Seminar Series Industrial Cyber Threats and Future Planning Robert - - PowerPoint PPT Presentation

seminar series industrial cyber threats and
SMART_READER_LITE
LIVE PREVIEW

Seminar Series Industrial Cyber Threats and Future Planning Robert - - PowerPoint PPT Presentation

Seminar Series Industrial Cyber Threats and Future Planning Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web: www.dragos.com Agenda Where We Are Selected Case Studies in Cyber Attacks Where Were Heading


slide-1
SLIDE 1

Seminar Series

slide-2
SLIDE 2

Industrial Cyber Threats and Future Planning

Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web: www.dragos.com

slide-3
SLIDE 3

Agenda

  • Where We Are
  • Selected Case Studies in Cyber Attacks
  • Where We’re Heading
  • Recommendations
slide-4
SLIDE 4

The Unknown Threat Landscape

4

Few People Know How to Protect the ICS that Run Our World The Threat Landscape is Mostly Unknown

slide-5
SLIDE 5

Finding More and More Occurring

1998 - 2009

Lack of Collection

  • Campaigns: APT1
  • ICS Malware: None

2010 - 2012

New Interest in ICS

  • Campaigns: Sandworm
  • ICS Malware: Stuxnet

2013 - 2015

Campaigns Target ICS

  • Campaigns: Dragonfly
  • ICS Malware: BlackEnergy 2 and Havex
  • First attack to cause physical destruction on

civilian infrastructure (German Steel)

2015-2017

Adversaries Disrupt ICS

  • Campaigns: 10 Unique
  • ICS Malware: CRASHOVERRIDE

and TRISIS

  • First and second ever electric

grid attacks that disrupt power

  • First malware to target human

life

slide-6
SLIDE 6

The Diamond Model

Victim

Capability/TTPs Infrastructure Adversary

Ref: http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf

slide-7
SLIDE 7

ELECTRUM

  • Ukrainian Utility Companies
  • Electric
  • Water

Russian State Interests

  • Long term access to ICS
  • CRASHOVERRIDE
  • ICS Specific Modules
  • Operations Knowledge
  • Dual-use infrastructure

such as TOR to host C2

  • Internal proxies setup

Links: Development team for Sandworm

slide-8
SLIDE 8

DYMALLOY

  • North American electric operators
  • Turkish energy providers
  • Western Europe electric operators

Multi-State Adversary Interests

  • Malicious docs w/ credential

harvesting via external SMB connections

  • RATs from publicly available toolkits
  • Custom-developed information

theft toolkits built on public tools

  • One non-public toolkit
  • Compromise ISP IPs
  • Compromised business

connections for initial infection and subsequent implants Links: Dragonfly 2.0 Not Dragonfly 1.0

slide-9
SLIDE 9

CHRYSENE

  • Arabian gulf region
  • Saudi Arabia petrochemical focus
  • Oil/gas, petro, and electric generation

Iranian State Interests

  • 64-bit malware using DNS for C2
  • Greenbug malware with HTTP C2
  • OilRig as evolution of Greenbug
  • Unique DNS C2 system
  • Initial beacon AAAA request
  • IPv6 encoded commands
  • Actor owned infrastructure
  • Domain patterns after

legitimate resources

  • Custom DNS server as

authoritative for the domain to enable C2 Links: “OilgRig” Actor

slide-10
SLIDE 10

MAGNALIUM

  • Saudi Arabian petrochemical
  • Aerospace companies
  • North America and South Korean

targets only with Saudi business

Iranian State Interests

  • Commodity and non-public

malware combination

  • Publicly available crimeware
  • Specific malware encoding routine
  • Spoofed domains of

relevance to victim

  • Dynamic DNS for C2
  • IT services and aerospace

themed Links: APT 33

slide-11
SLIDE 11

COVELLITE

  • Electric utility companies in the

United States

North Korean State Interests

  • Sophisticated implant with secure

communication channels

  • Similar features to malware used

against South Korean targets

  • Specific session key used for

payload and second encrypted layer

  • 41 minute and 30 second sleep
  • Legitimate infrastructure
  • University IPs for C2

Links: Unknown

slide-12
SLIDE 12

German Steel Plant - 2014

  • Dec 18, 2014 German

Government’s BSI released annual report highlighting incidents

  • Identified “massive damage”

in a steel facility due to a cyber attack

  • 2nd publicly known case of

physical damage to control systems from cyber attacks

slide-13
SLIDE 13

Ukraine 2015

  • 1st Ever cyber attack
  • n a power grid to

lead to outages

  • 3 power companies

across Ukraine

  • SCADA Hijack

scenario by a well funded team

slide-14
SLIDE 14

Ukraine 2016 - CRASHOVERRIDE

slide-15
SLIDE 15

Middle East 2017 - TRISIS

  • TRISIS was delivered into a

petrochemical facility in the Middle East by a well funded attack team

  • Targeted Safety Instrumented

System (SIS) and failed causing a stop in operations

  • 1st malware to specifically

target human life

slide-16
SLIDE 16

You Cannot Just Patch Away the Problem

Dragos’ 2017 in Review reports revealed that for ICS vulnerabilities:

  • 64% of all vulns didn’t eliminate the risk
  • 72% provided no alternate mitigation to the patch
  • Only 15% could be leveraged to gain initial access

Ref: www.dragos.com/YearInReview/2017

slide-17
SLIDE 17

Where We’re Heading

slide-18
SLIDE 18

ICS Incidental Impact vs. ICS-Tailored

ICS Incidental Impact

  • Resource Usage
  • Destructive
  • Wormable

ICS-Tailored

  • Protocol Knowledge
  • System Knowledge
  • Process Knowledge
slide-19
SLIDE 19

Multi-Phase Attacks

Ref: https://www.sans.org/reading-room/whitepapers/ICS/industrial- control-system-cyber-kill-chain-36297

slide-20
SLIDE 20

Research Ideas

slide-21
SLIDE 21

Your Goal – Satisfy the Right Requirements

21

Company Risk MTTR ADT RCA

slide-22
SLIDE 22

Problems

Problem: Rush for Sensors Problem: Over-Focus on Malware, Vulns, and Exploits Problem: Over-Focus on ML/AI Models Problem: Need to Scale Knowledge/Workforce Problem: Big Architecture Changes

slide-23
SLIDE 23

Ideas

Idea: Common, Robust, Dynamic Sensor Idea: Limiting of Impact Outside Scope Idea: Intelligence-Driven Approach Idea: Enabling/Scaling Human Knowledge Idea: Common Logging/API in OEM Gear

slide-24
SLIDE 24

Questions?

Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web: www.dragos.com