47
Marina Krotofil Round Table on Cybersecurity Best Practices for Users of Radioactive Sources, Vienna, Austria, 10.09.2019 Understanding Cyber Threats and Associated Risks for Radioactive Sources

Understanding Cyber Threats and Associated Risks for

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Understanding Cyber Threats and Associated Risks for

Marina Krotofil

Round Table on Cybersecurity Best Practices for Users of Radioactive Sources,Vienna, Austria, 10.09.2019

Understanding Cyber Threats

and Associated Risks for

Radioactive Sources

Page 2: Understanding Cyber Threats and Associated Risks for

About myself

• Senior Security Engineer at the large chemical company – defender role

• Specializing in offensive cyber-physical security in Critical Infrastructures

o Focus: Physical damage or how to make something going bad, crash or blow up by means of cyber-attacks

Page 3: Understanding Cyber Threats and Associated Risks for

My only experience with nuclear field

0 1000 2000 3000 4000 5000 6000 70008.9

9

9.1

9.2

9.3

9.4

9.5

0 1000 2000 3000 4000 5000 6000 70008.9

9

9.1

9.2

9.3

9.4

9.5

0 20 40 60 728.8

9

9.2

9.4

9.6

9.8A and C feed

Hours

kscm

h

0 20 40 60 72

8.8

9

9.2

9.4

9.6

9.8A and C feed

Hours

kscm

h

M. Krotofil, J. Larsen, D. Gollmann. The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems (ASIACCS, 2015)

spoofed

Page 4: Understanding Cyber Threats and Associated Risks for

In this presentation

• Evolvement: Threat actors and their motivation

• Current trends: Cyber threat landscape

• Product security: Worrisome State-of-the-Art

Page 5: Understanding Cyber Threats and Associated Risks for

Threat actors evolvement

Page 6: Understanding Cyber Threats and Associated Risks for

Modernization of the nuclear industry

https://www.nti.org/analysis/tools/table/133/

https://www.popularmechanics.com/technology/infrastructure/a28912471/digital-nuclear-reactor/

Page 7: Understanding Cyber Threats and Associated Risks for

(Cyber)Terrorists

• Aim at dramatic effect (Godzilla effect)

• Previously did not showcase strong

technical or cyber capabilities

• Currently: actively recruiting members

with engineering and cyber

background/skills

htt

p:/

/se

cu

rity

affa

irs.c

o/w

ord

pre

ss/w

p-c

on

ten

t/u

plo

ad

s/2

01

6/0

6/isis

-

ha

cke

rs-c

alip

ha

te-c

yb

er-

arm

y-c

ca

.jp

g

Page 8: Understanding Cyber Threats and Associated Risks for

(Cyber) Criminals

• (May) use cyber attacks to support criminal activities

− E.g., stealing/smuggling nuclear materials

• Discovered ways to monetize attacks in infrastructures

with critical uptime/availability requirements

− Extortion attacks (ransomware)

• Participating in the market as a resource for hiring

− Hackers for hiring

− Hacking tools for sale

www.europol.europa.eu/sites/default/files/documents/cyberbits_04_ocean13.pdf

Page 9: Understanding Cyber Threats and Associated Risks for

State-sponsored threat actors

• The build-up of capabilities keep accelerating

− Leaked NSA catalogue of cyber tools

• Strategic operations to support long-term

objectives

− E.g. espionage, persistence

• Hacking to support national economy

− E.g., discredit competitor products or

subvert production lines

https://www.aclu.org/files/natsec/nsa/20140130/NSA%27s%20Spy%20Catalogue.pdf

Page 10: Understanding Cyber Threats and Associated Risks for

Recent high-profile attacks

Hackers Targeted 600 MAC Addresses, 2019

Over 500.000 affected devices

(over 10 brands & 70 models),

2018Hackers targeted specific records of 20

individuals, 2019

Page 11: Understanding Cyber Threats and Associated Risks for

Lagging behind threat actors are catching-up

https://threatpost.com/chinas-apt3-pilfers-cyberweapons-nsa/148086/

Page 12: Understanding Cyber Threats and Associated Risks for

Threat actors with special previliges

https://www.cyberscoop.com/kevin-mandia-fireeye-u-s-malware-nice/

Page 13: Understanding Cyber Threats and Associated Risks for

“Defense-in-Depth” in perimeter security

Page 14: Understanding Cyber Threats and Associated Risks for

• Sensitive and confidential documentation is readily available

− Unprotected repositories

− Public sources, e.g. Virus Total, Scribd, etc.

