SlideShare a Scribd company logo
© 2013 Belden Inc. | belden.com | @BeldenInc 1Copyright © FireEye, Inc. All rights reserved.1
OVERLOAD
CRITICAL LESSONS FROM 15 YEARS OF ICS
VULNERABILITIES
Presented by Allison Wong CISSP
© 2013 Belden Inc. | belden.com | @BeldenInc 7
• Security governance often not clear
• Differing priorities
− Physics vs Information
− Reliability and predictability vs C-I-A
− Safety vs Intellectual Property
• Core technology challenges
− No security visibility
− Unauthenticated protocols
− Unauthenticated firmware loads
− Unauthenticated control logic
Industrial Environments Face Unique Security Challenges
Must maintain
uptime of industrial
processes being
controlled
Balance priorities
2
Must bring IT-OT
together
Complete
1
Must meet real
challenges
Practical
3
© 2013 Belden Inc. | belden.com | @BeldenInc 8
Industrial Security Incident Types
• Misconfigurations – network, control logic
• Lack of process visibility –sensor failure, alarm
overload
• Unintentional propagation of malware – USB,
email, Web
• Malicious Insiders – disgruntled or
compromise employees/contractors
• Intentional outside attack – Enthusiasts,
Hacktivists, Competitors, Criminals, Nation-
states
© 2013 Belden Inc. | belden.com | @BeldenInc 9
• Oil pipeline shut down for 6 hours after software is
accidently uploaded to a PLC on the plant network
instead of test network
• 13 auto assembly plants were shut down by a simple
Internet worm; 50,000 workers stop work for 1 hour
while malware removed
• Operators at a major USA nuclear power plant forced
to “scram” the reactor after cooling drive controllers
crashed due to “excessive network traffic”
Financial Implications
It’s the plant that makes the money
© 2013 Belden Inc. | belden.com | @BeldenInc 10
Common Mistakes and Misconfigurations
Recent Mandiant ICS Healthchecks uncovered
• Unpatched or misconfigured firewalls
• BYOD/Guest Wi-Fi network with route to ICS zone
• Evidence of web browsing in ICS zone
• Unexplained Internet-bound requests
• Traffic direct from business network to ICS zone
• Limited segmentation between ICS zones
© 2013 Belden Inc. | belden.com | @BeldenInc 11
FireEye iSIGHT Intelligence
© 2013 Belden Inc. | belden.com | @BeldenInc 12
Intelligence Cycle
1. Identify Intelligence
Requirements
2. Collect/Research
3. Analyze
4. Disseminate
© 2013 Belden Inc. | belden.com | @BeldenInc 13
ICS Threat History Timeline
2003: 1st SCADA security presentation at hacker conference
2004: 1st PLC vulnerability disclosures
2009: 1st verified ICS-specific malware (Stuxnet)
2012: Actors reconnoitering for SCADA – get *SCAD*.*
2012: 1st major ICS vendor compromise (Telvent)
2013: Reconnaissance of ICS ports/protocols (Shodan/others scanning)
2014: Malware enumeration of ICS – reading OPC tags (Koala)
2014: Targeting ICS engineers/integrators via watering holes (Koala)
2014: Exploitation of HMI vulnerabilities (Sandworm/GE reports)
2015: Actor selling access to compromised ICS
2015: Attacks with kinetic consequence (Sandworm/Ukraine utilities)
Theoretical
Actual
© 2013 Belden Inc. | belden.com | @BeldenInc 14
14
Overall increasing trend in ICS-specific vulnerability disclosures
In 2015 we identified 371 disclosures. As of April 2016, we are tracking nearly 1600.
Two large disclosures in
2015
August
• 56 vulnerabilities in
OSIsoft Data Archive
September
• 36 vulnerabilities in
Yokogawa products
0
50
100
150
200
250
300
350
400
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
© 2013 Belden Inc. | belden.com | @BeldenInc 15
15
Espionage Activity
During Q1 2016 we reported on 10 espionage actors from various geographies.
© 2013 Belden Inc. | belden.com | @BeldenInc 16
16
Activity Sample: Sandworm Team in Ukraine
Sandworm team demonstrated moderate capability to attack industrial processes
• First power outages
recognized from
intentional cyber attack
• Disparate regions,
separate companies
• At least 57 substations,
339 towns and villages,
225,000 total customers
© 2013 Belden Inc. | belden.com | @BeldenInc 17
• Cyber Caliphate
Army's claimed
