the ics cyber kill chain: active defense edition ics cyber kill chain: active defense edition ...

24
The ICS Cyber Kill Chain: Active Defense Edition www.sans.org/ics @RobertMLee @SANSICS Presenter: Robert M. Lee

Upload: truongkiet

Post on 24-Mar-2018

226 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

The ICS Cyber Kill Chain:Active Defense Edition

www.sans.org/ics@RobertMLee

@SANSICS

Presenter:

Robert M. Lee

Page 2: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

What I Want You to Take Away

The Models

• The Sliding Scale of Cyber Security

• ICS Cyber Kill Chain

• Active Cyber Defense Cycle

Lessons Learned from Threats

• HAVEX

• Ukraine Cyber Attack

Your Takeaways

• Strategic

• Operational

• Tactical

Page 3: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

What You Can Do About It

Little Bobby can be found at: www.LittleBobbyComic.com and on Twitter @_LittleBobby_

Page 4: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

7

ICS Cyber Attack: Stage 1

Page 5: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

7

ICS Cyber Attack: Stage 2

Page 6: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

The Sliding Scale of Cyber Security

Architecture::

Supply chain, architecting the network, maintaining/patching

Passive Defense:Provide protection without constant human

interaction Firewalls, IPS, AV, etc.

Active Defense:Analysts monitor for, respond to, and learn from

adversaries internal to the network

Intelligence:Collecting data, exploiting it into information,

and producing Intelligence

Offense:Legal countermeasures,

“hack-back”, etc.

Page 7: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

7

Page 8: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

HAVEX

Page 9: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Asset ID and Network Security Monitoring

Pre-Havex

Post-Havex

Know Topologies

Collect

DetectAnalyze

Page 10: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Incident Response

Plan and TrainScope the Infection

Collect Forensic Data

Maintain Safe and Reliable Operations

Make Suggestions

During Cleanup

Page 11: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Threat and Environment Manipulation

De-Conflict

Timely Malware AnalysisArchitecture Recommendations

Page 12: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Threat Intelligence Consumption

IOCs and TTPs reflecting “tracedscn.yls”, OPC, and ICS protocol scanning led

to identifying compromised organizations

Page 13: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Observable Steps to an ICS Attack [HAVEX]

HAVEX

Reconnaissance

Weaponization Targeting

Delivery

Exploit

Install / Modify

C2

Act

STAGE 1 - Intrusion

STAGE 2 – ICS Attack

Develop

Test

Deliver

Install / Modify

Execute ICS Attack

Attack with Impact

Observable Steps

Sensors & Actuators

Control Elements (PLCs, RTUs, SIS)

IO

Supervisory Control Elements(Network, Applications, Servers)

Industrial Protocols

Fieldbus using Industrial Protocols

DMZ Applications

External Network Hosts(Business or Plant Network)

Common Protocols

Common & Industrial Protocols

Common Protocols

0000

STOP1:0

LIGHT0:0

TIMER1/DNT4:0

TIMER2/DNT4:3

START1:0

LIGHT0:0

TIMER1

TIMER2

TON

TON

Timer On DelayTimer T4:0Time Base 0:01Preset 12000<Accum 0<

Timer On DelayTimer T4:3Time Base 0:01Preset 18000<Accum 0<

EN

DN

EN

DN

LIGHT0:0

0Bul.1764

0Bul.1764

0Bul.1764

1Bul.1764

0Bul.1764

DN

DN

0001

0002

www

ICS Files

ICS WebpagesE-mail

Page 14: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

The Ukraine Attack

Page 15: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

7

Page 16: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Threat Intelligence Consumption -> NSM

• Identify an Indicator of Compromise (IOC) from iSight

• Search in your network

Page 17: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

• Searching for pieces of malware that use the same C2 can sometimes reveal additional variants and indicators

• In this case the 64[.]4.[.]10[.]33 IP address led to another BE2 sample which also used 46[.]165[.]222[.]6

NSM -> Incident Response (IR)

• Incident responders identifying the infected system collect samples in tools such as Redline or FTK

Page 18: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

IR -> Threat and Environment Manipulation

• Malware analysis can reveal additional indicators of compromise

Page 19: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

• Collecting internal intrusion data from the various teams gives better threat insight

• Threat Intelligence Consumption personnel can share to learn and help others

Threat and Environment Manipulation ->Threat Intelligence Consumption

Page 20: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Observable Steps to an ICS Attack [BE3]

BE3

Reconnaissance

Weaponization Targeting

Delivery

Exploit

Install / Modify

C2

Act

STAGE 1 - Intrusion

STAGE 2 – ICS Attack

Develop

Test

Deliver

Install / Modify

Execute ICS Attack

Attack with Impact

Observable Steps

Sensors & Actuators

Control Elements (PLCs, RTUs, SIS)

IO

Supervisory Control Elements(Network, Applications, Servers)

Industrial Protocols

Fieldbus using Industrial Protocols

DMZ Applications

External Network Hosts(Business or Plant Network)

Common Protocols

Common & Industrial Protocols

Common Protocols

E-mail

BE3

BE3

BE3

BE3

BE3

Page 21: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

- Integrated Attack- Highly Coordinated

- Logistic Sophistication- Used Tools to Enable

- 6+ Months in the Environment

Ukraine Power Outage

Page 22: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Takeaways

Page 23: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

What I Want You To Do After the Conference

Strategic Players

- Communicate about Real Threats and Impact

- Set the Culture

- Demand Value Add

Operational Players

- Empower Your People

- Get them Trained

- Developer Partnerships

Tactical Players

- Infrastructure Preparation

- Baseline the Environment

- Start Monitoring the Environment

Page 24: The ICS Cyber Kill Chain: Active Defense Edition ICS Cyber Kill Chain: Active Defense Edition  @RobertMLee @SANSICS Presenter: Robert M. Lee

Questions?

Visit us at SANS ICS to keep up with our latest research, classes, and more:http://ics.sans.org/

Keep in Touch with the Community with the SANS ICS Alumni Email Distro:https://lists.sans.org/mailman/listinfo/