APT-Style Attacks on SCADA Systems
Stuxnet … Night Dragon
1
Jonathan Pollet, CAP, CISSP, PCIP Founder, Principal Consultant Red Tiger Security - USA
APT-Style Attacks on SCADA Systems Stuxnet Night Dragon Jonathan - - PowerPoint PPT Presentation
APT-Style Attacks on SCADA Systems Stuxnet Night Dragon Jonathan Pollet, CAP, CISSP, PCIP Founder, Principal Consultant Red Tiger Security - USA 1 speaker Jonathan Pollet, CISSP, CAP, PCIP Started as a Control Systems Engineer
1
Jonathan Pollet, CAP, CISSP, PCIP Founder, Principal Consultant Red Tiger Security - USA
2
Jonathan Pollet, CISSP, CAP, PCIP
Started as a Control Systems Engineer for Chevron 12 years in Electrical Engineering / SCADA Began conducting research into Control Systems Security in 2001 Performed over 150 field assessments of SCADA, DCS, and Control Systems since 2001 Participant, developer, or reviewer of Control System Security Standards SCADA Security Trainer / Instructor Co-Developed the 5-day SCADA Security Advanced course
Co-Developed the 2-day course entitled “Building, Attacking and Defending SCADA Systems in the Age of Stuxnet” offered through Red Tiger Security and BlackHat
Quick introduction to APT (Advanced Persistent Threat) style attacks Initial Attack vector leverages Social Engineering and Social Networking sites Malware still favorite initial attack vector The role of C&C in these modern attacks Night Dragon (staged over 18 to 24 months) Stuxnet
Q & A
3
4
5
Require in-depth knowledge of target Sophistication based on posted / known information Used to leverage people / groups
6
Word, Excel, etc…
mp3, exe, lnk, dll, mov, com, mp4, bat, cmd, reg, rar, emf, shs, js, vb, yourcompany.com.zip, cab, mda, zip, mdb, scr, aiff, mde, cpl, msi, vbs, aif, m4p, msp, fdf, mdt, sys, wmf, hlp, hta, pif, jse, qef, scf, chm, <#>.txt, wsf, fli, vbe
7
8
9
General Attacks
Malware Other Phishing Physical Loss Denial of Service Unauthorized Access Attempt Inappropriate Use
hIp://www.f‐secure.com/weblog/archives/00001676.html
Twitter IRC Facebook Google Groups
10
Remain hidden,
11
12
Exfiltration / Propagation Command & Control Initiation First Contact Discovery Hosts / Devices Spread 0Day / Vuln Orders Radio Silence Infect Data Collect Transmit
Certificate
USB
vector
replication (x3)
Windows 0day
most MS 2003
Rogue PLC logic
Device
13
SMB – MS08-067
CVE-2010-2729 MS10-061
BID 41732 +
~WTR4141.tmp ~WTR4132.tmp
14
Stuxnet targeted a difficult protocol / system… > Modbus would be a walk in the park
15
Real world solutions to combat the APT Threat
16
What you don’t know can STILL hurt you Assessments from External / Internal perspective
Training Regular Briefings Foster environment of Security / Communication
INTRA Departmental
Weekly reminders Trends
Continuous Security Monitoring
17
What do we see on the way
18
Quiet installation Obfuscated Exfiltration (HTTP, DNS, Masked)
Staggered Attack Combined with other styles Building relationships over time
Facebook is not your friend Twitter or Linkedin aren’t too fond of you either…
19
Speaker: Jonathan Pollet, CISSP, CAP, PCIP Red Tiger Security
Upcoming Training:
http://www.blackhat.com/html/bh-us-11/training/parker-scada.html
Check out our Industry Briefings and News Feeds:
http://www.redtigersecurity.com/security-briefings/
20