25
Threats to Industrial Control Networks Defensive Network Security Consultants (DNSC), LLC 17 October 2012

Avila 3 b

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Avila 3 b

Threats to Industrial Control Networks

Defensive Network Security Consultants (DNSC), LLC

17 October 2012

Page 2: Avila 3 b

Angel E. AvilaCISSP, CISA, CEPT, C|EH, CompTIA Sec+E-mail: [email protected]://www.dnsc-cyber.comPH: 915-247-8978

Contact Information

2

Page 3: Avila 3 b

DNSC Background

• Computer Security Professionals (8 years)– Specializing in Penetration Testing, Vulnerability

Assessments, Compliance and Auditing

• Experience working on Government (DoD) and Private Industry systems

• Certifications: – Certified Information Systems Security Professional (CISSP), – Certified Information Systems Auditor (CISA), – Certified Ethical Hacker (C|EH), – Certified Ethical Penetration Tester (CEPT),– Certified Information Systems Manager (CISM), – Certified Penetration Tester (CPT), – CompTIA Security +

3

Page 4: Avila 3 b

Objective

• The intent of this brief is to raise awareness among the energy community of some of the current threats that are targeting Industrial Control (IC) networks including the Smart Grid and the importance of developing secure critical infrastructure.

4

Page 5: Avila 3 b

Why should we care?

• “An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches,” Mr. Panetta said. “They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.” [1]

• Successful attacks against critical infrastructure assets can potentially lead to loss of life, and life as we know it.

1. Bumiller, Elisabeth; Shanker, Thomas. “Panetta Warns of Dire Threat of Cyberattack on U.S." New York Times on the Web 11 Oct. 2012. 15 Oct. 2012 <http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?_r=0s>5

Page 6: Avila 3 b

IC Network Overview

Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.6

Page 7: Avila 3 b

Common Mistakes

• Overconfidence: Systems 100% secure• Refusal to recognize threats: It can’t happen to

me• Air Gap myth: Systems not connected to IT

network/Internet• Executive override

– “Intentional” security holes for legitimate business purposes. ‘Set it and forget it

• Default accounts & passwords• Lack of authentication• Inbound/outbound traffic• Compliance != Secure

7

Page 8: Avila 3 b

Adversary• Cyber Threat Expertise

– Novice: An adversary with no training, only using open-source (freely available) tools

– Intermediate: An adversary with some training, some level of funding, uses tools either purchased or traded on-line

– Expert: An adversary with a mature skill set and uses custom, open source, and purchased tools

• Foreign sponsored• Hacktivist

8

Page 9: Avila 3 b

Threats to IC Networks• Advance Persistent Threat (APT)

– Adversary with sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception)

• Maintain a foothold in order to conduct directed malicious objectives against the target

• EX: Stuxnet-Worm targeting Iranian nuclear reactor machinery

– Driven by either government agencies or terrorist organizations

• APT’s pursues its objectives repeatedly over an extended period of time while countering victim’s mitigating attempts

As defined in NIST Special Publication 800-39, Managing Information Security Risk 9

Page 10: Avila 3 b

Threats to IC Networks (cont.)• Cyber Threats

– Identified as malicious efforts directed in gaining access to, exfiltration, data manipulation, and denial of service towards information systems (IS)

– Directed attacks against confidentiality, integrity, and availability (CIA)

– Cyber threats can come from anyone

• Supply Chain Threat– Referred to embedded code being inserted into

devices– Do you know who is developing your devices?

10

Page 11: Avila 3 b

Threats to IC Networks (cont.)• Outsider Threat

– No credentials, no physical access to the target network

– Ex: Hacktavists, Foreign State, Terrorists Organizations, Script Kiddies

• Nearsider Threat– No credentials, but has access to the target

network– Ex: Cleaning crew, delivery personnel

• Insider Threat– Having user and/or root-level credentials to the

target network– Ex: Disgruntle Employee (users/administrators)

11

Page 12: Avila 3 b

IC Network Overview

Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.

Outsider/Cyber Threats

Advanced Persistent

Threat

Insider/Nearsider Threats

Insider/Nearsider Threats

12

Page 13: Avila 3 b

Attack Vectors

• Web– SQL Injection– Broken authentication and session management

• https://www.owasp.org/index.php/Top_10_2010-Main• Wireless

– Use of weak wireless algorithms WEP and WPA• Bad Security Practices

– HBGary and Anonymous incident• http://arstechnica.com/tech-policy/2011/02/anonymo

us-speaks-the-inside-story-of-the-hbgary-hack/• Social Networking

– Facebook

13

Page 14: Avila 3 b

Attack Vectors (cont.)

