THE HUNT A cyber attack in the process industry QUICK FACTS Company: Pulp Global Inc, a leading producer of various types of pulp products Industry: Pulp and paper industry Number of employees: 12 500 Motivation of the attacker: Extort money by disrupting production CHARACTERS Martin, CIO, Pulp Global In charge of implementation of new systems, as well as integration and modernization projects. Eric, control systems engineer, contractor Works for Pulp Global’s third party integrator, who supports the mill modernization project. Responsible for the manufacturing execution system (MES). Peter, new employee, Pulp Global Wrote his thesis about a modernization project at Pulp Global during his Master’s studies in Automation Technology. Number One, adversary Works for an online-based organized crime syndicate. Motivated by the challenge, bragging rights and monetary rewards. 1 In manufacturing, 86% of cyber attacks are targeted 66% feature hacking, only 34% malware Almost half (47%) of breaches involve the theft of intellectual property to gain competitive advantage 53% of the attacks are carried out by stateaffiliated actors, 35% by organized crime Source: Verizon 2018 Data Breach Investigations Report 2 SETTING THE STAGE Pulp Global Inc, a leading producer of various types of pulp products, was preparing to ramp up production after summer maintenance breaks at various plants. Martin, the CIO of Pulp Global, was proud of his team’s progress with the commissioning of new systems during the summer holidays. put tremendous pressure on the management team of Pulp Global. The global pulp and paper industry is a highly competitive arena where producers have to place themselves in the lowest possible cost position, while capturing and maintaining market share. Pulp Global had been growing significantly over the past five years. They had acquired many smaller competitors, whose production facilities they merged into the Pulp Global lineup. The fierce competition within the pulp industry was also the main driver for the information system overhaul. The management team demanded better, more timely visibility into global operations. The plan? Orchestrate production better while decreasing overhead. The ultimate goal? Continue to provide the high quality products Pulp Global was known for while keeping prices competitive. As a part of an ongoing project, Martin had been extremely busy coordinating the rollout of a large information and production orchestration system. Once the rollout was complete, all of Pulp Global’s 25 mills would use the same performance reporting and mill manufacturing execution systems. For the data to flow from all of the different legacy distributed control systems at the plants, Martin needed to increase the connectivity between the corporate and the production networks. He had to install various new systems to provide an integration between the new management systems and the old production systems. Martin looked forward to the sense of accomplishment that would come with finishing the project. He had no idea that life at Pulp Global was about to take a distressing turn. The pressure of lowering costs and increasing market share This was anything but a straightforward task. Most of Pulp Global’s mills were acquired by purchasing smaller pulp producers. There were as many different ways of building a mill as there were mills. Only five of the mills were using the same template, systems and systems design: the ones built from the ground up by Pulp Global. Despite the company’s growth, the picture wasn’t all rosy. Increasing competition, especially in maturing markets, and declining profitability in the pulp and paper market CYBER RISK MANAGEMENT CHALLENGES IN THE PROCESS INDUSTRY • The convergence of IT (information technology) and OT (operations technology) towards the use of COTS (Commercial off-the-shelf) platforms • Increasing interconnectivity • Integration of legacy technologies • Large number of different systems • Pressure to get more data 3 The Segnen mill requirements and increase efficiencies. Pulp Global had chosen an equipment supplier and a third party integrator to facilitate the modernization project. Pulp Global had shared very detailed plans and documentation of the project with the subcontractors. One of the most challenging mills in Martin’s project was also Pulp Global’s largest mill. The Segnen mill was originally built by Davon International, which Pulp Global acquired in the early 1990s because of new pulp production technologies Davon was pioneering at the time. Becoming a target The Segnen mill was located on a large industrial estate along the coast of the Baltic Sea. The mill had its own port for importing wood and exporting kraft pulp bales anywhere in the world. Pulp Global was also building a brand new pulp mill in the beautiful Samveng delta in Southeast Asia. Following the visibility in media, this 500 million dollar project also sparked the interest of Number One, the leader of an organized cyber crime group. The group had been performing highly sophisticated, targeted attacks against various companies around the world with the goal of extorting money, selling confidential information on the black market or causing reputational and financial damage. Segnen had five separate distributed control systems, eight different SCADA systems, automation products from all of the largest vendors, three different mill information systems, and the list goes on. The complexity of the mill, the large number of systems and the requirements to increase connectivity and integrate legacy systems into modern orchestration systems presented a challenge, and sometimes a headache for Martin. When Pulp Global’s project popped up in the news repeatedly, Number One decided to seize the opportunity. They