CREDC Industry Workshop Analyzing the Ukraine Cyber Attack
March 28 2017
CREDC Industry Workshop Analyzing the Ukraine Cyber Attack March 28 - - PowerPoint PPT Presentation
CREDC Industry Workshop Analyzing the Ukraine Cyber Attack March 28 2017 Ben Miller Current: Director Threat Operations Center @ Dragos, Inc. Previous: 6 years at NERC, Electricity ISAC 7 years at Constellation Energy Group
CREDC Industry Workshop Analyzing the Ukraine Cyber Attack
March 28 2017
Some Frameworks and prior examples
Develop Test Deliver Install / Modify Execute ICS Attack Stage 2 – ICS Attack
Enabling Initiating Supporting Trigger Deliver Modify Inject Hide Amplify
Reconnaissance Targeting Weaponization Delivery Exploit Install / Modify C2 Act Stage 1 - Intrusion
Discovery
Capture Movement Collect Install & Execute Exfiltrate Launch Clean & Defend
Assante, Lee. Industrial Control Systems Cyber Kill Chain. Whitepaper, SANS, 2015.
State prohibited State prohibited but inadequate State ignored State encouraged State shaped State coordinated State ordered State rogue conducted State executed State integrated
Jason Healey. A Fierce Domain. CCSA, 2013.
Estonia, 2007
government, financial
Georgia, 2008
SQLi, XSS attacks across gov, news agencies and financial institutions
Jason Healey. A Fierce Domain. CCSA. 2013.
An Overview
Fireeye Blog. Strategic Analysis: As Russia-Ukraine Conflict Continues, Malware Activity Rises. May 28 2014.
FireEye Blog post uncovering OPC Havex July 17 2014 (F-Secure Blog Post) June 23 2014 UA June 26 2014 UA July 2 2014 KR & UA July 8 2014 UA July 15 2014 KR July 1 2014 (from US) April 17 2014
FI (from ZZ) June 29 2014 RU Dec 4 2014 ES July 2-3 2014 TrendMicro Blog post uncovering OPC Havex July 14 2014 IL Jan 06 2016
“[..] attackers behind the outages in two power facilities in Ukraine in December likely attempted similar attacks against a mining company and a large railway operator in Ukraine.”
KillDisk (f3e41eb94c4d72a98cd743bbb02d248f510ad925) Datetime (UTC+2) File name Source Country 2015-12-24 00:34:19 tsk.exe 73805832 (web) UA 2015-12-24 08:28:39 tsk.exe 883db971 (web) UA 2015-12-24 11:00:52 E:\Дмитрий\sample\tsk.exe 725be15c (api) UA Hash – SHA1 upload date (GMT) country of origin f3e41eb94c4d72a98cd743bbb02d248f510ad925 12/23/15 UA 8AD6F88C5813C2B4CD7ABAB1D6C056D95D6AC569 11/10/15 UA *u 16f44fac7e8bc94eccd7ad9692e6665ef540eec4 10/25/15 UA & FR * n 2d805bca41aa0eb1fc7ec3bd944efd7dba686ae1 11/6/15 UA *u 0B4BE96ADA3B54453BD37130087618EA90168D72 11/10/15 UA *u
KillDisk and BlackEnergy Are Not Just Energy Sector Threats. Trend Micro. February 11, 2016.
Three Oblenergos (distribution utility) impacted
Analysis of the Cyber Attack on the Ukrainian Power Grid. Whitepaper, SANS & E-ISAC. 2016.
Reconnaissance Targeting Weaponization Delivery Exploit Install / Modify C2 Act Stage 1 - Intrusion
Stage 1 mimics a targeted and structured attack campaign
Discovery
Capture Movement Collect Install & Execute Exfiltrate Launch Clean & Defend
Develop Test Deliver Install / Modify Execute ICS Attack Stage 2 – ICS Attack
Stage 2 shows the steps associated with a material attack that requires high confidence
Enabling Initiating Supporting Trigger Deliver Modify Inject Hide Amplify
Full Ukraine Report: http://ics.sans.org/duc5
1 Transmission Substation impacted
Ukrenergo Youtube video: https://www.youtube.com/watch?v=AUoiKZBqIo0&app=desktop
State prohibited State prohibited but inadequate State ignored State encouraged State shaped State coordinated State ordered State rogue conducted State executed State integrated
Jason Healey. A Fierce Domain. CCSA. 2013.
Planning, establishing, and upkeep of systems with security in mind Systems added to the architecture to provide defense or insight against threats without human interaction The process of analysts monitoring for, responding to, and learning from adversaries internal to the network Collecting data, exploiting it into information, and producing Intelligence Legal countermeasures and self defense actions against an adverseary
“An organized cyber disruption disables or impairs the integrity of multiple control systems, or intruders take operating control of portions of the bulk power system such that generation or transmission system are damaged or
state/province).
half their neighbors, their Reliability Coordinator, and Balancing Authority.
system collapse within state/province and neighboring state(s)/province(s). Portions
Increasingly Sophisticated Cyber Threats
and Respond to a Cyber Attack
Books
Whitepapers Industrial Control Systems Cyber Kill Chain. sans.org. Assante, Lee. 2015 NERC High Impact Low Frequency Report. nerc.com. 2009 NERC Cyber Attack Task Force Report. nerc.com. 2012 NERC Alert – Manipulation of ICS (non-public). E-ISAC. 2016
Assante, Lee. Industrial Control Systems Cyber Kill Chain. Whitepaper, SANS, 2015.
Stay in Touch: @electricfork BMiller@Dragos.com