Uploaded by terlbrown

Russian Cyber Attack Escalation in Ukraine - What You Need To Know

advertisement
Russian Cyber
Attack Escalation
in Ukraine
2
Agenda
 Welcome and Overview – Rob Lee
 Russia’s Cyber Capabilities – Kevin Holvoet
 Current Russian Cyber Capabilities – Jake Williams
 Critical Infrastructure in Conflict – Tim Conway
 Q&A – Rob Lee and Panel
Russia’s Cyber
Capabilities –
Kevin Holvoet
Resources: sansurl.com/ukrainecybercrisis
APTs mapped on Russia’s Security & Intelligence Services
Image: https://xorl.wordpress.com/
4
Resources: sansurl.com/ukrainecybercrisis
APTs mapped on Russia’s Security & Intelligence Services
•
Large amount of Advanced activity
groups
•
Attributed to difference departments
and sections of Russian security &
intelligence services
•
GRU/FSB uses cyber criminal and
hacktivist groups
•
Sharing of information, tools,
guidelines, how-to’s between
departments
=> Partners or Competitors?
Image: https://xorl.wordpress.com/
5
Resources: sansurl.com/ukrainecybercrisis
What have we seen so far?
Important activity groups to track
•
Sandworm (GRU): Destructive attacks since at
least 2009
•
APT28 (GRU): Espionage since 2004
•
APT29 (SVR): Espionage since 2008
•
DEV-0586
•
Gamaredon: Targets Ukrainian government
officials and organizations, aligned with Russian
interests.
•
•
•
15 Jan 2022: Destructive attack with
WhisperGate Wiper
Operates out of Crimea?
Buhtrap
6
Resources: sansurl.com/ukrainecybercrisis
What have we seen so far?
Cyber Attacks
•
DDoS on Government, Military, Financial, Telco
•
Destructive wipers: WhisperGate (13 Jan 2022),
HermeticWiper (22 Feb 2022)
•
Espionage: Ukraine, also internationally
•
CISA Alert (AA22-047A)
Defacement of websites
•
•
Supply chain attacks (Kitsoft)
•
Influence operations / Disinformation using
SMS message, social media, and other media
•
BEWARE of False Flag operations!!
7
Resources: sansurl.com/ukrainecybercrisis
MITRE ATT&CK® - Overlap matrix for important APT groups
8
Resources: sansurl.com/ukrainecybercrisis
Resources to follow the situation
•
CERT-UA: https://cert.gov.ua/articles
•
National CERT website, e.g.: CISA
→
→
Alerts: https://www.cisa.gov/uscert/ncas/alerts
Known exploited vulnerabilities catalog:
https://www.cisa.gov/known-exploitedvulnerabilities-catalog
•
SANS Internet Storm Center:
https://isc.sans.edu/
•
Public media outlets – Follow geopolitical
situation
•
MITRE ATT&CK® – Find info on groups,
malware, TTPs and possible defences
•
CIS Controls:
https://www.cisecurity.org/controls/ciscontrols-list
9
Resources: sansurl.com/ukrainecybercrisis
Conclusion
•
Russia is a powerful cyber actor
•
Not afraid to combine different
coordinated attacks in cyber space and
physically to meet its strategic
objectives
•
Long-term experience and building
offensive cyber capabilities since at
least 1996 (Moonlight Maze)
•
Uses many different TTPs in their attacks
•
Most attacks on Ukraine, but collateral
damage threat is real (NotPetya)
•
We have to prepare our defenses and
share information with the community!!!