chose to investigate how cyber resilient the company was, and whether there was some money to be made. Segnen mill was undergoing a major overhaul. The mill needed modernization to meet the new group reporting 4 PHASE 1 - RECON Pulp and paper was a new industry for Number One. But it didn’t take long for the skilled group to get a grasp of Pulp Global’s operations. Number One liked to call this phase of research and reconnaisance the “get-familiar phase.” their brand models and version numbers, a detailed list of new software to be installed, operating system versions, network layouts with IP addresses, Modbus tags and I/O listings, and even usernames and passwords for the reporting and integration servers. Number One and the team began to gather as much information about Pulp Global as they could from various freely available sources, such as news articles and press releases. This included information about vendors and suppliers, maintenance contractors, personnel in key positions, and information about the IT and OT systems. Amongst the data and information they had collected, one mill constantly popped up: Segnen. Number One and the group had obtained the information via a public web service where anyone could upload files to check if they contain viruses or malware. A cyber securityaware control systems engineer Eric, who worked for Pulp Global’s third party integrator, had received an email from Pulp Global’s project manager containing only the compressed zip file and subject line stating “Important project documents.” Eric had thought it might a good idea to check that the file didn’t contain any malware. He decided to upload the zip file into a reputable malware scanning service. Number One decided to focus on the Segnen mill, due to the large quantity of available information. Their plan was to turn Segnen into their initial entry point. What Eric didn’t know was that all the files uploaded into the service were made available for malware researchers. And one of them had close ties with the underground crime community. A treasure trove of information A few days into the reconnaissance phase, one of the crime group members came across a treasure trove of information within a 130Mb compressed zip folder. The folder contained floor plans of the mill, a list of automation equipment with 5 group sprang into action. They started to probe for services and hosts that were open and available via the internet. SUPPLY CHAIN ATTACKS A supply chain attack targets an organization through a third party, a vendor or a partner. Also known as a value-chain or a third-party attack, it is designed to infiltrate a company’s systems through vulnerable elements in their partner network. The weakest link in your security chain may lie outside your organization. To Number One’s annoyance, the internet attack surface of the mill was relatively small. Prior to the modernization, Segnen had few systems feeding data to the corporate systems hosted in Pulp Global’s headquarters. However, the group did find a development version of Pulp Global’s internal email newsletter service. With thousands of employees, an internal employee email newsletter was the only reasonable way of conveying information. Pulp Global had set up their own newsletter service in the cloud. This made it easier for the internal communications team to access the system, while also lowering costs. Selecting the employee to target With the newly available information, Number One and the group began to build a better picture of the mill and its personnel. They came across Peter, a former thesis worker and now a proud employee of Pulp Global. Peter had finalized his Master’s degree in Automation Technology a few months prior and was immediately hired by Pulp Global. Username “admin” password “admin” The email service also had a test environment where the service developers could test and deploy changes before applying them to the production version. To make the testing more realistic, the developers had written a script that would copy the database from the production system to the development system. The script would make sure they always had the most recent data with which to test their changes. After some further mapping of the personnel, Number One learned that Peter had written his thesis about the modernization project. Even more, he had included a very detailed description of how the pulping process in the mill worked. Number One thought Peter would be a great target for malicious emails: as a new employee, he was unlikely to know all the people working at the mill. It being a test system, the developers had added an admin account titled “admin” with the password “admin.” This was the account Number One used to gain access to the service and siphon all the email addresses, names and titles of Pulp Global’s employees, as well as the templates used to send internal newsletters. Looking for available services and hosts With the Segnen mill selected as target, Number One and the PROTECT YOUR CREDENTIALS 30% of CEOs have used their company email address to register for a service that was later breached, exposing their password and other details. In a password audit of a large, well- known organization we tested 6,000 passwords. Here is what we found: We successfully cracked 35%. 73% of the passwords were derived from the organization’s name – e.g. using pHiShd!; 81% of CEOs have had their email address and other personal information exposed online in the form of spam lists or leaked marketing databases. Source: F-Secure 2017 Report: CEO Email Exposure: Passwords And Pwnage 80 passwords derived from the word “password”. 