attack on surveillance
cameras had the
highest potential
consequence.
• The physical attacks
at the Brussels
airport and metro
station in March lend
additional credibility
to such a scenario.
17
2016 Q1 Hacktivist Activity
© 2013 Belden Inc. | belden.com | @BeldenInc 18
• At organizations that operate ICS
• Ransomware Masquerades as
Allen-Bradley File
• Cerber, Cryptowall,
TorrentLocker, TeslaCrypt
• “Stampado” ransomware offered
inexpensively
• FireEye Horizons: Nations
Adopting Cyber Crime Extortion
Tools for Compellence
18
Ransomware Activity
Rising trend
© 2013 Belden Inc. | belden.com | @BeldenInc 19
• Researcher Details Vibration Attacks Against
Industrial Facilities
• Simple to Exploit Vulnerability in Schneider Electric
Modicon PLCs Leads to Loss of Process Control
• Default ICS Password List Marginally Increases
Ease of Attack
19
2016 ICS Attack Research
© 2013 Belden Inc. | belden.com | @BeldenInc 20
• US Planned Cyber Attacks on Iranian
Infrastructure
• 'Intranet Framework' Seeks to Sell
Remote Access to SCADA Systems
• Actor Seeks Exploit for Rockwell
Automation Software and Controllers
20
2016 ICS Threat Developments
© 2013 Belden Inc. | belden.com | @BeldenInc 21
• CPNI Releases Guidance for Improving Security
in the Built Environment
• Researcher Proposes ICS Patching Strategy
• New Books Highlight ICS Defensive Strategies
• FDA Releases Draft Guidance Focusing on Cyber
Security in Postmarket Medical Devices
21
2016 ICS Defense Developments
© 2013 Belden Inc. | belden.com | @BeldenInc 22
• Get a plan and program for ICS security
− Merge IT - OT governance efforts
− Experts to assess and recommend
• Inventory your control systems
− Software
− Controllers
− Function/impact
• Segment your network
− Review firewall placement and rules
− Review router configurations
Lessons Learned?
Reducing Your Risk
Must maintain
uptime of industrial
processes being
controlled
Balance priorities
2
Must bring IT-OT
together
Complete
1
Must meet real
challenges
Practical
3
© 2013 Belden Inc. | belden.com | @BeldenInc 23
Simplified Purdue Model / ISA Reference Architecture
L0L1L2L3L4
© 2013 Belden Inc. | belden.com | @BeldenInc 24
© 2013 Belden Inc. | belden.com | @BeldenInc 25
Tripwire Enterprise and FireEye AX
© 2013 Belden Inc. | belden.com | @BeldenInc 26
FireEye/Mandiant’s ICS Healthcheck Assessment Process:
Activity 1: Architecture Workshops
• Speak with plant Mgmt/Staff to gain an understanding of the ICS network
• Draw a network diagram of the ICS
• Overlay potential cyber security threats and attacks on the diagram
Activity 2: Firewall configuration review
• Obtain configurations of firewalls and switches at the site and go line by line
• Perform automated and manual analysis on the configurations to look for security
misconfigurations and flaws
Activity 3: Analyze network traffic with FireEye PX
• Collect full packet capture and flow data from ICS network (usually from site’s main switch)
• Look for anomalous or undesirable connectivity to internet or business network
Activity 4: Analyze log data with FireEye Threat Analytics Platform (TAP)
• Collect any relevant log sources from the ICS environment (examples: VPN,
Authentication, Firewall, Syslog, Windows Events)
• Apply intelligence, rules, analytics, and frequency analysis to identify malicious or
anomalous activity
© 2013 Belden Inc. | belden.com | @BeldenInc 27
Joint Customer Benefit Examples
• Integration of Industry specific Threat Intel with
ISIGHT and contextualization of logs from Belden
industrial technology in TAP
• Tripwire customers can integrate with MVX/AX
• Hunt for IOCs across IT and ICS environments
Belden ICS industrial cyber security and networking
equipment
• Tofino
• GarrettCom
• Hirschmann
• Tripwire
+Several other leading brands in the area of industrial networking and signal
transmission equipment.
FireEye Threat Intelligence Portfolio
• FireEye’s Threat Intelligence
• Mandiant services
• iSight’s ICS expertise
27
© 2013 Belden Inc. | belden.com | @BeldenInc 28
Question & Answer Time
© 2013 Belden
Belden.com | @BeldenInc

