Presentation

advertisement
15 August 2012
1
Thank you for your interest in this presentation!
These slides combine my original research with data sources
as cited in the slide notes area. You are welcome to cite my work,
but please do not re-post this presentation online without my permission.
Thank you!
Betsy Woudenberg
betsy@intelligencearts.com
SCADA Right Now
Betsy Woudenberg, Co-founder
This presentation is © 2012 by IntelligenceArts, LLC.
2
What we’re talking about
Control systems
Industrial control systems
(ICS)
Manufacturing
Critical
infrastructure
DCS
Distributed Control Systems
Other control systems
Facility control
SCADA
Supervisory Control and Data
Acquisition
Power
Oil & gas
Water
3
The SCADA industry
• People are expensive, but computers are cheap.
▫ Commercial and profit-driven
▫ A truly global industry
• Idiosyncratic
▫ Few standards
▫ New processes bolted on to existing facilities
• Pragmatic and functional
▫ Built to last
▫ Early systems are still running
4
Basic SCADA structure
HMI software
A few Human-Machine Interfaces (HMI)
(computer screens and buttons for people)
HMI “Lightboard”
Many Programmable Logic Controllers (PLC)
HMI device
(watching system and making routine decisions)
PLC
RTU
Hundreds of Remote Terminal Units (RTU)
(reading sensors and controlling valves and switches)
The process: Many thousands of valves, switches,
and sensors (temperature, pressure, flow, etc)
RTU
5
Modern enterprise SCADA
Corporate headquarters
Executives,
salespeople,
travelers
Business or
Corporate
network
Regional office
Facility front office
“Support services”
Human-Machine Interface (HMI)
Engineers and
vendors with dial-in
or Internet access
Programmable Logic Controllers (PLC)
Remote Terminal Units (RTU)
Valves, switches, and sensors
Operations or
SCADA
network
(“SCADAland”)
Field
devices
6
SCADA systems today: Two worlds
Corporate headquarters
Regional office
Facility front office
Human-Machine Interface (HMI)
Programmable Logic Controllers (PLC)
Remote Terminal Units (RTU)
Valves, switches, and sensors
7
How to attack SCADA systems
8
What you will need
Access
+
Expertise
The capability to issue
commands to the SCADA system
•
•
•
•
•
Hack into the system
Recruit an insider
Steal an insider’s credentials
Place a software tool
Place modified equipment
Proficiency with the SCADA
system to produce an effect
•
•
•
•
•
Survey the system
Select an effect you can produce
Experiment and practice
Defeat countermeasures
Stay hidden?
9
Access: Technical targets
Corporate headquarters
Corporate network
Remote
users
Regional office
Facility front office
Support services
•
•
•
•
•
Microsoft Windows
Internet protocol
Email and HTTP
Passwords, encryption
Element-level security
Human-Machine Interface (HMI)
SCADAland
•
Programmable Logic Controllers (PLC)
Remote access
modems
•
Remote Terminal Units (RTU)
•
•
Valves, switches, and sensors
•
•
Analog and digital
signals
Wired and wireless
transport
Proprietary protocols
Clear-text
communications
Serial interfaces
Perimeter security
10
A question of priorities
Information security
SCADA
• Confidentiality
• Integrity
• Authenticity
•
•
•
•
•
•
•
Worst case scenario:
Data Loss
Security Breach
Integrity
Availability
Resilience
...
…
Authenticity
Confidentiality
Worst case scenario:
Loss of View
Loss of Control
11
Access: Human targets
The owners
Executives
Investors
People who
own it
Administrators
Managers
IT security
The operators
Managers
People who
run it
Engineers
Maintenance
Security
Corporate headquarters
Regional office
Facility front office
Human-Machine Interface (HMI)
Programmable Logic Controllers (PLC)
Remote Terminal Units (RTU)
Valves, switches, and sensors
Designers & suppliers
Planning engineers
Process engineers
People
built it
SCADAwho
engineers
Construction co.
Supply chain vendors
SCADA system
vendor
12
Access in review
• SCADA systems rely on perimeter security.
▫ SCADA systems and equipment do not follow
“standard” security conventions.
▫ Most (anecdotally, all) SCADA systems have some
communications channel to the outside world.
• SCADA systems are surrounded by people.
▫
▫
▫
▫
Owners: At the corporate level
Operators: Hands-on access
