carmona
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
Aleksey Lukatskiy
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
Charles "Chuck" Speicher Jr.
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworks
Joe Levy
 
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Dragos, Inc.
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
Dan Gunter
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
infracritical
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
Cisco Crisis Response
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
Sylvain Martinez
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
EnergySec
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
Cristian Garcia G.
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
Gavan Howe
 
Palestra realizada no S4x17 - Miami - EUA (em Inglês)
Palestra realizada no S4x17 - Miami - EUA (em Inglês)Palestra realizada no S4x17 - Miami - EUA (em Inglês)
Palestra realizada no S4x17 - Miami - EUA (em Inglês)
TI Safe
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
Hacks in Taiwan (HITCON)
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Claudy75
 
The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
Cisco Crisis Response
 

What's hot (20)

White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworks
 
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
Palestra realizada no S4x17 - Miami - EUA (em Inglês)
Palestra realizada no S4x17 - Miami - EUA (em Inglês)Palestra realizada no S4x17 - Miami - EUA (em Inglês)
Palestra realizada no S4x17 - Miami - EUA (em Inglês)
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
Sécurité: Risques, tendances & préconisations à venir par Eric HOHBAUER, Dire...
 
The Network Enabled EOC
The Network Enabled EOCThe Network Enabled EOC
The Network Enabled EOC
 

Viewers also liked

Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Murray Security Services
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
Paul McGillicuddy
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (14)

Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber Security Lecture at Rah Rah 7

Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
Dragos, Inc.
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
Eric Gallant
 
2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel AvilaReenergize
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sector
acinfotec
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
EnergySec
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
Itex Solutions
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
TI Safe
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
Cisco Canada
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
Nir Cohen
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
Shawn Wells
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
BGA Cyber Security
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
Jeffrey Wang , P.Eng
 

Similar to Cyber Security Lecture at Rah Rah 7 (20)

Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila
 
Avila 3 b
Avila 3 bAvila 3 b
Avila 3 b
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sector
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 

More from Filip Maertens

Cannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsCannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensors
Filip Maertens
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
Filip Maertens
 
Startups.be Tech Days 2014
Startups.be Tech Days 2014Startups.be Tech Days 2014
Startups.be Tech Days 2014
Filip Maertens
 
The Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceThe Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 Conference
Filip Maertens
 
On Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & OutlooksOn Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & Outlooks
Filip Maertens
 
On Leadership
On LeadershipOn Leadership
On Leadership
Filip Maertens
 
FLYSE Kick Off Event Presentation
FLYSE Kick Off Event PresentationFLYSE Kick Off Event Presentation
FLYSE Kick Off Event Presentation
Filip Maertens
 
TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013
Filip Maertens
 
Mobile Premier Awards 2013
Mobile Premier Awards 2013Mobile Premier Awards 2013
Mobile Premier Awards 2013
Filip Maertens
 
LeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition PitchLeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition Pitch
Filip Maertens
 
VOKA BRYO Keynote Speech
VOKA BRYO Keynote SpeechVOKA BRYO Keynote Speech
VOKA BRYO Keynote Speech
Filip Maertens
 
Fail Con 2012
Fail Con 2012Fail Con 2012
Fail Con 2012
Filip Maertens
 
Apps Marathon 2012
Apps Marathon 2012Apps Marathon 2012
Apps Marathon 2012
Filip Maertens
 
TEDx Leuven 2012
TEDx Leuven 2012TEDx Leuven 2012
TEDx Leuven 2012
Filip Maertens
 
ECSA Cyber Security Conference 2011
ECSA Cyber Security Conference 2011ECSA Cyber Security Conference 2011
ECSA Cyber Security Conference 2011
Filip Maertens
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
Filip Maertens
 
Media Marketing Days 2011
Media Marketing Days 2011Media Marketing Days 2011
Media Marketing Days 2011
Filip Maertens
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
Filip Maertens
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 

More from Filip Maertens (19)

Cannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensorsCannes Lions Innovation, unlocking mobile personalisation using sensors
Cannes Lions Innovation, unlocking mobile personalisation using sensors
 