6 Source: phished PHASE 2 - INITIAL INTRUSION After extensive information gathering, it was time for the initial intrusion. Number One decided that the best way to gain access deep within the network was to launch a targeted spearphishing campaign against key personnel. The group had all the necessary resources to perform this: they had gathered data from the email newsletter service, including the newsletter templates used by the company. to Number One’s command and control infrastructure and allow him to perform additional attacks. This way Number One would be able to extend his foothold within the network. The targets for the spearphishing campaign were strategically selected. One of them was Peter, the former thesis worker and new recruit for Pulp Global. Peter had been unable to attend the employee celebration, and he was interested in seeing what he had missed. Crafting a spearphishing email Through accessing the newsletter service, Number One had learned that Pulp Global had recently held a get-together to celebrate the successful maintenance breaks and reward the employees for the long hours they’d put in. He decided to craft a spearphishing email with the title “Employee Celebration Photos” using Pulp Global’s newsletter template. The phishing email appeared to come from a legitimate source. It was even using the company newsletter template, so Peter didn’t hesitate to open the email or the attachment. The attached file promptly infected Peter’s laptop with the remote access trojan. It only took about an hour from sending the email to getting the initial foothold via Peter’s compromised computer. The email contained a zip folder with a custom built remote access trojan (RAT). Once executed, it would connect back 7 SPEARPHISHING REMOTE ACCESS TROJAN Spearphishing emails appear to be from someone the target trusts. They are designed to trick the target into clicking on a malicious link and giving out sensitive information, such as passwords. A malware program that utilizes a back-door to take administrative control over a target computer. If you have a business to protect, you shouldn’t depend on the fact that people don’t open malicious emails. Emails are designed to be opened and read. Address the issue by educating your staff and having other controls in place. 8 PHASE 3 - EXTENDING THE FOOTHOLD 9 Number One was celebrating. With relative ease, the group had gained a permanent foothold deep within Pulp Global’s internal network. The attackers had also gotten lucky with their selection of Peter as a target. Although a new employee, Peter had wide access to both the internal corporate network as well as systems communicating directly to the production network. For about two weeks, Number One and the team refrained from performing attacks or trying to extend their foothold. Instead, they passively monitored Peter’s laptop, logging keystrokes and capturing screenshots of the various systems Peter accessed as part of his day-to-day work. One of the important systems Peter had access to was the project management and wiki service where all the production and ICS projects were stored, with related documentation and planning information. Number One managed to capture most of the credentials Peter was using to access the various systems, including the credentials for the project management system. QUICK WINS OR PERSISTENT FOOTHOLD? The continuous trade-off for an attacker is how, and how fast, do I want to move versus what are my chances of being detected, contained or stopped. • Freedom of movement vs. losing access • Being detected vs. being contained • Getting to the target fast vs. a persistent access for further intelligence Jackpot! Peter had a habit of leaving his laptop turned on in the office when he left work for the day. This was very fortunate for Number One, as it allowed his criminal gang to utilize Peter’s computer outside office hours. They could probe the network, launch additional attacks and extend the foothold. management system, others were tasked with covertly extending their foothold within the network. In an effort to remain undetected for as long as possible, they made sure to use the same tools used by Pulp Global’s IT staff and system administrators to perform their day-to-day duties. One of the first things Number One started to probe was the project management system and wiki. To his elation, it was a jackpot. The amount of information and the level of detail he found within the system was unprecedented in his experience. But they needn’t have worried – Pulp Global had no network level visibility and very limited host level visibility. The attackers could have run nearly any tools, no matter how noisy, without a significant risk of getting caught. The truth was, Pulp Global had no idea what was happening inside their networks. Over the next couple of days Number One and the group downloaded every single network drawing, system and shop floor layout, project plan, equipment list, and asset inventory report they could find. Their exfiltration totaled tens of gigabytes of detailed information about Pulp Global’s projects and sites. Staying undetected While some of the hackers in Number One’s group combed through documents and details collected from the project Pulp Global’s internal network was a mishmash of various systems and hosts across three decades. This included everything from legacy applications and servers to brand new Windows systems. Many of the systems were already past their end-of-life and were receiving no software updates, thus making it easy for the attackers to gain access and infect them with publicly available exploits. 