Designers: Schematics and equipment lists
Don’t forget the SCADA system vendors, supply chain,
maintenance, security…
13
Expertise
The more damage you do, the more likely you’ll get caught.
Damage
Clandestinity
Nation-state
actors, crafty
insiders, and
other people
who don’t
want to get
caught
Hackers,
amateurs, and
other people
Terrorists
who don’t
think they will
get caught
14
Expertise: Selecting a process
Objective:
Shut off power to this city
15
Expertise: Achieving your objective
• The process: What you’re going to do
• The SCADA system: How you’re going to do it
• The environment: When you’re going to do it
Process
Chemistry
and physics
Process
design
SCADA
system
Environment
Vendor, software,
and equipment
Process variables
SCADA protocol
Facility variables
Defeat the system
Hide your tracks
Environmental
variables
16
Expertise: Managing human factors
• Every place has a culture.
▫ Culture derives from and determines human behavior
▫ Small problems versus Big Problems
 Be a small problem!
• People can help or hinder your attack.
▫ Understand the culture at your target facility
▫ Will “blame the human” work?
• Culture is hard to read from a distance.
▫ Find and recruit an insider… there are many!
17
Expertise in summary
• The more damage you do, the more likely you will be
caught.
▫ Many human and technical factors work against you
• Controlling SCADA requires a lot of information
about your target.
▫ What to do: The processes you need to affect
▫ How to do it: The commands you need to issue
▫ When to do it: The external factors outside your
control
• People can defeat your SCADA attack… or help you.
▫ Insider knowledge is critical to managing human
factors
18
Remember…
Access makes the attack possible
Expertise makes the attack successful
19
An overview of known cyber incidents involving critical infrastructure
control systems
20
Who is targeting SCADA?
To take
control
Intent
Goal
Evidence
Actor
To
demonstrate
capabilities
For destructive
attack
To get
information
To case a target
For economic
advantage
21
Stuxnet
• Trojan active since 2008, discovered “in the wild” in June 2010
▫ “Escaped” from its intended target in 2009
• Very effective Microsoft Windows-based “missile” carrying a
highly targeted SCADA “warhead”
USB drive
Rides a USB
drive, CD, or
DVD…
Windows PCs
Siemens SCADA
software
Siemens
SCADA
equipment
Motor
speed
controllers
Centrifuge cascades
Missile
Warhead
Delivery system
Produces SCADA effect
Lands on a
PC network
and
spreads…
Looks for HMI
software, PLCs,
and device
codes…
Is carried
onto the
Siemens
PLC…
Issues
commands
to the speed
controllers…
… and modifies the
rate of spin of the
centrifuges.
22
Stuxnet in the structure
Corporate headquarters
Regional office
Facility front office
Enters at Windows PC
running HMI software
Human-Machine Interface (HMI)
Programmable Logic Controllers (PLC)
Remote Terminal Units (RTU)
PLC directs RTUs to
direct controllers to
change speed of
centrifuge motors
Centrifuge processes
Modifies programming
Loss
of View
on the PLC
and
Loss of Control
23
Stuxnet’s effects on centrifuge spin
Drive speed in Hz
1500
Observation of
normal range
(807-1210 Hz)
Reset to higher than
normal speed
(1410 Hz)
Normal
Stress
Phase I
~ 12.8 days
Phase II
~ 27 days
Catastrophic
crash
from 1410 to 2
to 1064 Hz
Reset to
new normal
(1064 Hz)
Reset to
Higher than
normal speed
(1410 Hz)
New Normal
Stress
Phase IV
~ 27 days
Phase II
~ 27 days
1000
500
0
Phase III
15 or 50 minutes
Initial
infection
Quick note for Stuxnet fans: This is 315 code, not 417 code.
24
The Stuxnet operation
Cascades at Natanz,
2007-2012
Capacity: Total number of
cascades in place
Success: Cascades up
and running
60
40
20
2007
2008
2009 – mid 2010
Post-Stuxnet
0
Feb-07
Jul-07
Dec-07 May-08 Oct-08 Mar-09 Aug-09 Jan-10
Preparation
Decision to target
Access development
Technical survey
Tool development
Survey tool: Flame?
Stuxnet Version 1.0
Jun-10 Nov-10 Apr-11
Stuxnet Version 2.0
Mid-2009
Escape of code
to wild
June 2010
Public discovery
of Stuxnet
Sep-11 Feb-12
25
Who is targeting SCADA?
To take
control
Intent
Goal
Evidence
Actor
To
demonstrate
capabilities
To get
information
For destructive
attack
To case a target
Stuxnet