− Purposely leaked data and documentation

https://www.reuters.com/article/us-nuclear-southkorea-northkorea-idUSKBN0MD0GR20150317

Accessibility of proprietary information

Page 15: Understanding Cyber Threats and Associated Risks for

Sensitive documentation on Internet

Page 16: Understanding Cyber Threats and Associated Risks for

• One no longer need rich and legal buyer to obtain equipment

− Can be purchased on e-commerse platforms

− Firmware available on GitHub

− Even source code can be obtained

Easily obtainable hardware & software

Page 17: Understanding Cyber Threats and Associated Risks for

Hardware and software for purchase

Source code

Page 18: Understanding Cyber Threats and Associated Risks for

Current trends in cyber threats landscape

Page 19: Understanding Cyber Threats and Associated Risks for

Targeted ransomware

https://www.zdnet.com/article/norsk-hydro-ransomware-incident-losses-reach-40-million-after-one-week/

Page 20: Understanding Cyber Threats and Associated Risks for

Cryptomining farms in isolated facilities

https://www.coindesk.com/russian-scientists-arrested-crypto-mining-nuclear-lab

https://www.wired.com/story/nuclear-plant-

cryptomining-bec-scam-xbox-security-roundup/

Page 21: Understanding Cyber Threats and Associated Risks for

Matured zero day & offesive tools market

https://i.blackhat.com/USA-19/Wednesday/us-19-Shwartz-Selling-0-Days-To-Governments-And-Offensive-Security-Companies.pdf

Page 22: Understanding Cyber Threats and Associated Risks for

Main trend in offensive security

Page 23: Understanding Cyber Threats and Associated Risks for

Race-to-the-Bottom in e-commerce

http://isyou.info/jowua/papers/jowua-v3n12-1.pdf

Business

processes

secure by design

Currently threat models

assumes that the e-commerce

application is “taken” by

attacker

Page 24: Understanding Cyber Threats and Associated Risks for

BIOS rootkits

https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/

Page 25: Understanding Cyber Threats and Associated Risks for

Brief history of cyber-physical attacks25

20172015 2016

Ukraine

power grid

attack

(Industroyer)

Ukraine power

grid attack

(BlackEnergy)

TRITON

It’s happening: Publicly

known cyber-physical attacks

Planned

operation to

hinder Iran’s

nuclear program

(Stuxnet)

First publicly

known OT

recon activities

(HAVEX)

Reconnaissance and weaponization of

capabilities

1999 2010 2013

First active recon

& initial intrusion

attempts

Successful cyber-

physical experiments

htt

ps:/

/qp

h.f

s.q

uo

racd

n.n

et/

main

-qim

g-f

741

c6

e5

db3

2b

87

f282

e5

44

48

a21

29

ce

Page 26: Understanding Cyber Threats and Associated Risks for

Purdue network reference architecture

Physical process

OT network

IT network

Level 1

Level 0

Level 2

Level 3

Level 4

Page 27: Understanding Cyber Threats and Associated Risks for

Race-to-the-Bottom when placing exploits

Physical process

OT network

IT network

Level 1

Level 0

Level 2

Level 3

Level 4

TRITON

(2017)

Industroyer

(2016)

BlackEnergy

(2015)

Page 28: Understanding Cyber Threats and Associated Risks for

TRITON implant

Triton

Firmware

Control logic

Human operator

Triconex

“Your wish is my

command”

