Standards
Certification
Education & Training
Publishing
Conferences & Exhibits
Demystifying Cyber
Attacks on ICS:
How They Work and How to Use
Engineered and Cyber Layer of
Protections Put title Here
2016 ISA Water / Wastewater and Automatic Controls Symposium
August 2-4, 2016 – Orlando, Florida, USA
Speaker:
Bryan L Singer, CISSP, CAP
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 2
Presenter
About the Presenter Bryan L Singer, CISSP, CAP
• Bryan Singer is a Principal Investigator with Kenexis
Security Corporation, specializing primarily in Industrial
Control Systems and SCADA Security. He began his
professional career with the US Army as a paratrooper
and Intelligence Analyst. Since the military, Mr. Singer
has designed, developed, and implemented large scale
industrial networks, cyber security architectures, and
conducted penetration tests and cyber security
assessments worldwide across various critical
infrastructure fields including power, oil and gas, food and
beverage, nuclear, automotive, chemical, and
pharmaceutical operations. In 2002, Mr. Singer became
the founding chairman of the ISA-99 / 62443 standard,
which he lead up until 2012. His areas of technical
expertise are in software development, reverse
engineering, forensics, network design, penetration
testing, and conducting cyber security vulnerability
assessments.
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 3
Why all the Fuss?
• “Vulnerabilities” are being released with increased
prevalence against ICS
• Most of these allow common IT type exploits against
endpoint ICS devices
• Engineering and operations don’t take many of these
seriously as they rely on engineered safeguards to protect a
process rather than IT integrity
• Actual attack analysis shows that successful ICS attackers
possess:
– Knowledge of cyber security
– Knowledge of ICS devices and their operations
– Knowledge of the specific industrial process and its operation
Fundamentally most ICS processes today are insufficiently
hardened against true ICS cyber attack
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 4
Mechanical Integrity
• “Mechanical Integrity means the process of ensuring that
process equipment is fabricated from the proper materials
of construction and is properly installed, maintained, and
replaced to prevent failures and accidental releases.” 19
CFR 2735.3
• Governed by OSHA 1910.119(j)
– By designing to meet or exceed standards
– By fabricating with proper materials, using proper construction and
installation techniques and confirming equipment suitability with
tests
– By ensuring that the equipment remains fit for service.
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 5
Mechanical Integrity (Cont)
• Mechanical Integrity (MI) can
be defined as the
management of critical
process equipment to ensure
it is designed and installed
correctly, and that it operates
properly
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 6
Achieving Mechanical Integrity in
Ethernet
• Predictable Failure
(Probability of Failure on
Demand)
• Equipment regular serviced
and in good order
• Properly documented
• No mechanical deficiencies
• Can provide assured control
over inputs and outputs
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 7
Analysis of ICS for Cyber Security
• Assessment: Analyze the process to understand safety,
reliability, and security threats
– Attack Modeling: Think like an Attacker
– Engineering Analysis: Understand the safeguards and control
systems – and how to bypass them
– Cyber Security Analysis: Understand how to gain access to, and
pwn the ICS
• Network Security Monitoring – What alarms and signals
should be watched?
• Forensics – If all goes wrong, where’s the data?
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 8
Mechanical Integrity Versus Cyber-
Physical Integrity
• Mechanical Integrity: The sum total of the parts will
operate as expected, despite predicable and foreknown
failure of one or more components
• Cyber-Mechanical Integrity: The system is resilient to
fault against unpredictable and known or unknown failure of
any single component
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 9
Achieving Cyber Physical Integrity
• Traditional ICS Security controls are insufficient:
– Firewalls can control the point of origination of a message and the type of
network traffic, but not the message itself
– Access control can prevent unauthorized change but non-repudiation in ICS
is nearly impossible
– Message integrity and encryption can help assure message integrity
– Input validation can be violated by changing logic or firmware, or masking
signals
• Layer of Protection Analysis with cyber (Cyber LOPA):
– Determine mechanical safeguards to prevent compromise of cyber-
mechanical integrity
– Even where traditional safety calculations say SIS or additional engineered
layers of protection are insufficient, cyber LOPA will likely demonstrate
otherwise
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 10
Cold
Water
DISTILLATE
REFLUX
Steam
BOTTOM
S
T
Distillation
Column
Reboiler
Reboile
r
L
F
T
L
T
Flare
P
P
Distillatio
n
Column
Natural
Gas
Gasoline
Kerosene,
Jet Fuel
Diesel
Lubricants,
Motor Oil
Fuel Oil
Asphalt
T
Condenser
T
Reflux
Accumulator
FEED
F
BOTTOMS LIQUID
VAPOR
OFFGAS
OFFGAS
Putting it all Together, Cyber-
Physical Attacks
10% Ethanol /
Water Mix
>40L / Min
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 11
• Part 1 – Surveillance
– Social Engineering, OSINT, Integrators
• Part 2 – System Mapping
– Modbus or vendor tag searches
• Part 3 – Initial Infections and Compromise
• Part 4 – Information Exfiltration
• Part 5 – The Final Attack
– Alarm Suppression
– Operator Misdirection
– MITM HMI / deploy RDP
– TCP Read / Replay
Sample: Distillation Column
Attack
There is a crossover point in which cyber security attacks
must yield to process attacks
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 12
IT versus OT Countermeasures
Then Why are Firewalls are IT Counter Measures Our Go
To Solution?