Flame
Nation-state
actors
For economic
advantage
26
South Houston
• November 2011: Springfield, Illinois announces
destruction of a water utility pump by Russian
hackers
• Subsequently proved to be mundane pump failure
▫ FBI and DHS investigated: “Russian hack” was remote
access by SCADA engineer on vacation
• Lesson learned: Examining cyber logs without
understanding SCADA culture leads to mistaken
assumptions
• But this is not our story!
27
“Second water utility reportedly hit by hack
attack”
• 18 November 2011: Hacker “pr0f” posts a message to pastebin.com
▫ Offended by FBI and DHS downplaying the Springfield “hack”
▫ Sought to highlight the vulnerabilities of control systems
28
South Houston: Yep, he got in
29
pr0f: Conscientious hacker?
• Opportunistic target
▫ No grudge against South Houston
▫ Likely used Shodan search tool to look for connected
and responsive devices
▫ South Houston had no real security set up
 This is an expression of human culture!
• “No damage was done”?
30
Shodan: “Google for hackers”
31
Who is targeting SCADA?
To take
control
Intent
Goal
To
demonstrate
capabilities
Evidence
South
Houston
Actor
Hackers
To get
information
For destructive
attack
To case a target
Stuxnet
Flame
Nation-state
actors
For economic
advantage
32
Brazil power outages
• “Hacker extortionists” behind multiple power outages in
Brazil
▫ January 2005: North of Rio de Janeiro, “tens of thousands
of people”
▫ September 2007: Espirito Santo, 3 million people
• Brazil continues to deny hacking
▫ “Our systems are not connected to the Internet”
▫ Blamed 2007 outage on weather and “sooty insulators”
• If true…
▫ Hackers followed through on threats and disrupted the
power grid
 Were outages demonstrations or escalations?
▫ Were insiders involved?
33
Who is targeting SCADA?
To take
control
Intent
Goal
To
demonstrate
capabilities
Evidence
South
Houston
Actor
Hackers
To get
information
For destructive
attack
Brazil
Criminals
To case a target
Stuxnet
Flame
Nation-state
actors
For economic
advantage
34
China and global oil & gas companies
• China is conducting a series of espionage operations
to collect information from U.S. and foreign energy
companies.
▫ Short-term: Advantage in energy deals
▫ Long-term: Less energy dependence
• Two recent well-known cyber attacks against energy
industry targets demonstrate this.
▫ Shady RAT (2006-2010)
▫ Night Dragon (2009-2011)
35
Shady RAT
Who they
targeted
From 2006 to 2011, 70 global entities including a U.S.
natural gas wholesaler from February to December 2009.
What they
stole
“… A historically unprecedented transfer of wealth—
[including] negotiation plans and exploration details for new
oil and gas field auctions, document stores, legal contracts,
supervisory control and data acquisition (SCADA)
configurations, design schematics, and much more …”
How they
stole it
“A spear-phishing email … a download of the implant
malware… backdoor communication channel … live
intruders jumping on to the infected machine … targeting
for quick exfiltration the key data they came for.”
– Dmitri Alperovitch, McAfee
36
Night Dragon
Who they
targeted
From November 2009 to early 2011, “attackers using
several locations in China … [waged] attacks against global
oil, gas, and petrochemical companies, as well as individuals
and executives in Kazakhstan, Taiwan, Greece, and the
United States to acquire proprietary and highly confidential
information.”
What they
stole
“Files of interest focused on operational oil and gas field
production systems and financial documents related to field
exploration and bidding…”
How they
stole it
“… social engineering, spear- phishing attacks, exploitation
of Microsoft Windows operating systems vulnerabilities,
Microsoft Active Directory compromises, and the use of
remote administration tools (RATs) … In certain cases, the
attackers collected data from SCADA systems.”
–McAfee
37
China’s foreign oil/gas deals and cyber attacks
Purchase of major stake in Kazakh oil company
Purchase of Rumaila oil field, Iraq, at auction
McKay River and Dover oil sands deal with Athabasca, Canada
LNG deal with QatarGas
LNG deal with QatarGas
Aggressive bidding on multiple Iraqi oil fields at auction