10 A photo displaying critical information While half of Number One’s team was busy infecting and extending the foothold, the other half had finished piecing together a thorough picture of Pulp Global’s operations and mills. VISIBILITY Detection and response solutions allow you to detect cyber attacks before criminals can access critical systems or files. Catching – and containing – a breach as early as possible will significantly lower the damage and the costs it can incur. Number One discovered an interesting tidbit in one of the IT support staff member’s photo. There was a computer monitor in one corner of the image, with a Post-It note attached to it. The sticky note contained shared domain administrator credentials used by Pulp Global’s IT support staff. “This can’t be true, there’s no way these credentials will work,” Number One thought out loud. After all, the photo had a time stamp from nearly five years ago. But of course, he had to try them. He entered the credentials into the login page. Incredibly, the system opened up. GET CONTEXTUAL VISIBILITY INTO IT ENVIRONMENT AND SECURITY STATUS The account was a shared one, meaning that it would be nearly impossible to track who was using it. This was perfect for Number One. Using the domain admin credentials, the whole network was now open to the crime group. Exploiting the hosts was as simple as logging in with the administrative account. The use of these credentials was so widespread within the corporate network that they also worked for Linux hosts, and even the routers and switches. 11 PHASE 4 - INFORMATION GATHERING AND PLANNING With nearly unlimited access to the corporate network and information gathered from documents in the project management system, Number One located key users within Pulp Global. To access these users’ computers, the attackers installed the remote access trojan which allowed them to begin monitoring their activities. 12 Access to corporate and production networks After accessing the MES server with the domain administrator credentials, Number One’s group had nearly unlimited access to the various production networks and systems. Each of Pulp Global’s mills had a separate ICS Active Directory managed by the local IT on site. The group focused on the Segnen site. One of these users was Eric, the control systems engineer who worked for the third party integrator. Eric was targeted because he was also responsible for the newly installed manufacturing execution system (MES) that was used to connect Pulp Global’s enterprise resource planning (ERP) system more tightly to production – the MES also automated the flow of data between ERP and production. With access to the information collected from the project management system and wide access to the production networks, Number One’s group began to map the different systems and their software versions, as well as PLCs (programmable logic computers) and DCS (distributed control system) equipment being used in the mill. They also tried to harvest more user credentials. From the network drawings and mappings of the network equipment, Number One had established that the MES system was the key link between the corporate and production ICS networks. He selected the MES system because of the wide access to both networks. 13 Harvesting user accounts With some further recon, Number One established that the ICS production Active Directory was using a protocol called SMBv1. SMBv1 was a legacy protocol that made it possible for the attackers to query the directory for all of the user accounts and their account descriptions, as well as hosts present in the directory tree. To make it easier for the mill personnel to log in to the hosts, the local IT administrators had written the account passwords in the account description fields. This would enable them to share the passwords with users who had forgotten them. In addition to standard users, this also included some of the personnel with domain administrator accounts. As with the corporate network, the doors were once again wide open for Number One’s group. Accessing the engineering workstations Most of the production and ICS-related networks in the Segnen mill were on the same network. However, one network seemed to be separate from the others. This was comprised of the engineering workstations used to program the programmable logic computers (PLCs) and safety instrumentation systems (SIS) used to control the plant’s operations. The engineering workstations were a key target system. They contained the source code and development files for the PLCs and safety systems, the key pieces of information needed to tailor an effective attack against the control systems. It took considerable effort from Number One’s group to locate the engineering workstations among the thousands of other hosts within the large production network. Eventually, the engineering workstations were found via an unlikely source, a regular operator station sitting in one of the control rooms. The operator station had recently been upgraded with a second network interface to make it possible for automation engineers to access the engineering workstations while monitoring operations from the control room. This “dualhome” control room host was Number One’s gateway to the network segment containing the engineering workstations. This network segment didn’t have direct connectivity to the internet so the source code and project files were piped via multiple hops within the Segnen mill network, ultimately ending in the corporate network and then on to the command and control server of Number One. 14 PHASE 5 - ATTACK PREPARATION, TESTING AND VALIDATION Social engineering to get insider information After about a month of collecting information and extending the foothold within Pulp Global’s networks, Number One had finally obtained enough information to begin preparing for the targeted attack on the industrial control systems at the Segnen mill. Despite their painstaking research, the group was still lacking certain critical details they would need to carry out a successful attack. They needed