Ad:Tech Conference 2014
Ad:Tech Conference 2014Ad:Tech Conference 2014
Ad:Tech Conference 2014
 
Startups.be Tech Days 2014
Startups.be Tech Days 2014Startups.be Tech Days 2014
Startups.be Tech Days 2014
 
The Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 ConferenceThe Age of Empathic Devices - Beyond Fusion 2014 Conference
The Age of Empathic Devices - Beyond Fusion 2014 Conference
 
On Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & OutlooksOn Mining Bitcoins - Fundamentals & Outlooks
On Mining Bitcoins - Fundamentals & Outlooks
 
On Leadership
On LeadershipOn Leadership
On Leadership
 
FLYSE Kick Off Event Presentation
FLYSE Kick Off Event PresentationFLYSE Kick Off Event Presentation
FLYSE Kick Off Event Presentation
 
TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013TEDx UHasselt Salon 2013
TEDx UHasselt Salon 2013
 
Mobile Premier Awards 2013
Mobile Premier Awards 2013Mobile Premier Awards 2013
Mobile Premier Awards 2013
 
LeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition PitchLeWeb 2012 Paris Startup Competition Pitch
LeWeb 2012 Paris Startup Competition Pitch
 
VOKA BRYO Keynote Speech
VOKA BRYO Keynote SpeechVOKA BRYO Keynote Speech
VOKA BRYO Keynote Speech
 
Fail Con 2012
Fail Con 2012Fail Con 2012
Fail Con 2012
 
Apps Marathon 2012
Apps Marathon 2012Apps Marathon 2012
Apps Marathon 2012
 
TEDx Leuven 2012
TEDx Leuven 2012TEDx Leuven 2012
TEDx Leuven 2012
 
ECSA Cyber Security Conference 2011
ECSA Cyber Security Conference 2011ECSA Cyber Security Conference 2011
ECSA Cyber Security Conference 2011
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
Media Marketing Days 2011
Media Marketing Days 2011Media Marketing Days 2011
Media Marketing Days 2011
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Cyber Security Lecture at Rah Rah 7