Purchase of major stake in a second Kazakh oil company
Shady RAT (
Night Dragon
China-Taiwan trade deal for petrochemicals
U.S.
natural
LNG deal
with QatarGas
(Kazakhstan,
Taiwan, Development of Iran’s Masjed Soleyman oil field
gasLNG deal with
Exxon
Greece, U.S.)
Oil development deal with Afghanistan
wholesaler)
Finalization of South Pars Phase 11 with Iran
LNG deal with Shell
Framework for LNG deal with Russia
LNG deal with Australia
LNG deal with Uzbekistan
LNG deal with Australia
Shale gas deal with Chesapeake Energy in Texas
LNG deal with France
2008
2009
2010
2011
2012
2013
38
Who is targeting SCADA?
To take
control
Intent
Goal
To
demonstrate
capabilities
Evidence
South
Houston
Actor
Hackers
To get
information
For destructive
attack
Brazil
Criminals
To case a target
Stuxnet
Flame
Nation-state
actors
For economic
advantage
China’s
cyber theft
China
(Economic
espionage)
39
What’s the scariest thing on here?
To take
control
Intent
Goal
To
demonstrate
capabilities
Evidence
South
Houston
Actor
Hackers
To get
information
For destructive
attack
Brazil
Criminals
To case a target
Stuxnet
Flame
Nation-state
actors
For economic
advantage
China’s
cyber theft
China
(Economic
espionage)
40
Who is/could be casing SCADA systems?
• Everyone.
▫ Terrorists
 Al Qa’ida
▫ Competitors
 Economic espionage
▫ Hackers
 For the lulz
▫ Criminals
 For profit
▫ Nation-state actors
 For covert action
▫ China
 For economic espionage
• SCADA casing is…
▫ Difficult to detect
▫ Difficult to prevent
▫ Difficult to characterize
 “Dual use”
 Illegal?
 Precursor to SCADA attack?
▫ Impossible to quantify
 Relies on victim to report it
41
Key indicators
• What’s the target?
▫
▫
▫
▫
Corporate entity: The target, or a means to an end?
SCADA vendor: Look at the customers
Facility: One place, or the whole sector?
Opportunistic exploration: Because it was there
• Who’s the attacker?
▫ Not just where it came from, but what they did
 Did the cyber activity penetrate SCADAland?
 What data did the attacker exfiltrate?
 How well does the attacker know the target?
• How far along are things?
▫ Early stages
 Access: Target research and selection
▫ Later stages
 Expertise: Drilling down to data to shape the attack
 What other information sources have been hit?
42
In conclusion
• SCADA vulnerability is a consequence of its priorities.
▫ Integrity, availability, and resilience
• For effective attack, you need access and expertise.
▫ Technology targets and human targets
• Lots of cyber activity appears to touch SCADA …
▫ Stuxnet
▫ Hackers and criminals
▫ Economic espionage
• … But it’s hard to determine precursors to SCADA
attack.
▫ Control access and monitor expertise sources
▫ Look for indicators of serious capability and intent
43
Thank you!
Betsy Woudenberg
betsy@intelligencearts.com
The entirety of this presentation is © 2012 by IntelligenceArts, LLC.
The information and insights herein are solely those of IntelligenceArts, LLC and do not derive from or represent the U.S. Government.
44
Backup slides
45
Index to backup slides
•
•
•
•
More on Stuxnet
Duqu and Stuxnet
What’s next?
Why culture matters
46
Stuxnet facts
• What it is
▫ A worm/trojan detected “in the
wild” in June 2010
• What it targeted
▫ Windows PCs running Siemens
WinCC and Step7 SCADA
software
 WinCC is a Windows-based
HMI
 Step7 (S7) runs on the PC to
configure Siemens PLCs
▫ Siemens PLCs that control two
specific high-frequency
converter drives
• How it spread
▫ Propagates by USB thumb drive,
LAN, and other close-range
techniques
▫ Four zero-day exploits for
propagation between Windows
machines
• What it did
▫ Late September 2010: 100,000
infected PC hosts worldwide
 60% in Iran
 Vacon (Finland) and Fararo
Paya (Iran)
Forensic data and credited diagrams taken from Symantec’s W32.Stuxnet Dossier, February 2011
47
Stuxnet’s purpose
• Stuxnet was a destructive clandestine attack on the uranium
enrichment centrifuge cascades at Natanz, Iran.
• Stuxnet looks for Siemens PLCs
controlling an array of 31 Vacon or
Fararo Paya converter drives
Uranium gas (UF6) centrifuge
▫ Must operate between
807-1210 Hz for ~13 days
• It then modifies the frequency output
from the drives in a repeating cycle
▫ Normal 1410 Hz  2 1064 Hz
▫ Resets timer for next round
• And it hides the drive speed changes
from the HMI
The frequency converter drive
controls the speed of the motor that
spins the centrifuge rotor
48
Stuxnet’s code
Lands on PC
Establish
Spread
Infect
Implement
Thumb drive
Check OS
version
.INF or .LNK
Look for WinCC
and S7 software
Monitor drive
output values
LAN
Get admin
privileges
Network shares
Look for specific
PLCs by ID code
Initiate timed
sequences
Digital
certificates
Decrypt and
load files
Print spooler
vulnerability
Modify S7 code
on PC
Intercept 16 of
109 routines
Phone home
and send profile
WinCC DB and
project files
Inject code onto
PLCs
Issue spoofed
data to HMI
Missile
Delivery system
Peer-to-peer
update
Warhead
Produces effect
49
Phase I: Planning
• 2006-2007: Planning and tool development
▫ Study of Iran’s centrifuges
 Based on P-1 and P-2 Pakistani design
▫ Data collection on SCADA system inside Natanz
 Was this Flame?
60
In 2006, Iran set up, tested, and began operating its first UF6
cascade of 164 linked centrifuges.
40
By November 2007, Iran had assembled and was operating its
first “unit” of 18 linked cascades with a total of 2,952 working
centrifuges.
20
0
Feb-07
Aug-07
50
Phase II: Covert attack
• 2008: First attacks
▫ Tool placed in the Natanz control network
▫ Moderate success but “no wholesale destruction”
 “The Iranians had grown so distrustful of their own
instruments that they had assigned people to sit in the
plant and radio back what they saw.”
60
Iran quickly began assembling additional cascades
based on the first successful unit.
40
However, the second unit was not operating at
full capacity. By late 2008, only 24 of the 36 total
cascades were operating.
20
0
Feb-07
Aug-07
Feb-08
Aug-08
51
Phase III: Success and escape
• 2008 – mid 2010: Repeated operations
▫ Additional versions inserted into Natanz
 Improvements to propagation mechanism
• Mid to late 2009: Critical period
▫ Significant disruption of Iran’s program
▫ Emergence of first virus samples in the wild
Iran built a third
unit, for a total of
54 cascades.
60
40
But the number of
working cascades
remained stalled
at 20-30.
20
0
Feb-07
Aug-07
Feb-08
Aug-08
Feb-09
Aug-09
Feb-10
Aug-10
52
Phase III: Success…
20
10
Pilot unit, no major
problems
A24
0
20
Operating with
UF6
10
Under vacuum,
but not
operating
Can’t bring these new
cascades into service
A26
0
20
10
Serious problems
starting late 2009
A28
0
August
2009
November-December
2009
August
2010
Idle, not under
vacuum
Centrifuges
disconnected
53
Phase III: Escape?
• Symantec found
versions in the wild
dating back to three
“waves”
Domain D
Domain C
Domain B
Domain A
Domain B
▫ June 2009
▫ March 2010
▫ April 2010
• Initially thought to be
insertions into Natanz
• Now look like evidence
of escape from Natanz
Domain B
Domain A
Domain E
Credit to Symantec, W32.Stuxnet Dossier, February 2011
54
Phase IV: Discovery and aftermath
• Mid-2010: Public discovery
▫ June: Stuxnet found by VirusBlokada
▫ July: Stuxnet characterized as SCADA attack
 Intensive public forensics begin
▫ August: AEOI meets to discuss ramifications
▫ September: Symantec counts 100,000 global infections
▫ November: Iran begins to admit infection at Natanz
Discover
y
60
40
20
0
Feb-07
Jul-07
Dec-07 May-08 Oct-08 Mar-09 Aug-09
Jan-10
Jun-10
Nov-10 Apr-11
Sep-11
Feb-12
55
How did Stuxnet get out of control?
• “An error in the code… had led [Stuxnet] to spread to an engineer’s
computer when it was hooked up to the centrifuges … We think there
was a modification done by the Israelis and we don’t know if we were
part of that activity.”
• Symantec’s data seems to indicate two versions in the wild by mid-2009
▫ Error persisted across multiple versions of the virus
• September 2010: 100,000 infections worldwide
▫ Counted by samples and callbacks to the same C&C servers
Covert
Escape 1
Escapes 2 & 3
Data
60
100,000
infections
40
20
0
Feb-07
Jul-07
Dec-07 May-08 Oct-08 Mar-09 Aug-09
Jan-10
Jun-10
Nov-10 Apr-11
Sep-11
Feb-12
56
Did the Iranians know?
• At least two years of suffering in silence
60
40
20
0
Feb-07
Jul-07
Dec-07 May-08 Oct-08 Mar-09 Aug-09
Jan-10
Jun-10
Nov-10 Apr-11
What was going on?
• Post-Stuxnet