Page 29: Understanding Cyber Threats and Associated Risks for

TRICONEX: Safety Integrity Level (SIL3)29

http://iom.invensys.com/EN/pdfLibrary/Datasheet_Triconex_TriconSIL3_06-11.pdf

Page 30: Understanding Cyber Threats and Associated Risks for

Triconex in nuclear field30

Page 31: Understanding Cyber Threats and Associated Risks for

Multidisciplinary attack teams

• Origin of one of the attacks attack was

narrowed down to Central Scientific

Research Institute of Chemistry and

Mechanics

• Unusual/novel modus operandi for

offensive operations

https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-

owned-lab-most-likely-built-tools.html

Page 32: Understanding Cyber Threats and Associated Risks for

Current cyber operations in ICS domain

Espionage, PERSISTENSE,

Reconnaisance

https://www.us-cert.gov/ncas/alerts/TA18-074A

https://www.ncsc.gov.uk/news/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control

Page 33: Understanding Cyber Threats and Associated Risks for

Intrusion via trusted third-parties

Trusted third-parties:

subcontractors,

service providers, etc.

Page 34: Understanding Cyber Threats and Associated Risks for

Supply chain compromise (big problem!)

https://fcw.com/articles/2018/04/23/china-supply-chain-cyber.aspx

https://theintercept.com/2019/01/24/computer-supply-chain-attacks/

https://www.wired.com/story/supply-chain-hacks-cybersecurity-worst-case-scenario/

Page 35: Understanding Cyber Threats and Associated Risks for

Compromised security controls

• Stolen certificates to sign malware and compromised software

• Compromised malware protection companies

− Whitelisting service providers

− Antivirus companies

• Compromised software and firmware updates

https://arstechnica.com/information-technology/2019/05/hackers-breached-3-us-antivirus-companies-researchers-reveal/

Page 36: Understanding Cyber Threats and Associated Risks for

Contractor threat

https://udf.by/news/economic/196974-biznes-po-kitajski-stala-izvestna-prichina-rastorzhenija-kontrakta-po-svetlogorskomu-ckk.html

Page 37: Understanding Cyber Threats and Associated Risks for

Product security

Page 38: Understanding Cyber Threats and Associated Risks for

Urgent need for stricter requirements

Page 39: Understanding Cyber Threats and Associated Risks for

(In)security of Radiation Monitoring Devices

https://www.blackhat.com/docs/us-17/wednesday/us-17-Santamarta-Go-Nuclear-Breaking%20Radition-Monitoring-Devices-wp.pdf

https://www.wired.com/story/radioactivity-sensor-hacks/

https://www.bleepingcomputer.com/news/security/three-vendors-decline-to-patch-vulnerabilities-in-nuclear-radiation-monitors/

http

://ww

w.in

sp

ectio

n-k

its.c

om

/Up

loa

dF

ile/la

rge

//20

12

04

29

/Wire

less-R

em

ote

-Mo

nito

ring

-Syste

m-1

.jpg

Page 40: Understanding Cyber Threats and Associated Risks for

Insecure medical equipment

https://www.securityweek.com/serious-vulnerabilities-found-fujifilm-x-ray-devices

https://www.forbes.com/sites/thomasbrewster/2018/04/23/x-ray-machines-taken-over-by-healthcare-hackers

Page 41: Understanding Cyber Threats and Associated Risks for

Hardware backdoors in equipment

Page 42: Understanding Cyber Threats and Associated Risks for

No place to hide

https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/

NSA intercepting Cisco router shipments and installing implants

Page 43: Understanding Cyber Threats and Associated Risks for

Embedded systems security is very poor

https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Dissecting-QNX.pdf

https://www.darkreading.com/vulnerabilities---

threats/siemens-s7-plcs-share-same-crypto-key-

pair-researchers-find-/d/d-id/1335452

Page 44: Understanding Cyber Threats and Associated Risks for

Product compromise via supply chain

Industrial transmitter

Layers of standardized

electronics (for a

individual vendors)

• Supply-chain attacks

‒ Allows to bypass multiple levels of security

‒ Better scaling of attack efforts

Page 45: Understanding Cyber Threats and Associated Risks for

Concluding remarks

Page 46: Understanding Cyber Threats and Associated Risks for

Some takeaways

• Accelerated build-up of advanced cyber/cyber-physical

capabilities

• Race-to-the-Bottom and supply chain security

• Compromise of security controls/mechanisms

Page 47: Understanding Cyber Threats and Associated Risks for

Marina Krotofil@[email protected]

Thank you