  • 1. Contemporary  threats  to   cri0cal  and  mobile  infrastructures   Are  we  soon  deaf,  blind  and  muted  ?     ANSES  Rah  Rah  7,  Singapore   January  2010       Filip  Maertens   Avydian  Cyber  Defense   Cyber  Defense  Group  
  • 2. Agenda   ➤  About  the  speaker   ➤  CriEcal  Infrastructures:  state  of  affairs   ➤  Trending  threats  for  criEcal  infrastructures   ➤  The  imminent  risk  of  our  mobile  networks   ➤  What  are  we  up  against  ?   Cyber  Defense  Group  
  • 3. About  the  speaker   ➤  CEO  and  Founder  Avydian  Cyber  Defense  Group   ➤  President  Cyber-­‐Security  at  European  Corporate  Security  AssociaEon   ➤  Cybercrime  invesEgator   ➤  CISSP,  CISM,  CISA,  CPO,  CFE  and  CCSP  (“cer7fied  common  sense  prac77oner”)   ➤  MSc.  InformaEon  Risk  and  BSc.  InformaEon  OperaEons   ➤  Guest  professor  on  capita  selecta  on  Cyber  Warfare   ➤  Cyber  Security  Auditor  &  Advisor  for  <this_is_where_you_go_bleep>   Cyber  Defense  Group  
  • 4. Cri0cal  Infrastructures:  state  of  affairs     (no,  not  another  stuxnet  talk)   Cyber  Defense  Group  
  • 5. Cri0cal  infrastructures:  state  of  affairs   ➤  Where  do  we  find  IT  components  and   other  modern  technologies  within   criEcal  infrastructures:   ➤  Nuclear,  oil  and  gas  industry   ➤  Air  traffic  and  railways   ➤  Power  generaEon,  transmission  and  metering   ➤  Water  management   ➤  Satellites   Cyber  Defense  Group  
  • 6. Cri0cal  infrastructures:  state  of  affairs   ➤  What  do  industrial  systems  do  for  you  ?   ➤  Supply  power  to  your  home   ➤  Provide  drinkable  water  to  your  home   ➤  Traffic  lights   ➤  Control  commuter  trains   ➤  Regulate  the  air  condiEoning  in  the  office   ➤  Ensure  you  can  make  mobile  and  landline   phone  calls   ➤  …   Cyber  Defense  Group  
  • 7. Cri0cal  infrastructures:  state  of  affairs   ➤  But,  let’s  not  cry  wolf:   ➤  2003  U.S.  East  Cast  Black  out   ➤  2008  Spanair  Crash   ➤  Who  benefits  from  FUD:   ➤  IT  Security:  New  Business  =  Profit  (2016:  7  billion  USD)   ➤  Safety:  Loss  of  Business  =  Loss   ➤  Reliable  incident  reports  is  what  we  need  !   Cyber  Defense  Group  
  • 8. Cri0cal  infrastructures:  state  of  affairs   Cyber  Defense  Group  
  • 9. Cri0cal  infrastructures:  state  of  affairs   ➤  Basic  SCADA  architecture:   Blaster   ➤  Human  Management  Interface  (HMI)   ➤  Remote  Terminal  Unit  (RTU)   ➤  Programmable  Logic  Controller  (PLC)   ➤  CommunicaEon  Infrastructure   ➤  Typical  SCADA  protocols:   ➤  Raw  data  protocols:  modbus,  DNP3,  …   ➤  High  level  protocols:  ICCP,  OPC,  …   Cyber  Defense  Group  
  • 10. Cri0cal  infrastructures:  state  of  affairs   ➤  0.01%  of  recorded  incidents  (that  make  you  think):   ➤  2000,  Russian  hackers  seized  control  of  the  gas  pipeline  network   ➤  2003,  Ohio  Davis-­‐Besse  nuclear  plant  safety  monitoring  system  down  for  five  hours   ➤  2007,  Simple  PING  sweep  acEvated  roboEc  arm  (huh?  Simple  PING?)   ➤  2010,  Stuxnet  Incident   ➤  Main  scenario  is  where  viruses  degrade  the  system  to  make  it  useless:   ➤  2005,  Windmill  incident  Belgium   Cyber  Defense  Group  
  • 11. Cri0cal  infrastructures:  state  of  affairs   ➤  Some  basic  test  you  go  use  against  your  system:   ➤  nmap  –sV  –A   ➤  Ping  –f  –s  >56200   ➤  Traffic  >  10  Mb/s   ➤  SQL  InjecEon  through  the  HMI   ➤  Usage  of  simple  passwords   ➤  Using  SenEent  Hyper-­‐OpEmized  Data  Access  Network  (SHODAN)  as  search  engine   ➤  As  of  2008,  Metasploit  Framework  has  SCADA  tesEng  modules  built-­‐in   Cyber  Defense  Group  