More Related Content

What's hot

Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
Priyanka Aash
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
EnergySec
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security program
Outpost24
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
Jim Gilsinn
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
Priyanka Aash
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
Jim Gilsinn
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Eran Goldstein
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
EnergySec
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Shah Sheikh
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
Jim Gilsinn
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
Jim Gilsinn
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Sridhar Karnam
 

What's hot (20)

Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security program
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 

Viewers also liked

Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Tripwire
 
3 Success Stories on the Tripwire Enterprise Journey
3 Success Stories on the Tripwire Enterprise Journey3 Success Stories on the Tripwire Enterprise Journey
3 Success Stories on the Tripwire Enterprise Journey
Tripwire
 
8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace
Tripwire
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
Tripwire
 
Fair Use 3/2017
Fair Use 3/2017Fair Use 3/2017
Fair Use 3/2017
Meghan Damour
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
Tripwire
 
Aggreview preso #3
Aggreview   preso #3Aggreview   preso #3
Aggreview preso #3
Taku Rusike
 
Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017
Tripwire
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire
 
Ecet 330 final exam new 2016
Ecet 330 final exam new 2016Ecet 330 final exam new 2016
Ecet 330 final exam new 2016
powellabril
 
Eco 365 entire course
Eco 365 entire courseEco 365 entire course
Eco 365 entire course
powellabril
 
BOST
BOSTBOST
The Future of Customer Success is Agile
The Future of Customer Success is AgileThe Future of Customer Success is Agile
The Future of Customer Success is Agile
Amity
 
Textual elements
Textual elementsTextual elements
Textual elements
Briana VanBuskirk
 
Digipak and Website Evaluation Task 1
Digipak and Website Evaluation Task 1Digipak and Website Evaluation Task 1
Digipak and Website Evaluation Task 1
ella lewis
 
Psicopatología criminal - criminalistica/criminologia
Psicopatología criminal - criminalistica/criminologiaPsicopatología criminal - criminalistica/criminologia
Psicopatología criminal - criminalistica/criminologia
Universidad en Criminalistica
 
Security Mentors: Honoring Those Who Inspired Our Love of Infosec
Security Mentors: Honoring Those Who Inspired Our Love of InfosecSecurity Mentors: Honoring Those Who Inspired Our Love of Infosec
Security Mentors: Honoring Those Who Inspired Our Love of Infosec
Tripwire
 
Tripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability ManagementTripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability Management
Tripwire
 
Takeaways from Black Hat 2016
Takeaways from Black Hat 2016Takeaways from Black Hat 2016
Takeaways from Black Hat 2016
Tripwire
 

Viewers also liked (20)

Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
 
3 Success Stories on the Tripwire Enterprise Journey
3 Success Stories on the Tripwire Enterprise Journey3 Success Stories on the Tripwire Enterprise Journey
3 Success Stories on the Tripwire Enterprise Journey
 
8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
 
Fair Use 3/2017
Fair Use 3/2017Fair Use 3/2017
Fair Use 3/2017
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
 
Aggreview preso #3
Aggreview   preso #3Aggreview   preso #3
Aggreview preso #3
 
Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017Top Talks from BSides San Francisco 2017
Top Talks from BSides San Francisco 2017
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
 
Ecet 330 final exam new 2016
Ecet 330 final exam new 2016Ecet 330 final exam new 2016
Ecet 330 final exam new 2016
 
