Bridging the air-gap Out of sight, (but not) out of mind Nemanja - - PowerPoint PPT Presentation

bridging the air gap
SMART_READER_LITE
LIVE PREVIEW

Bridging the air-gap Out of sight, (but not) out of mind Nemanja - - PowerPoint PPT Presentation

Bridging the air-gap Out of sight, (but not) out of mind Nemanja Nikodijevic <nemanja@micropsi-industries.com> Agenda Motivation Attack scenario Famous examples Academic research Future attack vectors Nemanja Nikodijevic


slide-1
SLIDE 1

Bridging the air-gap

Out of sight, (but not) out of mind

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

slide-2
SLIDE 2

Agenda

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

Motivation Attack scenario Famous examples Academic research Future attack vectors

slide-3
SLIDE 3

Agenda

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

Motivation Attack scenario Famous examples Academic research Future attack vectors

slide-4
SLIDE 4

Attack scenario

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Expansion and data collection Exfiltration and data extraction Damage!

slide-5
SLIDE 5

Agenda

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

Motivation Attack scenario Famous examples Academic research Future attack vectors

slide-6
SLIDE 6

Famous examples: Agent.BTZ

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection

rundll32.exe .\\[random_name].dll,InstallM

autorun.inf

slide-7
SLIDE 7

Famous examples: Agent.BTZ

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Expansion autorun.inf

slide-8
SLIDE 8

Famous examples: Agent.BTZ

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Expansion thumbs.dd Extraction

slide-9
SLIDE 9

Famous examples: Stuxnet

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Contractors Natanz Nuclear Facility CVE-2010-2729 CVE-2010-2568 CVE-2008-4250

slide-10
SLIDE 10

Famous examples: Stuxnet

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Expansion

S7-315 S7-417

CVE-2012-3015 CVE-2010-2772 Modified STL code

slide-11
SLIDE 11

Famous examples: Stuxnet

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Expansion Damage! Attack 1 – Centrifuge Overpressure Protection System Attack 2 – Centrifuge Drive System S7-417 S7-315 Record sensor values – 21s Replay recorded values in a loop Lock exhaust valves to create

  • verpressure

Lock rotor speed to a fixed value Decrease speed 500x and speed up again Increase rotor speed to 30% above normal

slide-12
SLIDE 12

Famous examples: COTTONMOUTH

Nemanja Nikodijevic <nemanja@micropsi-industries.com> COTTONMOUTH-I http://www.nsaplayset.org/turnipschool

slide-13
SLIDE 13

Famous examples: COTTONMOUTH

Nemanja Nikodijevic <nemanja@micropsi-industries.com> COTTONMOUTH-I COTTONMOUTH-II

slide-14
SLIDE 14

Famous examples: COTTONMOUTH

Nemanja Nikodijevic <nemanja@micropsi-industries.com> COTTONMOUTH-I COTTONMOUTH-II COTTONMOUTH-III

slide-15
SLIDE 15

Famous examples: Brutal Kangaroo

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Brutal Kangaroo Drifting Deadline (infection) Shattered Assurance (expansion) Broken Promise (postprocessor) Shadow (persistence) None (Manual) EZCheese (CVE-2015-0096) Lachesis (autorun.inf) RiverJack (library-ms)

slide-16
SLIDE 16

Famous examples: Brutal Kangaroo

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Expansion Brutal Kangaroo Drifting Deadline (infection) Shattered Assurance (expansion) Broken Promise (postprocessor) Shadow (persistence)

slide-17
SLIDE 17

Famous examples: Brutal Kangaroo

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Infection Expansion Extraction Brutal Kangaroo Drifting Deadline (infection) Shattered Assurance (expansion) Broken Promise (postprocessor) Shadow (persistence)

slide-18
SLIDE 18

Agenda

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

Motivation Attack scenario Famous examples Academic research Future attack vectors

slide-19
SLIDE 19

Research: Covert-channels

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Electromagnetic FOSDEM ‘16 JM Friedt http://bit.ly/2wTsXGs Van Eck Phreaking USBee, AirHopper, GSMem (Guri et al.)

slide-20
SLIDE 20

Research: Covert-channels

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Electromagnetic Acoustic RSA Acoustic Cryptanalysis (Genkin et al.) badBIOS

?

On Covert Acoustical Mesh Networks in Air (Hanspach and Goetz)

slide-21
SLIDE 21

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Electromagnetic Acoustic Thermal Revealing Hidden Services by their Clock Skew (Murdoch) BitWhisper (Guri et al.) HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System (Mirsky et al.)

Research: Covert-channels

slide-22
SLIDE 22

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Electromagnetic Acoustic Thermal Light Ambient Light Sensors (Hasan et al.) xLED (Guri et al.) Information Leakage from Optical Emanations (J. Loughry and D. A. Umphress)

Research: Covert-channels

slide-23
SLIDE 23

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Electromagnetic Acoustic Thermal Light Other Sensing-Enabled Channels for Hard-to-Detect Command and Control of Mobile Devices (Hasan et al.) Seismic Magnetic

Research: Covert-channels

slide-24
SLIDE 24

Agenda

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

Motivation Attack scenario Famous examples Academic research Future attack vectors

slide-25
SLIDE 25

Future?

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

slide-26
SLIDE 26

Example attack vectors

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Evil Cable EMCA

300 kbps ± 10%

slide-27
SLIDE 27

Example attack vectors

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Evil Cable C & C And Data Patched Firmware Bootloader Firmware Bank 2 Firmware Bank 1 Bootloader CC OS fingerprinting?

slide-28
SLIDE 28

Example attack vectors

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Evil Cable Evil Charger Air-gapped laptop Laptop connected to Internet Evil Charger C & C And Data Patched Firmware Bootloader

slide-29
SLIDE 29

Example attack vectors

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Evil Cable Evil Charger http://www.chongdiantou.com

slide-30
SLIDE 30

Example attack vectors

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Evil Cable Evil Charger Evil Dongle BadUSB scenario on an HDMI dongle

D+ D-

CC SBU1 SBU2 VCONN WorseUSB

slide-31
SLIDE 31

Countermeasures?

Nemanja Nikodijevic <nemanja@micropsi-industries.com> Superglue in a USB port? USB Type-C Authentication Specification Disabling firmware upgrade? Firmware signing?

slide-32
SLIDE 32

Bridging the air-gap: Takeaways

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

USB is the most frequent air-gap attack vector USB-C introduces new methods for bridging the air-gap Proposed countermeasures are not yet widely implemented

slide-33
SLIDE 33

Nemanja Nikodijevic <nemanja@micropsi-industries.com>

Questions? Thanks for your attention!