  • 12. Cri0cal  infrastructures:  state  of  affairs   ➤  Some  of  the  common  SCADA  challenges  we  experience:   ➤  Security  patching  (problem  in  IT,  nightmare  in  SCADA)  ?   ➤  AuthenEcaEon  of  machines  ?    Logging  ?   ➤  EncrypEon  ?   ➤  AuthorizaEon  for  transacEons  /  commands  ?  Remote  login  ?   ➤  Code  review  and  secure  development  ?   ➤  Protocol  specific  firewalls  ?   ➤  Many  challenges  !   Cyber  Defense  Group  
  • 13. Cri0cal  infrastructures:  state  of  affairs   ➤  It’s  an  emerging  trend,  so  we  are  scared  and   we  have  poor  risk  management  abiliEes.   ➤  EsEmate  the  risk:   ➤  Q:  How  many  people  killed  by  sharks  in  U.S.  ?  A:  40   ➤  Q:  How  many  people  killed  by  pigs  in  U.S.  ?  A:  23.589   ➤  EsEmate  the  impact  (today)  of:   ➤  Q:  Terrorists  ?   ➤  Q:  Cyber-­‐terrorists  ?   Cyber  Defense  Group  
  • 14. “  There  is  no  cause  for  panic  nor  cause  to  ignore  the  issue  ”     We  should  be  concerned.    And  so  we  are.    That’s  good.   Cyber  Defense  Group  
  • 15. Trending  threats  for  cri0cal  infrastructures   Cyber  Defense  Group  
  • 16. Before:  proprietary,  isolated,  obscure  and  robust     Trend:  documented,  standardized,  connected  and  open     Cyber  Defense  Group  
  • 17. Trending  threats  for  cri0cal  infrastructures   ➤  Industry  standards  take  security  into  consideraEon:   ➤  BS7799-­‐ISO27000  InformaEon  sec.  management  systems  –  SpecificaEon  with  guidance  for  use   ➤  NISTIR  7628    Guidelines  for  Smart  Grid  Cyber  Security  v1.0   ➤  ANSI/ISA  S.99.1      Security  for  Manufacturing  and  Control  Systems   ➤  ANSI/ISA  SP99      TR2  IntegraEng  Electronic  Sec.  into  Manufacturing  and  Control  Systems  Env.   ➤  ISO/IEC  15408      Common  Criteria   ➤  CIDX      Chemical  Industry  Data  Exchange  -­‐  Vulnerability  Assessment  Methodology  (VAM)  Guidance   ➤  ISPE/GAMP4      Good  Automated  Manufacturing  PracEces   ➤  NIST  System  ProtecEon  Profile  for  Industrial  Control  Systems  (SPP-­‐ICS)   ➤  PCSF  Process  Control  System  Forum  ;  NERC  standards  ;  AGA  standards  ;  NISCC  Guidelines   Cyber  Defense  Group  
  • 18. Trending  threats  for  cri0cal  infrastructures   ➤  Root  causes  for  SCADA  vulnerabiliEes  today  (and  tomorrow):   ➤  ISO  27000  vs.  ISA-­‐99.00.01  have  contradicEng  prioriEes;  SCADA  wants  AIC,  while   INFOSEC  wants  CIA   ➤  The  human  communicaEon  conflict:  INFOSEC  and  SCADA  people  just  don’t  understand   each  other  !   ➤  The  human  element  remains  a  largely  ignored  weakness:   ➤  You  get  bored  at  night,  right  ?   ➤  You  want  to  browse  the  Internet  on  your  shiu,  right  ?   ➤  You  want  to  logon  from  your  home  to  the  HMI,  right  ?   Cyber  Defense  Group  
  • 19. Trending  threats  for  cri0cal  infrastructures   ➤  Bad  Trends  Top  5  :  Things  that  probably  will  stay  around  for  a  while   ➤  Office  AutomaEon  and  Industrial  Networks  become  connected   ➤  Cyber  Security  remains  an  auerthought  during  design  of  soluEons   ➤  Protocols  are  in  clear-­‐text  (speed  reasons)   ➤  Inadequately  developed  firewalls  that  naEvely  speak  SCADA  protocols   ➤  Insecure  coding  pracEces   ➤  Old  protocols,  old  systems:   ➤  Basic  hacking  techniques  most  likely  will  work   Cyber  Defense  Group  