• SCADA Protocols– Lack of authentication– Lack of encryption

• SCADA Systems– Sinapsi eSolar Light Photovotaic System Monitor– Bypass authentication using hard-coded

credentials and vulnerable to SQL injection• Also affects other Solar panel control systems• ICS-ALERT-12-284-01

• Control systems– A search engine, Shodan, that used to identify

internet facing Control systems• ICS-ALERT-11-343-0114

Page 15: Avila 3 b

Attack Vectors (cont.)

• How can I traverse through the Smart Grid?– Advanced Meter Infrastructure (AMI) Smart

Meters shutdown meters through Optical port• D. Weber, “Looking into the Eye of the Meter”. BlackHat

2012.

– Over 40+ million ZigBee electric meters are deployed with concentration in Texas, California, Texas, Michigan, and Virginia.

• Zigbee Alliance: Heile, Bob, https://docs.zigbee.org/zigbee-docs/dcn/10-6056.pdf

15

Page 16: Avila 3 b

Attack Vectors (cont.)

Smart Grid using ZigBee Home Area Network (HAN)

• AMI provides the ability to remotely control devices in the HAN- Turn off lights, Raise Tstat, etc...

• Detailed energy use collected over regular time intervals.- Consumers can view energy usage real time

• ZigBee is being used in HANs within the Smart Grid• Sniffing traffic

• Replay attacks• Denial-of-Service

16

Page 17: Avila 3 b

Conclusion

• Real-world threats are constantly trying to exploit various IC installations

• Reliability vs. Security

• Awareness and being proactive helps reduce the risk of your network being exploited

17

Page 18: Avila 3 b

Questions

• ??

18

Page 19: Avila 3 b

Contact Information• Angel E. Avila CISSP, CISA, C|EH, CEPT, CompTIA Security +

[email protected]

• Richard G. Coy CISSP, CISA, C|EH, CPT, [email protected]

• Francisco J. Leyva CISSP, CISA, C|EH, CISM, [email protected]

• Humberto Mendoza CISSP, CISA, C|EH, CISM, CEPT [email protected]

• Daniel Chacon CISSP, CISSA, C|EH, CISM, [email protected]

http://www.dnsc-cyber.com19

Page 20: Avila 3 b

Backup

20

Page 21: Avila 3 b

Attack Vectors (cont.)• ZigBee Overview

– Low Power (Long Battery Life), low data rate wireless protocol

– 250 Kbps throughput rate (low data rate)– Short Range (10 – 100 meters)– Supports star and mesh network topology– Easily add and remove nodes to the network

• Why Zigbee ?– WIFI transceivers are too expensive, more power to

operate– Bluetooth as a Frequency Hopping Spread Spectrum

requires more power to operate– Zigbee consumes less power than WIFI and Bluetooth– Zigbee designed specifically for monitoring and

automation – Zigbee is good solution for smart meters in Advanced

Meter Infrastructure(AMI)

Page 22: Avila 3 b

Attack Vectors (cont.)• ZigBee Exploitation using KillerBee[1]

- zbid–list available ZigBee devices connected to PC- zbdump–"tcpdump-w" clone for capturing ZigBee traffic- zbconvert–convert capture file formats- zbreplay–Replay attack- zdsniff–over-the-air (OTA) crypto key sniffer- zbfind–GUI for locating ZigBee networks- zbgoodfind–search memory dump for crypto key- zbassocflood–association flood attack (DoS)- spoofing attacks when used with Software Defined Radio

1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf

Page 23: Avila 3 b

Attack Vectors (cont.)• ZigBee Security

– KillerBee[1] open source software is a tool suite used to test and exploit ZigBee networks

– Hacker community has made many software modifications to the KillerBee[1] tool suite

– KillerBee[1] tool suite is flashed on a RZUSB ($40.00) through Joint Test Action Group (JTAG) interface.

• AVR JTAG ICE mkII ($300.00) used to flash RZUSB

1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf

RZUSBAVR JTAG ICE Programmer

Page 24: Avila 3 b

Attack Vectors (cont.)

Smart Grid using ZigBee Home Area Network (HAN)

• Problem: Demand for power exceeds the supply

• AMI provides the ability to remotely control devices in the HAN- Turn off lights, Raise Tstat, etc...

• Detailed energy use collected over regular time intervals- Consumers can view energy usage real time

• Consumers can adjust power to reduce cost

• Utility companies can better manage supply and demand

Page 25: Avila 3 b

Attack Vectors (cont.)• ZigBee

– Exploitation using KillerBee[1] - zbid–list available ZigBee devices connected to PC- zbdump–"tcpdump-w" clone for capturing ZigBee traffic- zbconvert–convert capture file formats- zbreplay–Replay attack- zdsniff–over-the-air (OTA) crypto key sniffer- zbfind–GUI for locating ZigBee networks- zbgoodfind–search memory dump for crypto key- zbassocflood–association flood attack (DoS)- spoofing attacks when used with Software Defined Radio

1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf