Uploaded by G. P.

stuxnet

advertisement
The Stuxnet
Outbreak
TABLE OF CONTENTS
01
02
03
Stuxnet? Is it a sci fi movie?
•
•
What are we talking about?
What is a computer worm?
The incredible journey of a “not so” little worm.
•
•
From Windows vulnerabilities to Iranian targets
Was the attack successful?
What did we learn from this attack?
•
•
Who were the super villains?
What can we do against cyber-attacks?
TABLE OF CONTENTS
01
02
03
Stuxnet? Is it a sci fi movie?
•
•
What are we talking about?
What is a computer worm?
The incredible journey of a “not so” little worm.
•
•
From Windows vulnerabilities to Iranian targets
Was the attack successful?
What did we learn from this attack?
•
•
Who were the super villains?
What can we do against cyber-attacks?
Stuxnet? Is it a sci fi movie?
What are we talking about?
• Stuxnet is a malicious computer worm
• It targets supervisory control and data acquisition (SCADA) systems, and
more specifically programmable logic controllers (PLCs)
• Responsible for causing substantial damage to the nuclear program of Iran,
as it ruined almost one-fifth of Iran's nuclear centrifuges
• Cyberweapon built jointly by the United States and Israel in a collaborative
effort known as Operation Olympic Games
Stuxnet? Is it a sci fi movie?
What is a computer worm?
• Standalone malware computer program that replicates itself in order to
spread to other computers
• Often uses a computer network to spread itself, relying on security failures
on the target computer to access it
• Uses this machine as a host to scan and infect other computers, to spread
as widely as possible
• Uses recursive methods to copy themselves without host programs and
distribute themselves to infect more and more computers in a short time
TABLE OF CONTENTS
01
02
03
Stuxnet? Is it a sci fi movie?
•
•
What are we talking about?
What is a computer worm?
The incredible journey of a “not so” little worm.
•
•
From Windows vulnerabilities to Iranian targets
Was the attack successful?
What did we learn from this attack?
•
•
Who were the super villains?
What can we do against cyber-attacks?
The incredible journey of a “not so” little worm
From Windows vulnerabilities to Iranian targets
• Stuxnet does little harm to computers and networks that do not meet
requirements, it’s a marksman's job
 Very unusual precision
• Makes itself inert if targeted software is not found on infected computers and
contains safeguards to prevent too fast spreading
 Very unusual behavior
• Contains code for a man-in-the-middle attack that fakes industrial process
control sensor signals, so an infected system does not shut down due to
detected abnormal behavior
 Very unusual complexity
The incredible journey of a “not so” little worm
From Windows vulnerabilities to Iranian targets
Stuxnet consists of a layered attack against three different
systems :
 The Windows operating system
 Siemens PCS 7, WinCC and STEP7 industrial
software applications that run on Windows
(SCADA systems = software)
 One or more Siemens S7 PLCs (programmable
logic controller = hardware)
The incredible journey of a “not so” little worm
From Windows vulnerabilities to Iranian targets
The Windows infection
• Unprecedented four zero-day attacks (plus 2 vulnerabilities)
 Very unusual as zero-day are highly valued (60k – 2,5M $)
• Use of infected removable drives such as USB flash drives which contain Windows shortcut
files to initiate executable code
 To penetrate private networks
• Has both user mode and kernel mode rootkit ability under Windows and its device drivers
have been digitally signed with the private keys of two public key certificates that were stolen
 Drivers successfully installed without users being notified
• Two websites in Denmark and Malaysia were configured as C2 servers for the malware,
allowing it to be updated and to upload information
 To perform industrial espionage
The incredible journey of a “not so” little worm
From Windows vulnerabilities to Iranian targets
The Step 7 software infection
• Stuxnet infects project files belonging to Siemens' WinCC/PCS 7 SCADA control software
(Step 7), and subverts a key communication library of WinCC (s7otbxdx.dll)
• Intercepts communications between the WinCC software and the Siemens PLC devices when
the two are connected via a data cable
• Installs itself on PLC devices unnoticed and masks its presence from WinCC if the control
software attempts to read an infected block of memory from the PLC system
 zero-day exploit in the WinCC/SCADA database software in the form of a hard-coded
database password (plain text password in source code)
The incredible journey of a “not so” little worm
From Windows vulnerabilities to Iranian targets
The Siemens S7 PLC infection
• Stuxnet attacks PLC systems with variable-frequency drives from two specific vendors :
Vacon (Finland) and Fararo (Iran)
• Monitors the frequency of the attached motors, and only attacks systems that spin between
807 Hz and 1,210 Hz (typical frequency of gas centrifuges)
• Installs malware into a memory block (DB890) of the PLC and periodically modifies the
frequency to 1,410 Hz and then to 2 Hz and then to 1,064 Hz, changing their rotational speed
• Installs a rootkit that hides the malware on the system and masks the changes in rotational
speed from monitoring systems
The incredible journey of a “not so” little worm
The incredible journey of a “not so” little worm
Was the attack successful?
Natanz nuclear facilities
• First identified in mid-June 2010 by security company VirusBlokAda and first press blog
about the worm in July 2010 by journalist Brian Krebs
• In September 2010, experts and specialists are convinced that Stuxnet was meant to
sabotage the uranium enrichment facility at Natanz
• In November 2010 it was announced that uranium enrichment at Natanz had ceased several
times because of a series of major technical problems
• In December 2010, a major report says that Stuxnet may have destroyed up to 1,000
centrifuges (10 percent) between November 2009 and late January 2010
 it may be harder to destroy centrifuges by use of cyber attacks than believed
The incredible journey of a “not so” little worm
Was the attack successful?