  • 20. Trending  threats  for  cri0cal  infrastructures   ➤  Focus  on  Top  3  CriEcal  Infrastructures:   Oil  and  Gas   Smart  Grid   TelecommunicaEon   Cyber  Defense  Group  
  • 21. Trending  threats  for  cri0cal  infrastructures   ➤  Ongoing  developments:  Smart  Grids  /  Smart  Metering   ➤  Metering  and  control  of  intelligent  electricity  delivery  to  the  household   ➤  Privacy  by  Design:  Achieving  the  Gold  Standard  in  Data  ProtecEon  for  the  Smart  Grid  as   a  guideline  on  best  pracEces  (actually,  prewy  good)   ➤  High  Priority  on  security:   U.S.  Na7onal  Coordinator  for  Security,  Infrastructure  Protec7on,  and  Counter-­‐Terrorism,  has  stated  that   a  cyber  aSack  aimed  at  energy  infrastructure  “could  disable  trains  all  over  the  country  and  it  could  blow   up  pipelines.  It  could  cause  blackouts  and  damage  electrical  power  grids…It  could  wipe  out  and  confuse   financial  records…  It  could  do  things  like  disrupt  traffic  in  urban  areas  by  knocking  out  control  computers.   It  could…wipe  out  medical  records.   Cyber  Defense  Group  
  • 22. Trending  threats  for  cri0cal  infrastructures   Replace  exisEng   New  SCADA   Controlled   Improvement  of   SCADA  systems   based  soluEons   Industrial   SCADA  security   with  new   are  deployed  in   Environment   controls   soluEons   society   Cyber  Defense  Group  
  • 23. The  imminent  threat  of  our  mobile  networks   Cyber  Defense  Group  
  • 24. If  you  have  the  ability  to  deliver  a  reasonably  strong  radio  signal,     then  those  around  you  are  compromised.       Any  informa7on  that  goes  across  a  cell  phone  you  can  now  intercept.    Even  though  the   GSM  spec  requires  it,  this  is  a  deliberate  choice  on  the  cell  phone  makers   Cyber  Defense  Group  
  • 25. The  imminent  threat  of  our  mobile  networks   ➤  Security  by  obscurity  :   ➤  GSM  is  one  of  the  oldest  protocols  (and  most  insecure;  it’s  like  telnet)   ➤  Extremely  liwle  scruEny  on  3G/GSM  protocols   ➤  Only  4  closed-­‐source  GSM  stacks  produced   ➤  GSM  chipset  makers  never  release  any  hardware  documentaEon   ➤  Access  to  firmware  source  (3.5G  baseband  codes)  are  only…  some  lucky  few   ➤  Prices  for  BTS’s,  etc.  are  very  steep   ➤  Open  source  research  is  on  its  way  (and  advancing  rapidly)  !   Cyber  Defense  Group  
  • 26. The  imminent  threat  of  our  mobile  networks   ➤  GSMA  is  not  too  worried,  though  :   “  …  intercept  approach  has  underes0mated  its  pracEcal  complexity   A  hacker  would  need  a  radio  receiver  system  and  the  signal  processing     soDware  necessary  to  process  the  raw  radio  data.  CSMA,  Aug  2009   ✓  Underes0mated  complexity:  Ability  to  decrypt  A5  family  in  (near)  real  Eme  (2009)   ✓  Underes0mated  complexity:  IMSI  catching,  bypass  A3/A8,  …  (2010)   ✓  Radio  receiver  system:  USRP  /  USRP2  +  GNUradio  +  OpenBTS  (you  know,  the  soDware)   Cyber  Defense  Group  
  • 27. The  imminent  threat  of  our  mobile  networks   Trixie   ➤  Become  your  own  operator:   R/TFX900   Priceless   175  USD   ➤  Universal  Souware  Radio  Peripheral   ➤  GNUradio  Project   ➤  OpenBTS  /  OpenBSC  /  SMSqueue   USRP   800  USD   ➤  OsmocomBB   ➤  Asterisk   52  Mhz   ➤  Under  1.500  USD  you  cover  up  to   37  USD   300  m  of  GSM  signal  (indoor)  +  2   channels  (850/900/1800/1900).   Cyber  Defense  Group  