to better understand the different parameters and how altering them would affect the overall process. It was clear they would need additional help – someone on the inside. The attackers began carefully studying the kraft pulping process and how it operated in the Segnen mill. In addition to generic resources, such as Google and various pulp industry trade publications, Number One used the detailed information in Peter’s thesis to plan the attack. Number One began to approach some of the Segnen mill employees by email and phone with various social engineering techniques. Playing the part of a new employee at one of the mill’s main contractors, Number One asked detailed and specific questions that could only come from someone with both a thorough knowledge of the pulping process and access to confidential mill information. The mill employees suspected nothing. After all, who would have access to such information other than contractors and mill employees? The attackers learned that due to the complexity of the pulping process and the natural fluctuations for various parameters and chemicals, any changes could take up to a week to show up in the finished product. This meant they could perform testing and validation of their attack on the live production systems with only a minor risk of getting caught. As long as the changed parameters had been carefully chosen, any problems in the process would likely be attributed to natural fluctuations. 15 Now armed with valuable information obtained from multiple employees, Number One had finally figured out the attack vector. If successful, his intricately-planned attack would cause long lasting reputational damage and financial loss. And just in case this attack should fail, he also formed a much more crude backup attack plan that would completely wipe out all PLCs, servers and hosts in the production environment. Number One and the crime group wrote and tested multiple configurations and ways of conducting the attack. They changed six different PLCs, a few safety logics, and created new views for HMI panels used by the operators to monitor the process. Testing the attack To develop and test the main attack plan, Number One needed to build a simulated environment representing the systems he planned to attack and modify. Using the original source code, project files and HMI graphics, the group set up a crude test bench for simulating and testing their attack payloads. SOCIAL ENGINEERING Social engineering means manipulating people into giving up confidential information. It is one of the most effective attack vectors because it exploits natural human behavior and our tendency to trust one another. It is often said that the human factor is the weakest link in cyber security. In order to distribute the attack payload, the newly changed software would need to be downloaded onto the PLCs and safety controllers. This proved to be much easier said than done. Segnen was running a 24/7 operation which meant that the controllers couldn’t be taken offline or stopped for the code change. Performing this kind of operation would risk the attackers getting caught. After intensive testing, the group learned that by changing just small parts of the code in specific code blocks and extending the existing variable in data blocks, the controllers wouldn’t need to be stopped. The new code could be downloaded onto the controller, and it would start running during the next execution cycle. 16 THE INDUSTRIAL CONTROL SYSTEM CYBER KILL CHAIN STAGE 1 -IT 17 THE INDUSTRIAL CONTROL SYSTEM CYBER KILL CHAIN STAGE 2 -ICS 18 PHASE 6 - ICS ATTACK To maximize the impact, and make it extremely hard for the Segnen mill workers to pinpoint the problem, Number One opted to attack multiple parts of the pulping process while using the normal fluctuations to hide the attack. contained an additional payload used for varying the process parameters. The HMIs used by the plant operators were also updated with interfaces featuring values that were simulated directly within the code rather than coming from plant sensors. The quality control system parameters were changed so that instead of using static values, the parameters were taken from a text file that was updated by a hidden process running on the quality control system server. The plan: vary the temperatures used in the cooking process, offset the balance of chemicals and distort the readings of the quality control system at random intervals. The fluctuations in cooking temperature and distorting the quality control system readings would affect the quality of the end product, resulting in waste, quality problems and reputational damage. Offsetting the balance of the chemicals, especially the sulfidity, would result in larger sulfurous gas emissions. Pollution or fines from the environmental protection agency would, in turn, cause reputational damage. The deployment went smoothly, except for the safety instrumentation system. Due to recent attacks against the safety controllers, Eric, the control systems engineer, had used a physical key attached to the safety controllers and put them into run only mode. This prohibited anyone making software changes without physically turning the key. Although Number One’s attack code was now running, the safety controllers might limit the changes made by the attack code. Launching the attack Three months after the initial breach of Pulp Global’s systems, Number One finally launched the carefully crafted attack. Number One and the crime group went back to the drawing board to figure out a way to fool the safety controllers and prevent them from interrupting the parameter changes. The attack code was left running. First the PLCs were reprogrammed with new code that 19 Random fluctuations For the next week or so, Number One worked on