Eco 365 entire course
Eco 365 entire courseEco 365 entire course
Eco 365 entire course
 
BOST
BOSTBOST
BOST
 
The Future of Customer Success is Agile
The Future of Customer Success is AgileThe Future of Customer Success is Agile
The Future of Customer Success is Agile
 
Textual elements
Textual elementsTextual elements
Textual elements
 
Digipak and Website Evaluation Task 1
Digipak and Website Evaluation Task 1Digipak and Website Evaluation Task 1
Digipak and Website Evaluation Task 1
 
Psicopatología criminal - criminalistica/criminologia
Psicopatología criminal - criminalistica/criminologiaPsicopatología criminal - criminalistica/criminologia
Psicopatología criminal - criminalistica/criminologia
 
Security Mentors: Honoring Those Who Inspired Our Love of Infosec
Security Mentors: Honoring Those Who Inspired Our Love of InfosecSecurity Mentors: Honoring Those Who Inspired Our Love of Infosec
Security Mentors: Honoring Those Who Inspired Our Love of Infosec
 
Tripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability ManagementTripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability Management
 
Takeaways from Black Hat 2016
Takeaways from Black Hat 2016Takeaways from Black Hat 2016
Takeaways from Black Hat 2016
 

Similar to Overload: Critical Lessons from 15 Years of ICS Vulnerabilities

Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Tripwire
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
Charles Li
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
TI Safe
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
PROIDEA
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
Vrince Vimal
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
Industrial Internet Consortium
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
Cisco Canada
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
Dell EMC World
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Dawn Yankeelov
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...qqlan
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
PROFIBUS and PROFINET InternationaI - PI UK
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
AVEVA
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
turveycharlyn
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
ssuserfb92ae
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
Jeffrey Wang , P.Eng
 
Securing SCADA
Securing SCADASecuring SCADA
Securing SCADA
Jeffrey Wang , P.Eng
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
TI Safe
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
PrinceGupta789219
 

Similar to Overload: Critical Lessons from 15 Years of ICS Vulnerabilities (20)

Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Securing SCADA
Securing SCADASecuring SCADA
Securing SCADA
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
 

More from Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Tripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
Tripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Tripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Tripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
Tripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
Tripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
Tripwire
 