Iranian reaction
• Iranian officials declared in September 2010 that Western intelligence agencies had been
attempting to sabotage the Iranian nuclear program for some time
• "An electronic war has been launched against Iran... This computer worm is designed to
transfer data about production lines from our industrial plants to locations outside Iran.“
• Iranian engineers were successful in neutralizing and purging Stuxnet from their country's
nuclear machinery by December 2010
 Given the growth in Iranian enrichment ability in 2010, the country may have
intentionally put out misinformation to cause Stuxnet's creators to believe that the
worm was more successful than it was
TABLE OF CONTENTS
01
02
03
Stuxnet? Is it a sci fi movie?
•
•
What are we talking about?
What is a computer worm?
The incredible journey of a “not so” little worm.
•
•
From Windows vulnerabilities to Iranian targets
Was the attack successful?
What did we learn from this attack?
•
•
Who were the super villains?
What can we do against cyber-attacks?
What did we learn from this attack?
Who were the super villains?
• Experts believe that Stuxnet required the largest and costliest development effort in
malware history
• Team of highly capable programmers, in-depth knowledge of industrial processes, and
an interest in attacking industrial infrastructure
• The complexity of the code indicates that only a nation-state would have the abilities to
produce it
• Ralph Langner, who identified Stuxnet infected PLCs, said in 2011: “The Mossad is
involved, but the leading force is not Israel. The leading force behind Stuxnet is the
cyber superpower – there is only one; and that's the United States."
What did we learn from this attack?
Who were the super villains?
• Israel has not publicly commented on the Stuxnet attack, but in 2010 confirmed that
cyberwarfare was now among the pillars of its defense doctrine
• When questioned whether Israel was behind the virus in the fall of 2010, some Israeli
officials broke into "wide smiles“, fueling speculation
• Gabi Ashkenazi, retiring Israel Defense Forces (IDF) Chief of Staff, showed videos including
references to Stuxnet at his retirement party to celebrate his operational successes
What did we learn from this attack?
Who were the super villains?
• The United States, under one of its most secret programs, initiated by the Bush
administration and accelerated by the Obama administration, has sought to destroy Iran's
nuclear program by novel methods such as undermining Iranian computer systems
• A diplomatic cable obtained by WikiLeaks showed how the United States was advised to
target Iran's nuclear abilities through covert sabotage
• John Bumgarner, a former intelligence officer and member of the United States CyberConsequences Unit (US-CCU), published an article prior to Stuxnet being discovered, that
cyber attacks are permissible against nation states which are operating uranium enrichment
programs that violate international treaties
• Bumgarner pointed out that the centrifuges used to process fuel for nuclear weapons are a
key target for cyber operations and that they can be made to destroy themselves by
manipulating their rotational speeds
What did we learn from this attack?
What can we do against cyber-attacks?
Industrial Control System (ICS) Cybersecurity (SCADA security)
• International standards for cybersecurity in industrial automation (IEC 62443, NERC, NIST)
along with best practice guidelines published by major organizations
 Definition of standard processes, techniques and requirements
 Providing direction and guidance for control system end-users
• Prevention requires a multi-layered approach, often termed defense in depth
 Personnel (Policies and procedures, Awareness and training)
 Infrastructure (Access control measures, physical security measures)
 Network management (Network segmentation, system hardening, patch management)
 Network monitoring (System monitoring, anti-virus and intrusion prevention system)
• Starting with cyber security audit for companies
 Risk analysis and a control system security assessment
What did we learn from this attack?
What can we do against cyber-attacks?
The French national digital security strategy
• Led by ANSSI, this strategy is designed to support the digital transition of French society
and carries risks for the State, economic stakeholders and citizens
 Cybercrime, espionage, propaganda, sabotage and excessive exploitation of
personal data
• Collective and coordinated response based on five strategic priorities :
 Fundamental interests (State information systems and critical infrastructures,
essential operators to the economy and society)
 Citizen rights (Digital trust, privacy, personal data)
 Education (Awareness raising, initial training, continuing education)
 Economy (Environment of digital technology businesses, industrial policy, export
and internationalization)
 Sovereignty (Europe, digital strategic autonomy, cyberspace stability)
TABLE OF CONTENTS
01
02
03
Stuxnet? Is it a sci fi movie?
•
•
What are we talking about?
What is a computer worm?
The incredible journey of a “not so” little worm.
•
•
From Windows vulnerabilities to Iranian targets
Was the attack successful?
What did we learn from this attack?
•
•
Who were the super villains?
What can we do against cyber-attacks?
It’s time to conclude
The Stuxnet Outbreak
• Malicious computer worm that targets SCADA systems and caused substantial damage to
the nuclear program of Iran
• It may have been the most sophisticated piece of malware ever written, and surely required
the largest and costliest development effort in malware history
• It was a truly offensive cyber weapon, and a significant escalation in the capability to
conduct complex operations in a cyber warfare environment
• Probably built jointly by the United States and Israel in a collaborative effort known as
Operation Olympic Games
Thank you for your attention
Do you have any questions?
Download