dragos inc may 2019 student student officer student
play

Dragos, Inc. | May 2019 Student Student Officer Student Officer - PowerPoint PPT Presentation

Joe Slowik / @jfslowik Dragos, Inc. | May 2019 Student Student Officer Student Officer Network Defender Student Officer Network Defender ICS Defender


  1. Joe Slowik / @jfslowik Dragos, Inc. | May 2019

  2. Student

  3. Student Officer

  4. Student Officer Network Defender

  5. Student Officer Network Defender ICS Defender

  6. ➢ ➢ ➢ ➢

  7. https://ics.sans.org/media/An-Abbreviated-History-of-Automation-and-ICS- Cybersecurity.pdf

  8. http://www.a2n.net/site/wp-content/uploads/2017/03/IoT_04.png

  9. Increasing Adoption of IT Technology in ICS Environments Perimeter Extension and Greater Connectivity Increased Vendor Interest in ICS Security

  10. Increased Efficiency and Cost Savings by Incorporating COTS Hardware/Software into ICS Equipment Elimination of (some) custom environments, airgaps, and traditional separation from enterprise IT Result: IT threat surface imported to IT environment – WITHOUT the same security capabilities

  11. Vendor and Contractor Access Traditional ICS Increased Remote Work Perimeter and Administration Cloud and Off-Prem Products

  12. Increased vendor interest in ICS space Attempt to leverage “IT -ification ” as justification to extend existing IT products to industrial Fails to recognize operational and technical differences in how IT technologies are deployed for industrial use

  13. Enumerate and Identify points Breach victim IT categorize Deliver effects of contact with network control system on objective ICS environment

  14. Preparatory Actions Deny Degrade Destroy

  15. Deny, Recon & Initial Degrade, Access Destroy Many Few Attempts Examples

  16. Disruptive/Destructive ICS-Focused Malware ICS Disruptive Events Malware • STUXNET • 2005-2010 (?): STUXNET • STUXNET • HAVEX • 2014: German Steel Mill • CRASHOVERRIDE Attack • BLACKENERGY2 • TRISIS • 2015: Ukraine • CRASHOVERRIDE BLACKENERGY3 • TRISIS • 2016: Ukraine CRASHOVERIDE • 2017: Saudi Arabia TRISIS

  17. Greater Heightened More Pursuit of Adversary Danger to Aggressive Physical ICS Risk Asset Attacks Attacks Tolerance Owners

  18. Legacy • Custom Malware and Specific Tools • Exploit Use for Movement and Access (pre-2016) • Manual Operations for ICS Impact • “Commodity” Techniques until ICS Attack Current • Credential Theft and System Tool Use to Spread • ICS Effects and Manipulation Codified in Software

  19. Initial Intrusion & Lateral ICS-Specific Disruption Movement • Leverage “Commodity” • Attacks are Unique to Tools Target, Environment • Deploy “Living off the • Requires Building Land” Techniques Custom Attack Software • Avoid Custom Tools and • Little Scope for Direct Tradecraft Replay

  20. ICS Environments are “Brittle” • Little scope for direct testing • Asset owners are conservative ICS Attacks have Pre-Requisites • Focus on enabling factors for testing • Imperfect for complete security, but valuable for defense in depth Multiple Paths to Security Testing • Notional/Logical testing has value • Direct penetration testing may be least valuable option

  21. Asset Owner • Clear communication and requirements necessary • Be prepared for extensive discussion on ROE Trust • What experience, certifications, and training do you need to enter environment? Technical • Determine scope and direction of test • ICS tools vs. IT tools – depends on type and extent of assessment Capability • Are custom tools/capabilities required? Identifying End- • Delineate goals in advance relative to ICS operations: • Improve security State • Enhance recovery • Minimize downtime

  22. Initial Intrusion IT-ICS Pivot Enterprise IT access ICS Impact Enumerate and scope Identify mechanisms environment to migrate to ICS Two mechanisms: Identify and gather Requires continuous • Manual manipulation (legacy) information of interest connectivity to • Automated interaction to ICS operations adversary (current) infrastructure Goal is to manipulate physical processes via logical means