More from Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 

Overload: Critical Lessons from 15 Years of ICS Vulnerabilities

  • 1. © 2013 Belden Inc. | belden.com | @BeldenInc 1Copyright © FireEye, Inc. All rights reserved.1 OVERLOAD CRITICAL LESSONS FROM 15 YEARS OF ICS VULNERABILITIES Presented by Allison Wong CISSP
  • 2. © 2013 Belden Inc. | belden.com | @BeldenInc 7 • Security governance often not clear • Differing priorities − Physics vs Information − Reliability and predictability vs C-I-A − Safety vs Intellectual Property • Core technology challenges − No security visibility − Unauthenticated protocols − Unauthenticated firmware loads − Unauthenticated control logic Industrial Environments Face Unique Security Challenges Must maintain uptime of industrial processes being controlled Balance priorities 2 Must bring IT-OT together Complete 1 Must meet real challenges Practical 3
  • 3. © 2013 Belden Inc. | belden.com | @BeldenInc 8 Industrial Security Incident Types • Misconfigurations – network, control logic • Lack of process visibility –sensor failure, alarm overload • Unintentional propagation of malware – USB, email, Web • Malicious Insiders – disgruntled or compromise employees/contractors • Intentional outside attack – Enthusiasts, Hacktivists, Competitors, Criminals, Nation- states
  • 4. © 2013 Belden Inc. | belden.com | @BeldenInc 9 • Oil pipeline shut down for 6 hours after software is accidently uploaded to a PLC on the plant network instead of test network • 13 auto assembly plants were shut down by a simple Internet worm; 50,000 workers stop work for 1 hour while malware removed • Operators at a major USA nuclear power plant forced to “scram” the reactor after cooling drive controllers crashed due to “excessive network traffic” Financial Implications It’s the plant that makes the money
  • 5. © 2013 Belden Inc. | belden.com | @BeldenInc 10 Common Mistakes and Misconfigurations Recent Mandiant ICS Healthchecks uncovered • Unpatched or misconfigured firewalls • BYOD/Guest Wi-Fi network with route to ICS zone • Evidence of web browsing in ICS zone • Unexplained Internet-bound requests • Traffic direct from business network to ICS zone • Limited segmentation between ICS zones
  • 6. © 2013 Belden Inc. | belden.com | @BeldenInc 11 FireEye iSIGHT Intelligence
  • 7. © 2013 Belden Inc. | belden.com | @BeldenInc 12 Intelligence Cycle 1. Identify Intelligence Requirements 2. Collect/Research 3. Analyze 4. Disseminate
  • 8. © 2013 Belden Inc. | belden.com | @BeldenInc 13 ICS Threat History Timeline 2003: 1st SCADA security presentation at hacker conference 2004: 1st PLC vulnerability disclosures 2009: 1st verified ICS-specific malware (Stuxnet) 2012: Actors reconnoitering for SCADA – get *SCAD*.* 2012: 1st major ICS vendor compromise (Telvent) 2013: Reconnaissance of ICS ports/protocols (Shodan/others scanning) 2014: Malware enumeration of ICS – reading OPC tags (Koala) 2014: Targeting ICS engineers/integrators via watering holes (Koala) 2014: Exploitation of HMI vulnerabilities (Sandworm/GE reports) 2015: Actor selling access to compromised ICS 2015: Attacks with kinetic consequence (Sandworm/Ukraine utilities) Theoretical Actual
  • 9. © 2013 Belden Inc. | belden.com | @BeldenInc 14 14 Overall increasing trend in ICS-specific vulnerability disclosures In 2015 we identified 371 disclosures. As of April 2016, we are tracking nearly 1600. Two large disclosures in 2015 August • 56 vulnerabilities in OSIsoft Data Archive September • 36 vulnerabilities in Yokogawa products 0 50 100 150 200 250 300 350 400 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
  • 10. © 2013 Belden Inc. | belden.com | @BeldenInc 15 15 Espionage Activity During Q1 2016 we reported on 10 espionage actors from various geographies.
  • 11. © 2013 Belden Inc. | belden.com | @BeldenInc 16 16 Activity Sample: Sandworm Team in Ukraine Sandworm team demonstrated moderate capability to attack industrial processes • First power outages recognized from intentional cyber attack • Disparate regions, separate companies • At least 57 substations, 339 towns and villages, 225,000 total customers