revising the code and devising ways to get around the safety controllers. Meanwhile, the Segnen mill began to experience strange problems with the quality of the pulp and arbitrary fluctuations in the control system parameters. The control systems engineers, including Eric, tried furiously to find the cause of these random fluctuations. It wasn’t long before one of the vendors called to aid them in the hunt. The vendor had noticed that the quality control system was running a hidden process that shouldn’t be there. They had tried stopping the process and even restarting the server, but the hidden process persisted. The vendor representative copied the executable file from the host and sent it back to their IT team for further analysis. The file was also sent to a security company the vendor had worked with in the past to analyze potentially malicious files. in the control system networks many times before, due to employees using their own laptops for conducting changes or contractors bringing new software on removable media. Thinking this must be another case of commodity malware, Martin instructed the mill to continue normal operations. Eric investigates further Eric didn’t give up easily. He decided to log on to some other hosts to see if anything else appeared to be amiss. And there was: he noticed a huge number of alerts caused by one of the safety controllers on a valve. The control values were out of the allowed range. The safety system was overriding the valve control to make sure it wouldn’t enter into an area of possibly damaging conditions. The earliest alerts dated back to about a week, with a few going back as far as two weeks. Prior to that, there had been zero alerts throughout the entire five year uptime of the safety controller. A mill under cyber attack The security company performed an analysis and notified the Segnen mill that the file obtained from the quality control system was a purpose-built attack tool. A thorough sweep of the production hosts should be performed, they urged, to see if any other implants were hidden in the network. Eric swiftly contacted his boss, who in turn notified Martin, the CIO of Pulp Global, that they had discovered evidence of the mill being under some kind of an attack. The Segnen mill had had problems with malware and viruses “Something strange is going on,” Eric thought. He just didn’t know exactly what. He logged on to the engineering workstation used to program the safety controller, and began poring through the code used to control the specific part of the process. But as he was reviewing the original source code stored in the project files, he found nothing amiss. Leaving the development environment open, he exited the control systems lab, puzzled. A few days later, Eric still hadn’t shaken the feeling that something was wrong. Systems that were normally reliable were now acting in very sporadic manner, seemingly without any reason. 20 “We’ve been detected!” Within two hours, the Segnen mill was completely halted. The pulp cooking process had to be taken down using a manual override, a process that can take weeks to bring back running once stopped. Meanwhile, Number One had also logged on to the engineering workstation used to program the safety controllers. He saw the development environment open with the very same part of the code they’d been trying to circumvent for the better part of a week. However, this was the least of Pulp Global’s worries. Almost all of the Windows hosts within the mill were wiped clean. Nearly 50 controllers, from two of their main vendors, summered a similar fate. Only a few controllers from different providers remained unaffected. “Someone has spotted us. What do they know? How did they find us?” Number One asked in an emergency meeting with the rest of the crime group. He demanded to know why their operation had all of a sudden been noticed. What could the group still do to inflict maximum damage with the foothold they still had? The attack hits the news The situation was worsening. The mill personnel, unable to perform any work, began to post social media pictures of blank control room displays. The Facebook posts were quickly noticed by reporters scouring social media for interesting topics. The crude backup plan “Time to say bye-bye to the Segnen mill operations,” muttered Number One as he sent a command to all of the compromised hosts. Eventually the news of the breakdown at the Segnen mill reached CIO Martin – but it wasn’t via Pulp Global personnel. He was called by a reporter looking for a comment regarding the cyber attack that had wiped out everything at the Segnen mill. The hosts began running commands to wipe as many other hosts as possible, including downloading bogus blank software onto the controllers running the plant, restoring the switches and routers to factory default settings and formatting the hard drives of every possible host and server. 21 PHASE 7 - AFTERMATH After the call from the reporter, Martin contacted Segnen to find out what had happened and how bad the situation was. But the mill was in such upheaval that it was impossible to get anyone to stay on the phone for more than a minute. 