Barrage of press about Iranian cyber expertise
Arrests of “nuclear spies,” October 2010
Stars virus, April 2011
DigiNotar compromise, September 2011
Sep-11
Feb-12
57
Stuxnet’s sources for information
Cyber
targeting
Human
targeting
International Atomic Energy
Agency (IAEA)

No access to detailed information
Computers at Natanz

No inbound Internet access
Natanz engineers

Low likelihood of chatter

Passive methods

High security
SCADA system vendor

Siemens
People who own it

Atomic Energy Organization of Iran (AEOI)
People who run it

Most direct, highly protected
People who built it

Less direct, less protected
Humans certainly provided physical access to Natanz,
and likely provided information as well.
58
Unintended consequences
Flame
Duqu
Stuxnet
What will they find next?
Gauss?
59
Unanswered question #1
• Why did Stuxnet evolve?
Wave 1
June 2009
•
AUTORUN.INF
exploit requires
human enablement
Waves 2 and 3
Mar – May 2010
Nov – Dec 2009:
Iran starts
dismantling
centrifuges
Could it be that…

Wave 1 code been found and removed?

The Iranians were tightening network security?

The attackers didn’t know whether Wave 1 was working?
•
•
•
Encrypted payload
.LNK exploit needs no
human enablement
Signed, legitimate
digital certificates
60
Unanswered question #2
• Did Stuxnet contain unused code?
▫ Sequences A (Vacon) and B (Fararo Paya), aka the 315 code,
appeared operational
▫ To Symantec, Sequence C (the 417 code) was not functional
 More sophisticated randomized effects = more clandestine
 Inactive due to missing piece of code
 Not copied onto PLC
 Possibly unfinished
▫ No agreement between experts that 417 was not operational
But…

Why launch with unnecessary code?

Where would the missing activation code come from?

Are there other variants out there that haven’t been found?
61
Stuxnet’s fatal flaw?
Didn’t have
enough
information
about the target
network
Assumed code
would never be
found
Why didn’t
Stuxnet have
a better kill
switch?
Underestimated
human
movements
Didn’t have
confidence in the
seeding
mechanism
Forced by
urgency or
political pressure
62
Summary
• Stuxnet relied on humans and technology.
▫ Hard targets can be penetrated by a combination of
technical and human targeting.
▫ Strengthening SCADA perimeter security against cyber
intrusion won’t necessarily protect a high-value facility.
• The Iranians unwittingly helped Stuxnet.
▫ Humans will defy common sense according to cultural
factors.
• “Cyber covert action” is becoming an oxymoron.
▫ Partnering multiplies risk.
▫ The global hunt is on.
63
Duqu
• Timeline: Active since 2007
▫ Discovered September 2011 by CrySyS (Budapest University of
Technology and Economics)
• Targets: Variety
▫ Variety of corporate targets in Iran, Sudan, India, Vietnam,
Ukraine, Switzerland, France and the Netherlands
• Tactics: Trojan Infostealer
• Perpetrator: Unknown
▫ Driver files similar or identical to Stuxnet
 Same missile, different warhead
• Effects
▫ Capable of stealing information about control systems, but no
code to command a control system
▫ No consensus about purpose or targets
• Is this a SCADA attack?
64
Duqu, “Son of Stuxnet”
• What it does
• What it is
▫ A trojan announced by
Symantec on 20 October 2011
• What it targets
▫ Microsoft Windows
• How it spreads
▫ Zero-day exploit in Microsoft
Word documents

▫ System profiler and info-stealer
 Exfiltrates data to C&C servers
▫ Unspecified companies in
France, Netherlands,
Switzerland, Ukraine, India, Iran,
Sudan, Vietnam, UK, Austria,
Hungary, Indonesia…
• Who did it
▫ No attribution to date
Why “Son of Stuxnet”?