  • 12. © 2013 Belden Inc. | belden.com | @BeldenInc 17 • Cyber Caliphate Army's claimed attack on surveillance cameras had the highest potential consequence. • The physical attacks at the Brussels airport and metro station in March lend additional credibility to such a scenario. 17 2016 Q1 Hacktivist Activity
  • 13. © 2013 Belden Inc. | belden.com | @BeldenInc 18 • At organizations that operate ICS • Ransomware Masquerades as Allen-Bradley File • Cerber, Cryptowall, TorrentLocker, TeslaCrypt • “Stampado” ransomware offered inexpensively • FireEye Horizons: Nations Adopting Cyber Crime Extortion Tools for Compellence 18 Ransomware Activity Rising trend
  • 14. © 2013 Belden Inc. | belden.com | @BeldenInc 19 • Researcher Details Vibration Attacks Against Industrial Facilities • Simple to Exploit Vulnerability in Schneider Electric Modicon PLCs Leads to Loss of Process Control • Default ICS Password List Marginally Increases Ease of Attack 19 2016 ICS Attack Research
  • 15. © 2013 Belden Inc. | belden.com | @BeldenInc 20 • US Planned Cyber Attacks on Iranian Infrastructure • 'Intranet Framework' Seeks to Sell Remote Access to SCADA Systems • Actor Seeks Exploit for Rockwell Automation Software and Controllers 20 2016 ICS Threat Developments
  • 16. © 2013 Belden Inc. | belden.com | @BeldenInc 21 • CPNI Releases Guidance for Improving Security in the Built Environment • Researcher Proposes ICS Patching Strategy • New Books Highlight ICS Defensive Strategies • FDA Releases Draft Guidance Focusing on Cyber Security in Postmarket Medical Devices 21 2016 ICS Defense Developments
  • 17. © 2013 Belden Inc. | belden.com | @BeldenInc 22 • Get a plan and program for ICS security − Merge IT - OT governance efforts − Experts to assess and recommend • Inventory your control systems − Software − Controllers − Function/impact • Segment your network − Review firewall placement and rules − Review router configurations Lessons Learned? Reducing Your Risk Must maintain uptime of industrial processes being controlled Balance priorities 2 Must bring IT-OT together Complete 1 Must meet real challenges Practical 3
  • 18. © 2013 Belden Inc. | belden.com | @BeldenInc 23 Simplified Purdue Model / ISA Reference Architecture L0L1L2L3L4
  • 19. © 2013 Belden Inc. | belden.com | @BeldenInc 24
  • 20. © 2013 Belden Inc. | belden.com | @BeldenInc 25 Tripwire Enterprise and FireEye AX
  • 21. © 2013 Belden Inc. | belden.com | @BeldenInc 26 FireEye/Mandiant’s ICS Healthcheck Assessment Process: Activity 1: Architecture Workshops • Speak with plant Mgmt/Staff to gain an understanding of the ICS network • Draw a network diagram of the ICS • Overlay potential cyber security threats and attacks on the diagram Activity 2: Firewall configuration review • Obtain configurations of firewalls and switches at the site and go line by line • Perform automated and manual analysis on the configurations to look for security misconfigurations and flaws Activity 3: Analyze network traffic with FireEye PX • Collect full packet capture and flow data from ICS network (usually from site’s main switch) • Look for anomalous or undesirable connectivity to internet or business network Activity 4: Analyze log data with FireEye Threat Analytics Platform (TAP) • Collect any relevant log sources from the ICS environment (examples: VPN, Authentication, Firewall, Syslog, Windows Events) • Apply intelligence, rules, analytics, and frequency analysis to identify malicious or anomalous activity
  • 22. © 2013 Belden Inc. | belden.com | @BeldenInc 27 Joint Customer Benefit Examples • Integration of Industry specific Threat Intel with ISIGHT and contextualization of logs from Belden industrial technology in TAP • Tripwire customers can integrate with MVX/AX • Hunt for IOCs across IT and ICS environments Belden ICS industrial cyber security and networking equipment • Tofino • GarrettCom • Hirschmann • Tripwire +Several other leading brands in the area of industrial networking and signal transmission equipment. FireEye Threat Intelligence Portfolio • FireEye’s Threat Intelligence • Mandiant services • iSight’s ICS expertise 27
  • 23. © 2013 Belden Inc. | belden.com | @BeldenInc 28 Question & Answer Time