10
Current Russian Cyber
Activity – Jake Williams
Resources: sansurl.com/ukrainecybercrisis
"Hacktivists" (or Cybercriminals)
•
"Free Civilian" has been busy
→
→
•
Their dark web site is claiming data of
Ukrainian citizens for sale
The claim to have sold some data is
interesting (though unconfirmed)
These are large dumps
→
→
But the data is unconfirmed
Expect to see more claims of data
dumps
– Makes Ukraine appear weak
– Distracts from other ongoing attacks
– Demonstrates "private actors" are responsible
for attacks on Ukrainian infrastructure
12
Resources: sansurl.com/ukrainecybercrisis
Wiper Malware Operationalizes Signed Device Drivers
•
Russia has operationalized signed device drivers for wiper malware now on
multiple occasions
→
→
2015 Ukraine attack on power industry used KillDisk device driver
This week's HermeticWiper used drivers from EaseUS Partition Master
•
The first observed HermeticWiper sample was compiled on December 28, 2021
and used a stolen digital certificate (now revoked) from Hermetica Digital Ltd
•
Another observed sample (61b25d11392172e587d8da3045812a66c3385451) was
compiled February 23rd, 2022
→
•
Russian threat actors are quickly retooling
If your tooling supports it and you consider yourself high risk for wiper
operations, consider preventing the loading of unknown device drivers
13
Resources: sansurl.com/ukrainecybercrisis
Domains Used
•
•
Multiple domains have been
operationalized already
Most are recent registrations
Domain
Registration Date
kfctm[.]online
2022-01-28
my.cloud-file[.]online
2021-11-23
my.mondeychamp[.]xyz
2021-06-25
files-download.infousa[.]xyz
2021-05-14
download.logins[.]online
2018-02-08 (created)
2022-02-07 (updated)
surname192.temp.swtest[.]ru
2013-12-13 (created)
2022-02-23 (updated)
deer.dentist.coagula[.]online
declaration.deed.coagula[.]online
2021-02-15
14
Resources: sansurl.com/ukrainecybercrisis
Scans/Attacks Against Ukrainian IP Space
•
GreyNoise is providing a free feed of IP
addresses that are only observed targeting
their sensors in Ukrainian IP space
→
•
These IP addresses may be reused in later
operations
The data is separated by IPs that may be
spoofed and those that competed a TCP
handshake (not spoofed)
→
Both CSVs and enriched feeds are available
api[.]greynoise[.]io/datashots/ukraine/manifest.json
15
<Course Code> | <Course Name>
"Don't Get Maersk'ed"
•
Collateral damage from the 2017 NotPetya attacks
demonstrated the extent to which unfiltered B2B VPNs
connect infrastructure around the world
→
Sadly, the situation has not improved much today
Protocol
TCP Port
SSH
22
MSRPC
135
SMB
139/445
•
Any mass-spillover event will rely on automated propagation
LDAP
389
1433
•
Action items:
MSSQL
RDP
3389
WinRM
5985/5986
→
Inventory your B2B VPNs
→
Block high risk protocols on all B2B VPNs
→
→
→
If specific business requirements demand them, limit traffic
destinations for high-risk protocols
Implement netflow monitoring at all egress points
Have contingency plans in place to disconnect B2B VPNs,
particularly those that are high risk
16
Resources: sansurl.com/ukrainecybercrisis
Russian Targeting of US/EU Industry
•
Evaluate threats as the intersection of Intent,
Opportunity, and Capability
→
→
→
Capability: Russian government threat actors have
capabilities, but not an infinite supply - every impact burns
another capability, they must be used where impact matters
Opportunity: we control this, but assume realistic
opportunities for impact exist
Intent: Russian government operators are REALLY busy
right now with important government targets. Hacktivists on
the other hand have time to kill
•
Use time today to bolster defenses and visibility
•
Pro-Russian hacktivists are more likely to target US
and EU organizations in the next ~week (maybe more)
Intent
Opportunity
Capability
17
Resources: sansurl.com/ukrainecybercrisis
Russian Targeting of US/EU Industry - Likely Targets
•
If retaliatory cyberattacks are performed on US/EU
industry by the Russian government, they will need to
balance the following:
1.
2.
3.
4.
5.
•
Targets that cause disruption, undermining public support
for actions against Russia
Will not be seen as an act of war by the victim
Does not burn capabilities that cannot be easily replaced
Will not limit future intelligence collection against the target
Is not a target Russia will want to impact if US/EU escalates
The intersection of these points leaves a fairly narrow
set of targets to impact
→
While attacks on utilities and hospitals in the US are certainly
possible, these both likely violate #2 (and #5 for utilities)
18
More Likely
Financial Services
Educational Institutions
Retail
State & Local Government
Smaller Federal Agencies
Less Likely
Utilities
Healthcare
Defense Contractors
Transportation
Critical Infrastructure
in Conflict – Tim Conway
20
IT – Information Technology and OT Operational Technology
Data at rest, data in motion, and
data in use
Data that does something in the
physical world – kinetic component
Events Analysis Lessons Learned
Estonia
Election
Ukraine
Confidence
Georgia
Crimea
UKR2015
UKR2016
TRISIS
Chlorine
Not Petya
Solarwinds
VPNfilter
Capabilities
Control
2015 Ukraine Attack Summary
3
Utilities Attacked
225 K
3.5 hr
100’s
10’s
Customer Outages
Server and Workstation
Damage
Outage Duration.