• Firewall
• IDS
• Data Diodes
• SIEM
• Antivirus
These effective at keeping attacks off the network and
containing attacks, but not at stopping compromise at the PLC
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 13
SPR Process – Identifying Cyber –
Physical Safeguards
13
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 14
Assessing Cyber-Mechanical Integrity
(SAMSEN)
• Signal Manipulation
– Modification of set points, logic, firmware,
radio signals, or others
• Access Control Violation
– Credential loss, modification, or other
compromise
• Mechanical Manipulation
– Changes to physical machine behavior, fail
energized, fail closed, frequency
modifications, introductions of RF
interference, jamming, or other electrical
noise (EMP)
– Modifying behavior of physical components
• Social Engineering, Extortion, and
Collusion
– Forcing operators to do your bidding
• Environmental Manipulation
– Forcing hazardous releases or conditions,
modifications to HVAC
• Network Interruption on Modification
– MITM, replay attacks, sidejacking, hijacking
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 15
Discussion – Turbine Gas Generator
• Objective: Close Suction
and Discharge Valves to
create surge condition
• S – Change firmware to
report false valve state
• A – Access safety builder
to modify firmware
• M – Force valve states,
what if physical required?
Spoof alarms
• S - Collusion to bypass
Over Speed Protection
• E – None needed
• N – Possible MITM?
• Possible Additional Layers
of Protection
– Condition Based Monitoring
– Hardwired light panels
– Mechanical Machine
overspeed
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 16
Discussion – Distillation Column
Cold
Water
DISTILLATE
REFLUX
Steam
BOTT
OMS
T
Distillation
Column
Reboiler
Reb
oiler
L
F
T
L
T
Flare
P
P
Distill
ation
Colum
n
Natur
al Gas
Gasoli
ne
Keros
ene,
Jet
Fuel
Diesel
Lubricants,
Motor Oil
Fuel Oil
Asphalt
T
Condens
er
T
Reflux
Accumul
ator
FEED
F
BOTTOMS LIQUID
VAPOR
OFFGAS
OFFGAS
10% Ethanol /
Water Mix
>40L / Min
Physical Blow-up, Not possible
due to Emergency Relief Valve
(properly sized)
What would be alternate
motivation? Financial Impact
S – False report of valve state and
burner
A – Hijack HMI
M – Take advantage of improper
ERV
S - Extort process information
E – Set process alarms to
misdirect operators
N – Spoof / MITM HMI
Additional Layers of Protection
Properly sized ERV
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 17
Drinking Water: Disinfection
Technologies
• Disinfection using Chemical Dosing
• Most Common: Chlorine(Gas, Sodium Hypochlorite)
• Ultraviolet / Ozonation systems
• Used as primary disinfectant , but also maintained residual
levels in distribution system
• Threats:
• Chemical dosing may be pace on Flow and Residual
Levels monitored by analyzers.
• Override of Flow/analyzer values
• Show lower flow rate, Less Dosing
• Override Residual CL2 level out plant output to
show high level.
• Override directly PLC that controls UV and Ozone
• The system will under chlorinate allowing harmful micro-
organisms to enter drinking water system
• Lab testing will catch this , but will it be too late??
• Water Notice to be sent to all customers
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 18
Safeguards Inherently Cyber-Safe
• Pressure Relief Valves
• Mechanical Overspeed Trips
• Non-Return Check Valves
• Motor Overload Relays
• Motor Current Monitor Relays
• Generalized Control Loop Current
Monitor Relays
• Bypass or manipulation of these
*may* be possible, but would require
physical intervention, making attack
far less likely than a connected
system
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 19
Conclusions
• Process plant loss of
containment can result in
extreme consequences
• These consequence are
protected against by a variety
of safeguards, some of which
are inherently safe against
cyber-attack
• Use of a PHA Cyber-Check
can ensure that these
safeguards are deployed in
the proper locations, making
the plant inherently safe
against cyber attack
2016 ISA WWAC Symposium
Aug 2-4, 2016 – Orlando, Florida, USA 20
Thank You, and Stay Safe!