22 Forensic team gets to work Martin was overwhelmed. Pulp Global had no plans or procedures to guide him in dealing with a cyber incident. There were no established policies, processes or guidelines on recovery, and no internal or external communications plans. He was getting questions from the board, the corporate employees, the mill staff, his IT team and reporters – questions he couldn’t answer. With no experience in dealing with a cyber incident, the CIO was in over his head. The cyber security company began to investigate the attack with help from the authorities and the local CERT. But due to devices and drives being wiped out at the Segnen mill, the forensic analysis was extremely difficult. Log files and other useful information were almost impossible to find. The forensic analysts soon abandoned the Segnen mill, as it would take days to get anything useful out of the wiped hosts. Instead, they decided to turn their focus on other systems. Martin knew he had to call in external help to handle the situation. He asked the vendors supplying the Segnen mill to send first responders on-site immediately. The hunt was on. Law enforcement began investigating the mill because of the possibility of the attack being an insider job. The computer forensic analysts turned their attention to the corporate systems, as they were still fully operational. If the attack wasn’t conducted by an insider, the adversaries were likely coming in via the corporate network. The extortion Just when Martin thought things couldn’t get any more dire, he received a phone call from the CEO who had just received a threatening email. Ransom deadline is approaching “Segnen mill was only the beginning,” the email read. “If you don’t comply with our requests, this could get very expensive for you. Below you will find a cryptocurrency wallet address where you need to deposit 600,000 euros by the end of the day or we will start taking down your mills one by one until you don’t have any business left.” With just four hours to go until the ransom deadline, the forensics team found that the corporate Active Directory was completely taken over by the attackers. This meant they had nearly limitless possibilities to attack other targets within Pulp Global. There were still 11 hours before the end of the day. Pulp Global alerted the authorities and the local CERT, and enlisted a cyber security company to work on containing the attack. Meanwhile, the board of directors called an emergency meeting to decide what to do about the ransom. The forensics team, with the help of Pulp Global’s network and infrastructure teams, began to isolate and segment the network. They aimed to limit the access of the adversaries while being careful not to draw attention to their efforts. By the time the ransom deadline expired, the incident responders were confident that they had managed to contain the attack. They had been able to segregate the network, thus avoiding paying the ransom. 23 The return of Number One An hour had passed after the ransom deadline and nothing had happened. The forensics team were closely monitoring any actions on the network. The Segnen mill staff were busy recovering systems from any backups they could find. Two hours after the deadline passed, the forensics team noticed someone accessing the MES system server using domain administrator credentials through a VPN. A quick check confirmed it wasn’t anyone within Pulp Global. It was the adversaries, returning to wreak havoc again. The adversaries exposed The forensics analysts logged each of the adversaries’ actions and every network packet they sent. They wanted to find out what the attackers were after, how they were accessing the systems and whether they had any ongoing processes running. Once in the system, the adversaries used a process running with system privileges to send commands to hosts within another mill’s production network. The forensics team began to search for the same process running on other possibly compromised hosts. Bingo: the investigators found that the same remote access trojan had been deployed to many other machines. Now the responders knew what to look for. Even better, the trojan kept an easily decryptable log file of all of the actions performed. Some of the actions were automated, as the adversaries likely wanted to have access to the output run by the command – in case the host would lose internet connectivity, it could send the results at a later stage. Crisis communications As the incident response and forensics investigations continued, the CEO and board worked on a communications plan towards employees, Pulp Global’s client base and the media. Once the CEO had released the statement, Pulp Global’s share price plummeted more than ten percent within a single day. The share price wasn’t the only problem. Unhappy customer companies started to demand compensation from Pulp Global due to the delays the Segnen mill outage would cause, some going as far as threatening legal action. The local authorities initiated their own investigations into the environmental, safety and health hazards possibly caused by the abrupt stop of mill operations. 24 Recovery Once the attack was successfully contained, it took Pulp Global nearly three months to recover all operations and to search for and eradicate all backdoors from multiple hosts. All told, the attack ended up costing Pulp Global a significant percentage of their yearly revenue. Although the direct cost of the forensics, equipment and labor were in the millions, the biggest costs were the ones that aren’t so easily measured: the loss of customer and investor confidence. It took nearly a year to regain the confidence of customers and investors, and deal with the authorities regarding the safety and health hazards. TIMELINE OF PULP GLOBAL’S CYBER ATTACK DEFENDER ATTACKER 25 ABOUT F-SECURE Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections. F-Secure’s sophisticated technology combines the power of machine learning with the human expertise of its worldrenowned security labs for a singular approach called Live Security. F-Secure’s security experts have participated in more European cyber crime scene investigations than any other company in the market, and its products are sold all over the world by over 200 broadband and mobile operators and thousands of resellers. Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd. www.f-secure.com 29