bh europe 2013_wilhoit

44
Who’s Really Attacking Your Kyle Wilhoit Threat Researcher, Trend Micro ICS Devices?

Upload: kyle-wilhoit

Post on 08-May-2015

853 views

Category:

Technology


0 download

DESCRIPTION

Blackhat Europe 2013

TRANSCRIPT

Page 1: Bh europe 2013_wilhoit

Who’s Really Attacking Your

Kyle WilhoitThreat Researcher, Trend Micro

ICS Devices?

Page 2: Bh europe 2013_wilhoit

#WHOAMI

• Threat Researcher at Trend Micro- research and blogger on criminal underground, persistent threats, and vulnerabilities.

• Bachelor’s and Master’s in Computer Science. Currently pursuing PhD. Normal security certifications, CISSP, GCIH, GCFE, etc…

• Research:-Malware detection/reversing-Persistent Threats (Malware based espionage)-ICS/SCADA Security-Vulnerabilities and the “Underground”

Page 3: Bh europe 2013_wilhoit

This presentation will focus on:• Concerns/Overview of ICS Security• How terrible the security profiles of ICS devices are• Are ICS devices attacked?• Who attacks ICS devices?

Page 4: Bh europe 2013_wilhoit

Agenda• ICS Overview• Typical ICS Deployment• Overview of two SCADA protocols• ICS Vulnerabilities• SCADA on the Internet?• Story Time!• Findings• Attacker Profile• Recommendations

Page 5: Bh europe 2013_wilhoit

ICS Overview

What are ICS devices?• Used in production of virtually anything• Used in water, gas, energy, automobile

manufacturing, etc. • Notoriously insecure…in every way• Software is sometimes embedded, sometimes not• Typically proprietary

Page 6: Bh europe 2013_wilhoit

TYPICAL ICS

Page 7: Bh europe 2013_wilhoit

DNP3• Used to send and receive messages • Complex• No authentication or encryption• Several published vulnerabilities

Page 8: Bh europe 2013_wilhoit

Modbus• Oldest ICS Protocol• Controls I/O Interfaces (MOSTLY!!!!)• No authentication or encryption! (Surprise!!!)• No broadcast suppression• Vulnerabilities are published

Page 9: Bh europe 2013_wilhoit

Security Concerns- ICS vs. Traditional IT Systems

ICS• Productivity• Up-time• Reliability of data

IT• Protect the data• Protect comms• Limit interruptions

Page 10: Bh europe 2013_wilhoit

ICS Vulnerabilities• In 2012, 171 unique vulnerabilities affecting ICS products.• 55 Vendors…

Page 11: Bh europe 2013_wilhoit

SCADA on the Internet???

• Google-fu• Shodan

Page 12: Bh europe 2013_wilhoit

SCADA on the Internet???• Pastebin• ERIPP• Twitter

Page 13: Bh europe 2013_wilhoit

Story Time!• Small town in rural America• Water pump controlling water

pressure/availability• Population 18,000~

Page 14: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Story Time!• Water pressure system Internet facing• No firewalls/security measures in place• Could cause catastrophic water pressure

failures

Page 15: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Story Time!• Attacked several times…During Q3-Q4• Attackers successfully gained access• Has not been made public• This is not a story…• Real life event..

Page 16: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Story Time!

This Happened.

Page 17: Bh europe 2013_wilhoit

• WRONG!

Story Time!

In my basement…

Page 18: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Enter…Honeypots…

Page 19: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Honeypot Overview• Two low-interaction• One high-interaction• Ran for 28 days in total• One Windows Server 08• Two Ubuntu 12.04 Servers

Page 20: Bh europe 2013_wilhoit

What They See

Page 21: Bh europe 2013_wilhoit

• WRONG!• WRONG!

High-Interaction Architecture

Page 22: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Low-Interaction Architecture

Page 23: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Some Tools Used

Page 24: Bh europe 2013_wilhoit

Vulnerabilities Presented

“If you can ping it, you own it”

• SNMP vulns (read/write SNMP, packet sniffing, IP spoofing)

• Authentication limitations• Limits of Modbus/DNP3

authentication/encryption• VxWorks Vulnerability (FTP)• Open access for certain ICS

modifications- fan speed, temperature, and utilization.

Page 25: Bh europe 2013_wilhoit

• WRONG!

What is an “attack”?• ONLY attacks that were targeted• ONLY attempted modification of pump system

(FTP, Telnet, etc.)• ONLY attempted modification via Modbus/DNP3• DoS/DDoS will be considered attacks

Page 26: Bh europe 2013_wilhoit

• WRONG!