Bryan L Singer, CISSP, CAP
Principal Investigator
Bryan.singer@Kenexis.com

Demystifying Cyber Attacks on ICS-.pdf

  • 1.
    Standards Certification Education & Training Publishing Conferences& Exhibits Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of Protections Put title Here 2016 ISA Water / Wastewater and Automatic Controls Symposium August 2-4, 2016 – Orlando, Florida, USA Speaker: Bryan L Singer, CISSP, CAP
  • 2.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 2 Presenter About the Presenter Bryan L Singer, CISSP, CAP • Bryan Singer is a Principal Investigator with Kenexis Security Corporation, specializing primarily in Industrial Control Systems and SCADA Security. He began his professional career with the US Army as a paratrooper and Intelligence Analyst. Since the military, Mr. Singer has designed, developed, and implemented large scale industrial networks, cyber security architectures, and conducted penetration tests and cyber security assessments worldwide across various critical infrastructure fields including power, oil and gas, food and beverage, nuclear, automotive, chemical, and pharmaceutical operations. In 2002, Mr. Singer became the founding chairman of the ISA-99 / 62443 standard, which he lead up until 2012. His areas of technical expertise are in software development, reverse engineering, forensics, network design, penetration testing, and conducting cyber security vulnerability assessments.
  • 3.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 3 Why all the Fuss? • “Vulnerabilities” are being released with increased prevalence against ICS • Most of these allow common IT type exploits against endpoint ICS devices • Engineering and operations don’t take many of these seriously as they rely on engineered safeguards to protect a process rather than IT integrity • Actual attack analysis shows that successful ICS attackers possess: – Knowledge of cyber security – Knowledge of ICS devices and their operations – Knowledge of the specific industrial process and its operation Fundamentally most ICS processes today are insufficiently hardened against true ICS cyber attack
  • 4.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 4 Mechanical Integrity • “Mechanical Integrity means the process of ensuring that process equipment is fabricated from the proper materials of construction and is properly installed, maintained, and replaced to prevent failures and accidental releases.” 19 CFR 2735.3 • Governed by OSHA 1910.119(j) – By designing to meet or exceed standards – By fabricating with proper materials, using proper construction and installation techniques and confirming equipment suitability with tests – By ensuring that the equipment remains fit for service.
  • 5.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 5 Mechanical Integrity (Cont) • Mechanical Integrity (MI) can be defined as the management of critical process equipment to ensure it is designed and installed correctly, and that it operates properly
  • 6.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 6 Achieving Mechanical Integrity in Ethernet • Predictable Failure (Probability of Failure on Demand) • Equipment regular serviced and in good order • Properly documented • No mechanical deficiencies • Can provide assured control over inputs and outputs
  • 7.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 7 Analysis of ICS for Cyber Security • Assessment: Analyze the process to understand safety, reliability, and security threats – Attack Modeling: Think like an Attacker – Engineering Analysis: Understand the safeguards and control systems – and how to bypass them – Cyber Security Analysis: Understand how to gain access to, and pwn the ICS • Network Security Monitoring – What alarms and signals should be watched? • Forensics – If all goes wrong, where’s the data?