Editor's Notes

  1. Let me lay out a few things that are important to consider when you look at how you can protect your ICS environment: First – look for practical solutions.  If you can not clearly see the actionable information you will get out of a system that will give you meaningful results, its not likely you are going to get real value out of it.  Second – look for people, tools, and processes that understand the ICS environment, and the priorities of safety and reliability, above all else.  Look for solutions that are established and proven to be non-disruptive.  If you are on the IT side, before you start trying to educate your OT counter-parts about what it is they could or should be doing about security, start by spending time learning from them about what is important – and learn about how they have been able to operate systems with uptime and reliability levels that are frankly unheard of in the IT world. Third – we know this convergence between IT and OT is happening, so look for ways you can bring these two together.  If you are coming from the OT side, think about what is it the IT security team needs from you, and if you are on the IT side, keep in mind the OT priorities and how you can layer security on without compromising those goals.
  2. For the purposes of our talk today and given our industrial audience, we’ll focus on outsider attacks, malicious insiders and insider errors because these are the top categories of concern we see most within our customer base.
  3. The point of this timeline is that it illustrates a continuum and where we are now is the requirement to address the very real physical implications of a cyber threat no matter what the source
  4. Create and maintain an accurate inventory of their industrial control systems Obtain structured vulnerability and patch feeds that cover a wide variety of sources Match asset inventories against vulnerability disclosures and patch announcements Track vulnerable and unpatched products currently used in their industrial environments Prioritize vulnerability remediation efforts by considering: ICS architecture location, simplicity of exploitation and possible impact on the controlled industrial process
  5. During Q1 2016, iSIGHT Partners continued to observe cyber espionage activity targeting a variety of entities within various critical infrastructure sectors. When compared with previous quarters, Q1 shows no discernable trends, indicating instead that cyber espionage actors from around the world are interested in firms that operate critical infrastructure also throughout the world.
  6. The most interesting activity was the Sandworm Team operating in Ukraine. We observed that power outages were caused by direct interaction with utility HMI software. The attackers demonstrated advanced planning and moderate process attack capability. Lacking security controls, including poor network segmentation, facilitated the outages. We believe other electricity distribution providers throughout the world are similarly vulnerable.
  7. Of the hacktivist items identified in Q1, the Cyber Caliphate Army's attack on surveillance cameras had the highest potential consequence. One can envision a cyber attack to shut down video surveillance systems with a simultaneous physical attack on the facilities. The physical attacks at the Brussels airport and metro station on March 22, 2016 lend additional credibility to such a scenario. We suggest that security forces serving high traffic areas examine the cyber security of their video surveillance systems and create contingency plans should those systems be unavailable.
  8. Image at right is a Schneider Electric Atlivar variable frequency drive (VFD). Reid Wightman described using unauthenticated ICS protocols to discover, then overwrite “skip” frequencies, potentially causing dangerous vibrations at an industrial facility.
  9. Image at right is a 25 horse power boiler control system that the actor “intranet framework” offered for sale at 1,000 USD in an underground forum. We are uncertain what process the boiler is part of. It is the second time we have seen an actor selling VNC access to SCADA systems. Both HMI screens he shared as examples were in French.
  10. Image at right is of CPNI’s guidance to secure building automation systems. It is by far the most comprehensive guidance we have observed to date for dealing with these widely-deployed, yet often-overlooked cyber-physical systems.
  11. Explain This is a reference architecture produced by academics at Purdue University, and adopted by the International Society of Automation (ISA) The entire purpose of industrial automation and control systems is to remove humans from the loop. Program the logic into the machines so people don’t have to be at each location taking measurements and making adjustments. Sensors and actuators operate at Level 0. Sensors measure things in the physical world; such as flow, temperature, pressure, level. Actuators move. Things like valves and connect/disconnect switches for motors They are wired into the controller They are generally not TCP/IP enabled, but this is changing Controllers are programmable devices found at Level 1 The programming specifies how the actuators move when the sensors provide certain readings. They can also include Variable Frequency Drives and Protective Relays Many of these are TCP/IP enabled Level 2 includes more standard computing and networking technology The SCADA stands for supervisory control and data acquisition. Supervisory means that it allows a human operator, normally seated at a human-machine interface screen to identify abnormalities (normally by viewing alarms that pop up on the screen), and step in and issue remote commands to the system. If a process loses SCADA, nothing is going to happen, at least for a while. The logic exists in the controllers themselves to regulate the process. The job of process operators has been described as 90% intense boredom, and 10% sheer panic. The engineering workstation is used to program the control logic. You can think of this as a software development environment. Instead of languages such as python, C, and VisualBasic, the languages used are called “ladder logic”, “Fuction block” and “structured text”. This machine would normally have the ability to talk to any PLC on the network to push new logic This layer also includes database technology called a process historian. The historian catalogs readings from the sensors and positions of the actuators to make available in other applications, such as predictive maintenance and process optimization efforts. The historian records data that is not displayed to the operator. Ideally the SCADA network is segmented from the business network by a dual firewall DMZ. This facilitates firewall management, while limiting ingress and egress.
  12. Leveraging FireEye ISIGHT Threat Intelligence and FireEye AX Advanced Malware analysis integrated with Tripwire Enterprise and the FireEye Threat Prevention Platform we are able to uniquely able to address threats to both IT and OT networks by bringing together Intel, detection, and prevention.