  • 28. The  imminent  threat  of  our  mobile  networks   ➤  Or  become  your  own  DIY  mobile   intelligence  unit:   ➤  4  x  USRP2  (Xilinx  Spartan  FPGA’s)   ➤  4  x  quad  core  i7  CPU’s   ➤  2  x  nvidia  Tesla  CUDA  C2070  cores   ➤  Power  generator  +  antennas   ➤  4  TB  storage   ➤  Costs  about  20.000  USD.  Cheap  eh?   Cyber  Defense  Group  
  • 29. The  imminent  threat  of  our  mobile  networks   ➤  The  mobile  network  threat  vectors:   ConfidenEality   Availability   Integrity   AcEve  Intercept   Power  Jamming   InserEng  audio  streams   Passive  Intercept     Call  Blackholing   Fuzzing  GSM  handsets   IMSI  Catching   LocaEon  Monitoring   Cyber  Defense  Group  
  • 30. “  Cell  phones  behave  like  ducks  ”     (you  may  quote  me  on  this)   Cyber  Defense  Group  
  • 31. The  imminent  threat  of  our  mobile  networks  (confidenEality)   If  it  looks  like  a  duck   ,  walks  like  a  duck   ,  talks  like  a  duck   =   it’s  a  duck  !   ?   MCC=525,  MNC=010   Handset  registers  to  who  ?   This  is  where  you  do  “Hello”   Cyber  Defense  Group  
  • 32. The  imminent  threat  of  our  mobile  networks  (confidenEality)   ➤  Listening  in  on  phone  calls  +  SMS  (“unlawful   intercept”):   ➤  Using  the  Berlin  A5  Codebooks  (2.3  TB)   ➤  Decode  A5.1  within  seconds  /  minutes   ➤  Ac0ve  intercept:   ➤  Passive  intercept:   ➤  AcEve  downgrade  of  A5.1/.2/.3  to  A5.0   ➤  Time-­‐Memory  Tradeoff  Awack   ➤  OpenBTS  +  Asterisk   ➤  OpenBTS  +  Airprobe   ➤  Basically,  man-­‐in-­‐the-­‐middle  awack  on  GSM   ➤  DecrypEon  required   Cyber  Defense  Group  
  • 33. The  imminent  threat  of  our  mobile  networks  (confidenEality)   ➤  How  handsets  get  connected  to  a  rogue  base   staEon  so  an  awacker  can  intercept:   ➤  Receive  gain  override  (“so,  you  are  a  100db   tower?”)  (used  for  IMSI  catchers  by  R&S)   ➤  Changing  LAC  (LocaEon  Area  Code)  to  enEce   handsets  to  handoff  to  new  (your)  BTS   ➤  Short  jam  burst,  so  handsets  are  forced  to  execute   handset  power-­‐up  process   ➤  ConEnuous  jam  3G  bands,  so  fail-­‐over  to  GSM   Cyber  Defense  Group  
  • 34. The  imminent  threat  of  our  mobile  networks  (confidenEality)   ➤  Remote  and  local  tracking  of  users,  using  a   blend  of  RRLP,  GPS,  GSM,  SMS,  mobile   applicaEons  and  Google  technologies:   ➤  Google  GSM  GeolocaEon  API  (not  LaEtude)   ➤  Cell-­‐locaEons  stored  on  local  smartphones   ➤  Using  applicaEons  to  covertly  send  out  logs   Cyber  Defense  Group  
  • 35. The  imminent  threat  of  our  mobile  networks  (availability)   ➤  By  accident.  Jammed  my  neighborhood  in  a   800m  radius  using  GNUradio,  2W  and  a  noise   generator  =>  Impossible  to  defend!   ➤  Purposeful:   ➤  Camping  GSM  signals  and  sink-­‐holing  them   ➤  Noise  generators  in  the  GSM  spectrum   ➤  Frequency  division  duplexing  flooding   ➤  Sending  IMSI  DETACH  messages   ➤  Channel  Request  Flooding  of  the  RACH   Cyber  Defense  Group  
  • 36. The  imminent  threat  of  our  mobile  networks  (availability)   ➤  Channel  Request  Flooding  of  the  Random   Access  Channel  (RACH)  burst:   ➤  Anonymous  awack   ➤  Successfully  executed  under  a  few  seconds   ➤  Cell-­‐phone  registers  (Channel  Request),  when  the   channel  is  not  established  (Eme-­‐out),  the  channel  is   released  by  the  BSC   ➤  Only  affects  one  BTS  at  a  Eme   Cyber  Defense  Group  
  • 37. The  imminent  threat  of  our  mobile  networks  (availability)   DoS   Cyber  Defense  Group  