  23. • Essentially a standard penetration test IT Intrusion •For industrial organizations, may need to assign “special attention” to operationally-significant groups • Identify and assess IT-ICS links IT-ICS Boundary • Still represents an IT-centric test, but determines ICS environment external risk • Options include Windows-centric lateral movement testing, or process- ICS Penetration specific assessment • Identify tools and techniques needed in advance in light of ROE • Notional/logical only ICS Impact • Demonstrate mechanisms through which impact could occur – rather than creating such an impact

  24. Confidentiality Integrity Availability

  25. Process Safety ICS Operations Process Process Integrity Reliability

  26. Physical-process nature of ICS limits ability to directly assess impacts Focus instead on pathways to ICS impact When desired, leverage notional testing through table tops and walk-throughs for direct impact assessment

  27. Initial • Essentially the same as a “normal” penetration test Intrusion • Identify ingress points to the organization Lateral • Identify and map routes to reach control systems Movement • What pathways exist enabling ICS access • Once ICS accessed, what options are available to an ICS Breach adversary • Test visibility, response, and monitoring

  28. Recognize limitations in ICS environments for direct testing Leverage whole-of-kill chain approach for comprehensive assessment Build off of known ICS attacks to develop methodologies

  29. Table Top Exercise Attack Surface Interactive Pen Test Assessment • Walk through • Logical and • Risky in the plans and interactive sense of possible responses probing of ICS- “unforeseen facing assets consequences” • Least invasive, also likely to • Determine and • Most valuable in have least evaluate risk accurately value* with minimally- gauging defense invasive techniques

  30. Opportunistic IT Infections spreading to ICS Direct Disruptive ICS Events ICS Integrity Attacks

  31. Identify IT- • Assess monitoring and access controls ICS Links • Identify work-arounds Lateral • How can additional systems in ICS be reached Movement • What is the scope of spread from IT in ICS • Table top or discussion only ICS • Plans and procedures for Recovery restoring operation

  32. Launcher • Select Payload Start • Initiate ICS Impact Payload • Connect to Control Systems Execution • Manipulate State • Wait for Timer Wiper • Delete Files, Remap Services, Reboot System •Leave behind “Backup” Post- Backdoor Attack • SIPROTEC DDoS (Fail)

  33. Determine Table top or walk- Interactive lateral accessibility of Test C2 capability through of possible movement within critical systems from ICS impacts enabled by ICS environment (DCS, RTU, access Historian, etc.)

  34. Gain access to and harvest credentials from IT network (Mimikatz , ‘ SecHack ’) Leverage multiple open- or commercial-source tools for post-exploitation (WMImplant, administrative tools) Utilize remote access to OT network via stolen credentials Continue pivoting through network via credential capture Gain sufficient access to SIS to deploy TRISIS

  35. Map out critical Determine Walk through Evaluate systems for ICS access and integrity attack monitoring and operational communication scenarios based auditing safety and possibilities to on access mechanisms integrity these systems findings

  36. IT Skills have a Role in ICS Testing • Audit and test links and communication • “IT -ification ” means production networks feature similarities to IT Scope Needs and Purpose • What is actually being tested? • How will the actions better the organization? Identify Core Interests and Values • Safety, Reliability, and Integrity are critical • Ensure methodologies respect and aim to secure these values!

  37. Evolution of ICS Attacks and Prospects for Future Disruptive Events – Dragos (https://dragos.com/wp- • content/uploads/Evolution-of-ICS-Attacks-and-the-Prospects-for-Future-Disruptive-Events-Joseph-Slowik-1.pdf) Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE – Dragos • (https://dragos.com/whitepapers/CrashOverride2018.html) TRISIS – Dragos (https://dragos.com/blog/trisis/TRISIS-01.pdf) • Industroyer – ESET (https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf) • TRITON – FireEye (https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework- • triton.html) Analysis of the Cyber Attack on the Ukrainian Power Grid – SANS (https://ics.sans.org/media/E- • ISAC_SANS_Ukraine_DUC_5.pdf)

Recommend


More recommend