Field Device
Damage
135 MW
Load impact
50
Substations Impacted
Highly Coordinated and Orchestrated Attack
IT Preparation
• Target selection
• Unobservable target
mapping
• Malware development
and testing
Sequence Pre Work
Hunting and Gathering
• Lateral Movement and
Discovery
• Credential Theft and VPN
access
• Control system network and
host mapping
• Establish Remote
connections to operator
HMI’s at target locations
• Prepare TDoS dialers
Hrs.
Attack Position
Event
• Unobservable malicious
firmware development
• Unobservable DMS
environment research
and familiarization
• Unobservable attack
testing and tuning
• Issue breaker open
commands
• Modify field device
firmware
• Perform TDoS
• Scheduled UPS and
KillDisk
min
ICS Preparation
hrs.
• Delivery of phishing
email
• Malware launch from
infected office
documents
• Establish foothold
• Upload additional attack
modules - KillDisk
• Schedule KillDisk wipe
• Schedule UPS load
outage
6 mo
9 mo
12 mo
Spear phishing
Attack Launch
Target Response
• Connection sever
• Manual mode / control inhibit
• Cyber asset restoration
• Electric system restoration
• Constrained operations
• Forensics
• Information sharing
• System hardening and prep
2016 Ukraine Attack Summary
1
Trans Co. Attacked
TBD
1.25 hr
TBD
TBD
Customer Outages
Server and Workstation
Damage
Outage Duration.
Field Device
Damage
200 MW
Load impact
1
Substation(s) Impacted
Malware Discovery Associated with Electric Outages
Malware Role
2015
2016
Malware Role
Highly Targeted
Highly Coordinated
Electric System Impacts
Significance
Ukraine
Electric System
Cyber Events
Substations
Customers
2015
50+
225K
MW Impact
135 MW
2016
1
Portion of
Capitol region
200 MW
Modular and Customizable
Significance
Past, Present, and Future
• Ongoing coordinated cyber &
• Positioning, capability validation,
effects-based attacks
physical attacks
• Targeted service outages and
• Critical Infrastructure impacts
equipment damaging attacks
enabling invasion and entrenchment
Prepare for ICS damage at scale
Disruption, operations impacts, equipment overwrites and bricking of
embedded systems
Remote
Access
Controllers
Industrial
Protocols
Actuators
HMIs
Instruments
Networks
ICS
Files
IO
Fieldbus
Industrial
Wireless
Converters
Meters
Operational Response
System operators are continuously trained to ensure system reliability and how to respond in
emergencies to recover from outages. The cyber operators who support the underlying technologies
need to be trained in this way as well and integrate operations into all phases of the response plan.
Preparation Identification Containment Eradication
Practice IR
through
exercises
Train the
team
Evidence
acquisition
and analysis
Information
sharing
internal and
external
 Determine
where an
adversary
would need to
be to achieve
the effect
 isolate the
system or
isolate control
Verify the
root cause
or initial
infection
point that
impacted
operations
was
identified
Recovery
 Regain
integrity of
control
system
 Determine
when to
restore
system
control
capabilities
Lessons
Learned
 What actions
were taken to
prevent
similar attack
 Was
information
shared
effectively
SANS ICS | sans.org/ics
Wrap Up – Tim Conway
Resources: sansurl.com/ukrainecybercrisis
What about the Human Side?
•
Continue to focus on the fundamentals. While the sense of urgency has
changed, how people are targeted has not. Focus your security training and
communications on
→
→
→
Phishing
Passwords
Updating
•
Let your workforce know that these three steps will go a long way in protecting
themselves both at work and at home
•
People are scared - keep your communications calm, simple and actionable
32
Resources: sansurl.com/ukrainecybercrisis
Additional Resources
•
Resources:
sansurl.com/ukrainecybercrisis
•
Ongoing & Updated Resources
SANS is authoring and distributing
for the community during the
ongoing crisis
33
Q&A
Resources:
sansurl.com/ukrainecybercrisis
Download