  • 38. The  imminent  threat  of  our  mobile  networks  (availability)   ➤  Isolated  noise  output  test:  892  mode  test   ➤  Results:   ➤  Upset  neighbors,  but  peace  of  mind   ➤  Completely  knocked  out  the  850/900  GSM  signal  in   800  meter  radius,  using  a  short  (45sec)  burst   ➤  Test  (but  I’m  not  doing  it):   ➤  100  W  amplifier  (450  USD)  (1.500  W  HAM  limit!!)   ➤  Will  knock  out  GSM/3G/CDMA  over  large  secEon  of   Singapore   Cyber  Defense  Group  
  • 39. The  imminent  threat  of  our  mobile  networks  (integrity)   ➤  ManipulaEng  voice  conversaEons   ➤  AcEve  intercepEon  required,  as  we  do  not   modify  GSM  signal,  but  ulaw  data  packets:   ➤  Should  be  easy  to  manipulate  (given  IMSI  spoofing)   ➤  No  pracEcal  usage,  unless  you  really  want  to   annoy  people  :-­‐)   ➤  …  manipulaEng  SMS  messages  however,  is  a   threat  (OTP  over  SMS,  anyone?).   Cyber  Defense  Group  
  • 40. The  imminent  threat  of  our  mobile  networks  (integrity)   Free  McDonalds!   Cyber  Defense  Group  
  • 41. The  imminent  threat  of  our  mobile  networks  (integrity)   ➤  Fuzzing  target:   ➤  GSM  stack  in  baseband  processor   ➤  GSM  funcEon  libraries  in  operaEng  system   ➤  Fuzzing  results  auer  one  month  (using  scapy):   ➤  iPhone  IOS  4.2,  already  2  crashes   ➤  Windows  Mobile  7,  already  5  crashes   ➤  Android  2.2,  already  3  crashes   ➤  Not  sure  if  they  are  exploitable  yet.   Cyber  Defense  Group  
  • 42. What  are  we  up  against  ?   Cyber  Defense  Group  
  • 43. What  are  we  up  against  ?   ➤  Vital  and  criEcal  infrastructures  keeps   humans  safe,  alive  and  comfortable,  but:   ➤  Closed  source  protocols  are  being  leveraged  over   vulnerable  transportaEon  media  and  protocols   (think  TCP/IP,  RPC,  …)   ➤  Full  disclosure  research  increasingly  brings  exploits   and  vulnerabiliEes  in  the  open   ➤  It  is  100%  target  of  terrorist  awacks  and  asymmetric   warfare  tacEcs   ➤  Alot  of  Fear-­‐Uncertainty  and  –Doubt  (FUD)   Cyber  Defense  Group  
  • 44. What  are  we  up  against  ?   ➤  Mobile  telecommunicaEons  and  wireless   technologies  are  connecEng  everyone  and   everything,  yet  they  are  mostly  based  on   insecure  protocols:   ➤  SCADA  systems  using  GSM  for  large  plant  coverage   ➤  SCADA  systems  using  Bluetooth  (e.g.  smart  meters)   ➤  SCADA  systems  using  Wi-­‐Fi  /  ZigBee  protocols   ➤  Our  day-­‐to-­‐day  lives  and  safety  inherently   depend  on  IT  systems  and  networks  (*gulp*)   Cyber  Defense  Group  
  • 45. What  are  we  up  against  ?   ➤  Hackers  will  conEnue  to  awack  embedded   and  industrial  systems  (“stuxnet  is  only  the   beginning”).   ➤  Within  five  years,  a  large  scale  electronic   awack  will  disrupt  a  modern  society  to  its   inner  fabric.   ➤  Security  industry  will  need  to  rapidly   embrace  industrial  standards  and  collaborate   on  establishing  secure  and  robust  protocols.   Cyber  Defense  Group  
  • 46. “  Unless  cyber  security  controls  can  guarantee     our  safety,  it  is  irresponsible  to  merge  industrial  protocols   with  vulnerable  IT  technologies    (law  of  weakest  link)”     (you  may  quote  me  on  this  one  too)   Cyber  Defense  Group  
  • 47. If  not,  one  day  we  will  wake  up  and  find  ourselves:     deafened     blinded     and  muted   Cyber  Defense  Group  
  • 48. Contemporary  threats  to   cri0cal  and  mobile  infrastructures   Are  we  soon  deaf,  blind  and  muted  ?     ANSES  Rah  Rah  7,  Singapore   January  2010       Thank  You,   Cyber  Defense  Group