Methodology and portions of code identical to Stuxnet

Effects and purpose appear different
Forensic data and credited diagrams taken from Symantec’s W32.Stuxnet Dossier, February 2011
65
Stuxnet and Duqu, side by side
Stuxnet
Duqu
Earliest apparent creation date of virus
June 2009
2007
Operational period
June 2009 – July 2010
December 2010 through 17 October
2011; re-emergence in February 2012
Variants
Four
Seven
Propagation
Four zero-day exploits; LAN/thumb
drive/etc; self-propagation
One zero-day (so far); no selfpropagation
Payload
Code for Siemens WinCC and PLCs;
written in Microsoft Visual C++
Infostealer, backdoor; written in a
custom “Object Oriented C dialect”
Command and control
Malaysia, Denmark; no activity observed
India, Belgium; active executable code
transmitted via .JPGs and encrypted data
Time limits
3 offspring per infection;
drop-dead in June 2012
8-day window; 36 days per infection; can
be extended via downloaded files
Digital certificates
JMicron and Realtek in
Hsinchu City, Taiwan
C-Media Electronics in
Taipei, Taiwan
Intended targets
Natanz uranium enrichment facility
Unknown
66
Duqu versus Stuxnet
How they are the same
• Identical functionality in Duqu’s
netp191.dll and Stuxnet’s oem7a.dll
• Duqu’s Jminet7.sys/smi4432.sys drivers
are “binary match to” Stuxnet’s
mrxcls.sys
• Identical code in Duqu’s .zdata and
Stuxnet’s .xdata
• Same processes hooked in ntdll.dll
• Same use of hashes/checksums to
lookup functions
• “Magic keys” such as “AE” in both
• Same startup processes and RPC logic
• Signed and unsigned versions of drivers
• Signed versions use certificate from a
Taiwanese firm
• Multiple variants
time
Sameover
missile
How Duqu is different
• Exfiltrates data
• Not targeting control systems
• Infection vehicle is MS Word document
(so far)
• “Object Oriented C dialect” programming
language
• Controlled propagation
• Active use of C&C to pass code
• Relies on Internet for spread
• First samples compiled circa 2007
• Active as of March 2012
Different warhead
67
Duqu’s code
Lands on PC
Establish
Spread
Infect
Implement
Microsoft Word
vulnerability
Check OS
version
Server Message
Block (SMB)
Method 1:
Template .exe
Contact
C&C
8-day window in
August 2011
Get admin
privileges
Method 2:
Receive AESencrypted data
Signed digital
certificates
Decrypt and
load files
CreateProcessAsUser
Method 3:
Use existing process
Resource 302
loads .zdata
Install
infostealer?
68
Duqu: The reality
• No code to target control systems
▫ Sets up backdoor access via Internet C&C
• No evidence of targeting of industrial control system
companies
• Most likely…
▫ Reuse of “missile” by Stuxnet’s creators?
▫ Repurposing of Stuxnet missile against other targets?
69
We are Post-Stuxnet.
• The Iranian nuke program is stronger than ever.
▫ Productivity improved
▫ Technical hardening
▫ Cultural hardening
• U.S. critical infrastructure is slowly getting more
secure.
▫ Efforts to set up security standards
▫ Focus on strengthening inherent SCADA qualities, not
introducing new protocols
 Perimeter security
 Defense-in-depth
70
We know we have problems.
Corporate headquarters
11%
Level 4: Enterprise systems
Regional office
Facility front office
Level 3: Operations management
16%
Human-Machine Interface (HMI)
Level 2: Supervisory control
Programmable Logic Controllers (PLC)
53%
Level 1: Local or basic control
Remote Terminal Units (RTU)
20%
Level 0: Process equipment
Valves, switches, and sensors
0%
Source: DHS Common Cybersecurity Vulnerabilities in Industrial Control Systems, May 2011.
71
Cybersecurity: Forcing change
• Vulnerability disclosures
▫ “Amateurs” describing hundreds of flaws/quirks in
hardware and software
• Community activism
▫ Digital Bond’s “Project Basecamp”
 Release of Metasploit modules for exploitation of several
major control system types
• Ralph Langner’s insight: Design flaws versus
vulnerabilities
72
Cybersecurity: The scary stuff
• Looking for “Son of Stuxnet”
▫
▫
▫
▫
▫
▫
▫
▫
▫
Command and control of SCADA
Penetration of SCADA without command and control
Attempts to penetrate SCADA
Exfiltration of data from within SCADA
Theft of SCADA data from operator’s corporate
network
Theft of proprietary non-SCADA data from operators
Theft of proprietary non-SCADA customer data from
vendors
Theft of proprietary SCADA product data from vendors
Run-of-the-mill pings against all of the above
73
Looking for Son of Stuxnet
Malign intent
Operation
Exfiltration of data
from within SCADA
Theft of SCADA data from
operator’s corporate network
Penetration of SCADA without
command and control
Theft of proprietary nonSCADA customer data from
vendor
Targeting
Exploration
Command and
control of SCADA
SCADAland
Theft of proprietary
non-SCADA data from
operator
Theft of proprietary SCADA
product data from vendor
Run-of-the-mill pings against
corporate networks
Severity
Attempts to
penetrate SCADA
74
Here’s what Ralph Langner thinks
Ralph says…
My take on it is…
• “‘Son of Stuxnet’ is a misnomer. What’s
really worrying are the concepts that
Stuxnet gives hackers… Before, a
Stuxnet-type attack could have been
created by maybe five people. Now it’s
more like 500 who could do this.”


• Missile/warhead structure
• Code is available to the public
▫ Extensive public forensics by
respected IT firms
• Methodology is on display
“A little more knowledge”?
“You just have to know how to copy
parts of [Stuxnet]. After that, you just
need a little more knowledge to make a
simple but effective digital dirty bomb.”

“What you still hear today from all kinds
of people is how a Stuxnet-type attack
requires so much insider knowledge. I
finally had to publish a [simple and
damaging] attack just to make sure no
smart-guy tells his boss that this is
impossible.”

Sustained clandestine attack requires
significant expertise

Brute attack does not, but how
effective would it be?
Interviewed by the Christian Science Monitor, 24 September 2011

Access

Expertise

Terrorists and criminals may not
need a predictable outcome to be
successful
75
Things to think about
• What is a SCADA attack?
▫ Is it the target?
▫ Is it the intention?
• Was Stuxnet a successful operation?
▫ How do you define success?
• What will Son of Stuxnet be?
▫ How will this operation be used against us?
76
Why human culture matters
Low security culture
More opportunity to
do damage before you
are detected
“Normal” security culture
High security culture
Quicker detection
means you can’t stay
below the radar for
long
Download