  • 8.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 8 Mechanical Integrity Versus Cyber- Physical Integrity • Mechanical Integrity: The sum total of the parts will operate as expected, despite predicable and foreknown failure of one or more components • Cyber-Mechanical Integrity: The system is resilient to fault against unpredictable and known or unknown failure of any single component
  • 9.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 9 Achieving Cyber Physical Integrity • Traditional ICS Security controls are insufficient: – Firewalls can control the point of origination of a message and the type of network traffic, but not the message itself – Access control can prevent unauthorized change but non-repudiation in ICS is nearly impossible – Message integrity and encryption can help assure message integrity – Input validation can be violated by changing logic or firmware, or masking signals • Layer of Protection Analysis with cyber (Cyber LOPA): – Determine mechanical safeguards to prevent compromise of cyber- mechanical integrity – Even where traditional safety calculations say SIS or additional engineered layers of protection are insufficient, cyber LOPA will likely demonstrate otherwise
  • 10.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 10 Cold Water DISTILLATE REFLUX Steam BOTTOM S T Distillation Column Reboiler Reboile r L F T L T Flare P P Distillatio n Column Natural Gas Gasoline Kerosene, Jet Fuel Diesel Lubricants, Motor Oil Fuel Oil Asphalt T Condenser T Reflux Accumulator FEED F BOTTOMS LIQUID VAPOR OFFGAS OFFGAS Putting it all Together, Cyber- Physical Attacks 10% Ethanol / Water Mix >40L / Min
  • 11.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 11 • Part 1 – Surveillance – Social Engineering, OSINT, Integrators • Part 2 – System Mapping – Modbus or vendor tag searches • Part 3 – Initial Infections and Compromise • Part 4 – Information Exfiltration • Part 5 – The Final Attack – Alarm Suppression – Operator Misdirection – MITM HMI / deploy RDP – TCP Read / Replay Sample: Distillation Column Attack There is a crossover point in which cyber security attacks must yield to process attacks
  • 12.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 12 IT versus OT Countermeasures Then Why are Firewalls are IT Counter Measures Our Go To Solution? • Firewall • IDS • Data Diodes • SIEM • Antivirus These effective at keeping attacks off the network and containing attacks, but not at stopping compromise at the PLC
  • 13.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 13 SPR Process – Identifying Cyber – Physical Safeguards 13
  • 14.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 14 Assessing Cyber-Mechanical Integrity (SAMSEN) • Signal Manipulation – Modification of set points, logic, firmware, radio signals, or others • Access Control Violation – Credential loss, modification, or other compromise • Mechanical Manipulation – Changes to physical machine behavior, fail energized, fail closed, frequency modifications, introductions of RF interference, jamming, or other electrical noise (EMP) – Modifying behavior of physical components • Social Engineering, Extortion, and Collusion – Forcing operators to do your bidding • Environmental Manipulation – Forcing hazardous releases or conditions, modifications to HVAC • Network Interruption on Modification – MITM, replay attacks, sidejacking, hijacking
  • 15.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 15 Discussion – Turbine Gas Generator • Objective: Close Suction and Discharge Valves to create surge condition • S – Change firmware to report false valve state • A – Access safety builder to modify firmware • M – Force valve states, what if physical required? Spoof alarms • S - Collusion to bypass Over Speed Protection • E – None needed • N – Possible MITM? • Possible Additional Layers of Protection – Condition Based Monitoring – Hardwired light panels – Mechanical Machine overspeed
  • 16.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 16 Discussion – Distillation Column Cold Water DISTILLATE REFLUX Steam BOTT OMS T Distillation Column Reboiler Reb oiler L F T L T Flare P P Distill ation Colum n Natur al Gas Gasoli ne Keros ene, Jet Fuel Diesel Lubricants, Motor Oil Fuel Oil Asphalt T Condens er T Reflux Accumul ator FEED F BOTTOMS LIQUID VAPOR OFFGAS OFFGAS 10% Ethanol / Water Mix >40L / Min Physical Blow-up, Not possible due to Emergency Relief Valve (properly sized) What would be alternate motivation? Financial Impact S – False report of valve state and burner A – Hijack HMI M – Take advantage of improper ERV S - Extort process information E – Set process alarms to misdirect operators N – Spoof / MITM HMI Additional Layers of Protection Properly sized ERV
  • 17.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 17 Drinking Water: Disinfection Technologies • Disinfection using Chemical Dosing • Most Common: Chlorine(Gas, Sodium Hypochlorite) • Ultraviolet / Ozonation systems • Used as primary disinfectant , but also maintained residual levels in distribution system • Threats: • Chemical dosing may be pace on Flow and Residual Levels monitored by analyzers. • Override of Flow/analyzer values • Show lower flow rate, Less Dosing • Override Residual CL2 level out plant output to show high level. • Override directly PLC that controls UV and Ozone • The system will under chlorinate allowing harmful micro- organisms to enter drinking water system • Lab testing will catch this , but will it be too late?? • Water Notice to be sent to all customers
  • 18.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 18 Safeguards Inherently Cyber-Safe • Pressure Relief Valves • Mechanical Overspeed Trips • Non-Return Check Valves • Motor Overload Relays • Motor Current Monitor Relays • Generalized Control Loop Current Monitor Relays • Bypass or manipulation of these *may* be possible, but would require physical intervention, making attack far less likely than a connected system
  • 19.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 19 Conclusions • Process plant loss of containment can result in extreme consequences • These consequence are protected against by a variety of safeguards, some of which are inherently safe against cyber-attack • Use of a PHA Cyber-Check can ensure that these safeguards are deployed in the proper locations, making the plant inherently safe against cyber attack
  • 20.
    2016 ISA WWACSymposium Aug 2-4, 2016 – Orlando, Florida, USA 20 Thank You, and Stay Safe! Bryan L Singer, CISSP, CAP Principal Investigator Bryan.singer@Kenexis.com