MRO Webcast
Exploring the Unknown ICS Landscape
@RobertMLee
www.Dragos.com
@RobertMLee www.Dragos.com Robert M. Lee Current: CEO and - - PowerPoint PPT Presentation
MRO Webcast Exploring the Unknown ICS Landscape @RobertMLee www.Dragos.com Robert M. Lee Current: CEO and Founder, Dragos, Inc. SANS Institute Certified Instructor and Course Author (FOR578 & ICS515) Non-resident National
MRO Webcast
Exploring the Unknown ICS Landscape
www.Dragos.com
(FOR578 & ICS515)
7
7
Full Ukraine Report: http://ics.sans.org/duc5
Illinois Fusion Center report in 2011:
Fact: Russian IP in logs and pump failure 5 months later Reality: Contractor was on vacation and learned
10
11
Norse Iran Cyber Attacks
Fact: No ICS were harmed in the making of this “report”
12
2008 Turkey Pipeline Explosion
Bloomberg published “Mysterious ‘08 Turkey Pipeline Blast Opened New Cyberwar” in December, 2014
Fact: BTC Pipeline was attacked Reality: No “cyber” involved
13
2015 Turkey Blackout
10-hour Power Failure reported by Bloomberg, CNN, and major media
Iranian Cyber Attack
Fact: Aging infrastructure caused outage Reality: “Cyber” linked through previous reports
Insiders Stuxnet Shamoon (Non ICS Targeted) Dragonfly (HAVEX) Sandworm (BlackEnergy 2 and 3) Incidental Malware Infections
NCCIC / ICS-CERT Year in Review (FY 2015)
6% 1% 3% 6% 1% 37% 9% 37%
FY 2015 Incidents by Infection Vector (295 total)
Other Brute Force Abuse of Authorized Access Weak Authentication SQL Injection Spear Phishing Network Scanning Unknown Unknown 8% 0% 0% 1% 13% 78%
FY 2015 Observed Depth of Intrusion
Level 6 - Critical Systems Level 5 - Critical System Management Level 4 - Critical System DMZ Level 3 - Business Network Management Level 2 - Business Network Level 1 - Business DMZ Level 1 – Business DMZ
15,000 samples over ~3 months
Number of files Number of detections count 14949.000000 mean 6.338484 std 15.635142 min 0.000000 25% 0.000000 50% 0.000000 75% 0.000000 max 57.000000 Low hit rate High hit rate
count Trojan Virus-like (PE Infector) Virus-like (storage hopping) Approximate First Seen sivis 15863 ❔ ✅ ✅ 2012 lamer 6830 ❔ ✅ ✅ 2012 ramnit 3716 ✅ ✅ ✅ 2011 sinowal 2909 ✅ ❌ ❌ 2006 cosmu 2769 ✅ ✅ ✅ 2013 virut 1814 ✅ ✅ ✅ 2007 eldorado 1554 ❔ ❔ ❔ 2012 skeeyah 1486 ✅ ❔ ❔ 2015 androm 1471 ✅ ❌ ❌ 2013 sality 1225 ❔ ✅ ✅ 2003 zatoxp 1093 ❌ ✅ ✅ 2012 neshta 1085 ❌ ✅ ❌ 2008 nimnul 963 ✅ ✅ ✅ 2013 visisig 905 ❔ ✅ ✅ 2012 siggen 642 ❌ ✅ ✅ 2012 graftor 586 ❌ ✅ ✅ 2012 virtob 468 ✅ ✅ ✅ 2007
underreported by non-ICS security companies
embedded in vs_versioninfo
Execute Stage 1 Payload Get /vip.htm HTTP/1.1 Content-Type: text/html Accept: text/html, */* User-Agent: Mozilla/3.0 (compatible; Indy Library) Decrypt/read Stage 1 Download / execute /vip.htm /vip.htm /vip.htm /vip.htm /vip.htm Stage 2 Payload(s)
3/2014 11/2013 11/2016 (2x) 12/2013 3/2014 7/2014 10/2016 1/2014 2/2014
& Poor Operations Security
legitimate ICS software and files to public databases
Weird hypocrisy: you don’t trust your AV but you do trust 50 other AV companies?
One electric utility, starting in 2012 began routinely uploading their entire public website starting in 2012 to VirusTotal. 136 files indexed on VT
Things to do
malware handling guidance/processes
Things NOT to do
(IT security or AV) to make decisions about your data
viruses
@robertmlee RLee@Dragos.com Stay in Touch: Dragos.com @DragosInc