Phil Neray, VP of Industrial Cybersecurity
New Threat Vectors for ICS/SCADA Networks — and How to Prepare for Them
June 27, 2017
New Threat Vectors for ICS/SCADA Networks and How to Prepare for - - PowerPoint PPT Presentation
New Threat Vectors for ICS/SCADA Networks and How to Prepare for Them June 27, 2017 Phil Neray, VP of Industrial Cybersecurity Why Now? Featuring CyberXs threat intelligence & vulnerability research 3 Key Trends Driving ICS
Phil Neray, VP of Industrial Cybersecurity
June 27, 2017
Featuring CyberX’s threat intelligence & vulnerability research
RANGE OF CYBERATTACKERS WITH VARYING MOTIVATIONS
INDUSTRIAL NETWORKS ARE EASY TARGETS
targeted threats
OPERATIONAL TECH (OT) & IT ARE CONVERGING
“These kinds of campaigns are running, even as we speak,” said Omer Schneider, co-founder of CyberX (Dec. 2016) How a Michigan Utility Got Hacked
“Cybersecurity firm CyberX said it has uncovered a cyber-espionage operation in Ukraine that has compromised more than 70 victims including an energy ministry, a scientific research institute and a firm that designs remote monitoring systems for
May 2015: CyberX analysis of BlackEnergy reveals data exfiltration behind sophisticated multi-year attack campaign
ransomware to industrial sector with new version of KillDisk
Flaw in Schneider Industrial Firewalls Allows Remote Code Execution To demonstrate that attackers could easily bypass defenses if proper ICS protection technologies are not in place, researchers at industrial security firm CyberX have disclosed the existence of several critical 0-day vulnerabilities.
– Preceded Mirai
sophisticated malware campaign that has compromised numerous ICS environments using a variant of the BlackEnergy malware. Analysis indicates that this campaign has been ongoing since at least 2011.”
practically every sector of Ukraine: media, finance, transportation, military, politics, energy.”
street fighters. In 2016, they were ninjas” (Marina Krotofil)
away with. You push and see if you’re pushed
War Studies professor at King’s College)
Andy Greenberg
“Using OPC, the malware component gathers any details about connected devices and sends them back to the C&C for the attackers to analyze. It appears that this component is used as a tool for intelligence
not seen any payloads that attempt to control the connected hardware.”
Image: Tomohiro Ohsumi/Getty Images
General Keith Alexander, former commander of US Cyber Command
Image: Politico
George Kurtz, CrowdStrike CEO “The Great Brain Robbery”
Images: FPM, NYT
Verizon DBIR 2016, P. 25
Verizon DBIR 2017, P. 27
Photo: Manufacturing America
Image: Kaspersky
Standard IP-based protocols (e.g., TCP/IP, HTTP) Standard & proprietary industrial protocols (e.g., GE SRTP, Siemens S7) Non-deterministic behavioral analytics (humans) Deterministic behavioral analytics (machine-to-machine) Active vulnerability scanning OK Active scanning creates downtime Regular patching & OS upgrades are encouraged Patching creates downtime & OS upgrades force SCADA application re-writes
– Continuous threat monitoring – Non-invasive risk assessment & asset discovery – ICS-specific threat intelligence – Rapid integration with existing environments (SIEMs, etc.) – Open system with rich API for customized integrations
– Electrical utilities, oil & gas, manufacturing, pharmaceuticals, chemicals, nuclear, …
– Deep understanding of industrial protocols – Unique machine learning algorithms – Based on deterministic behavior of OT networks – Patent-pending approach
– Models unique DNA of M2M communications – Rapidly detects anomalous behavior with minimal false positives – Detects both cyber and operational anomalies – Zero configuration required (no rules or signatures)
Image: Film4, DNA Films
SPAN port
Network traffic data
CMDB asset data, firewall rules, etc.
(optional)
Advanced M2M behavioral analytics with data mining
Only Industrial Cyber Vendor Chosen for Innovation Award Sponsored by US DHS & DoD Only Industrial Cyber Vendor Recognized by International Society of Automation
“CyberX's specialization in providing in-depth visibility and threat intelligence across different specialized industrial protocols has resulted in powerful capabilities.”
– Identify asset inventory & network topology – Identify risks such as unpatched devices, unauthorized remote connections, bridges between subnets, etc.) with recommended, risk-prioritized mitigations
– Identifies vulnerable or weak firewall rules – Integrates with firewalls/IPS to automatically block new threats – Partnership with Waterfall Security for unidirectional security gateways
– Continuous, real-time monitoring for threats & industrial malware – Advanced M2M behavioral analytics for rapid anomaly detection – Proprietary ICS-specific threat intelligence to enrich analytics
– Deep ICS network forensics & investigation tools identify breach impact – Integration with SIEMs via REST APIs supports automated SOC workflows
– Automated reporting supports communication with stakeholders, including verifying that risks have been mitigated & malware has been removed
Image: Reuters
– Free download of first 2 chapters from ICS Hacking Exposed (McGraw-Hill)
– Innovation City, Booth # IC58 (near Arsenal tools) – Book giveaway and book signing with lead author Clint Bodungen on Wednesday, July 26 @ 3pm
Thank You! phil@cyberx-labs.com