Attack Profile Countries

US; 9

LAOS; 6

UK; 4

CHINA; 17

NETHERLANDS; 1

JAPAN; 1BRAZIL; 2

POLAND; 1VIETNAM; 1

RUSSIA; 3PALESTINE, 1CHILE; 1 CROATIA; 1 NORTH KOREA; 1

• Not Just IP’s

Page 27: Bh europe 2013_wilhoit

• WRON!

Attack Overview

Modification of CPU fan speed

Modbus traffic modification

Secured area access attempt

Modify pump pressure

Modify temperature output

Attempt to shutdown pump system

Vxworks exploitation attempt

0 2 4 6 8 10 12 14

Count

Count

Page 28: Bh europe 2013_wilhoit

Snort Findings

• Used Digital Bond’s Quickdraw SCADA Snort Rules• Custom Snort Rules Created

1111006Modbus TCP – Unauthorized Read Request to a PLC

1111007Modbus TCP – Unauthorized Write Request to a PLC

1111206 / 11112061DNP3 – Unauthorized Read Request to a PLC

1111207 DNP3 – Unauthorized Write Request to a PLC

1111208DNP3 – Unauthorized Miscellaneous Request to a PLC

Page 29: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Spear Phished!TO: CITYWORKX@<HOSTNAME OF OUR CITY>.COM

“ Hello sir, I am <name of city administrator> and would like the attached statistics filled out and sent back to me. Kindly Send me the doc and also advise if you have questions. Look forward you hear from you soon

....Mr. <city administrator name> ”

Page 30: Bh europe 2013_wilhoit

• WRONG!• WRONG!

CityRequest.doc

Page 31: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Malware• CityRequest.doc• File gh.exe dumps all local password hashes

– <gh.exe –w>• File ai.exe shovels a shell back to a dump server.

– < ai.exe –d1 (Domain) –c1 (Compare IP) –s (Service) >• Malware communicating to a drop/CnC server in China.• exploiting CVE 2012-0158

Page 32: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Execution

Page 33: Bh europe 2013_wilhoit

• WRONG!• WRONG!

Execution• Upon execution of CityRequest.docx, files leaving the server

in question after 5 days.– Fake VPN config file– Network statistics dump– SAM database dump– Gain persistence via process migration

• Won’t execute on Office 2010.

Page 34: Bh europe 2013_wilhoit

• WRONG!• Monitors reg keys for value changes• Creates guard pages• Dropped PE files• Communicates to C2 IP’s• Creates files• Creates fake document and opens it

Malware Features

Page 35: Bh europe 2013_wilhoit

Attack: Days 1-4

Page 36: Bh europe 2013_wilhoit

Attack: Days 5-17

Page 37: Bh europe 2013_wilhoit

Attack: Days 18-???

Page 38: Bh europe 2013_wilhoit

• WRONG!• WRONG!• Chose most prevalent attacker(s)• Profiled, poked, and researched who they were• Malware was code-reuse

Targeted? Who Knows…

Attacker Profile

Page 39: Bh europe 2013_wilhoit

Motivation?• Motivation is hard to establish…

Page 40: Bh europe 2013_wilhoit
Page 41: Bh europe 2013_wilhoit

Recommendations• Disable Internet access to your trusted resources. Where possible.

• Maintain your trusted resources at the latest patch levels, and ensure you are diligent in monitoring when new patches/fixes are released.

• Require username/password (two-factor if possible) combinations for all systems, including those that are not deemed “trusted”.

• Control contractor access- Many SCADA/ICS networks utilize remote contractors, and controlling how they access trusted resources is imperative.

Page 42: Bh europe 2013_wilhoit

Recommendations• Utilize SSL/TLS for all communications to web-based ICS/SCADA

systems.

• Control access to trusted devices. For instance, for access to a segmented network, use a bastion host with ACL’s for ingress/egress access.

• Improve logging on trusted environments, in addition to passing logs to SIEM devices for third party backup/analysis.

• Utilize Zones- such as “BLAN”, “WLAN”, and “SCADA”.

• Develop a threat modeling system to your organization- understand who’s attacking you, and why.

Page 43: Bh europe 2013_wilhoit

REMEMBER:• These attacks are happening… In the USA, and many other places…

Page 44: Bh europe 2013_wilhoit

ShoutTwitter: @lowcalspamEmail: [email protected]: [email protected]

Please complete the speaker feedback surveys! (m.blackhat.com)