cyber security meetup colombo, 26th september 2019...even “air gapped” system can be vulnerable...

30
CYBER SECURITY MEETUP COLOMBO, 26 TH SEPTEMBER 2019

Upload: others

Post on 28-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

CYBER SECURITY MEETUP

COLOMBO, 26TH SEPTEMBER 2019

Page 2: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized
Page 3: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

Computer based systems that control physical devices:

Traffic lights,

Pumps,

Motors,

Electrical distribution switches

WHAT ARE INDUSTRIAL CONTROL SYSTEMS (ICS)?

Page 4: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

WHERE TO FIND THEM IN SRI LANKA?

Electrical Grid

Power plants

Water systems (Water purification,

Waste water treatment, irrigation)

Industrial applications

Building managements

Data centers

Transportation systems (airport, trains,

traffic lights)

Page 5: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

CRITICAL INFRASTRUCTURE IS INCREASINGLY IN FOCUS

What is critical infrastructure? US DHS: identifies

16 critical sectors:

Chemical

Communications

Dams

Emergency Services

Financial Services

Government Facilities

Information Technology

Transportation Systems

Commercial Facilities

Critical Manufacturing

Defense Industrial Base

Energy

Food and Agriculture

Healthcare and Public Health

Nuclear Reactors, Material and Waste

Water and Wastewater

Page 6: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

Based on open protocols

Most are based on decades old designs

Security was never thought about

Inherently trusting of other devices on the control network

Often installed and left untouched for a long time (many years)

Few updates made as any change brings the risk of interrupting production

INDUSTRIAL CONTROLS ARE INHERENTLY VULNERABLE

Page 7: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

VULNERABILITIES ARE EVERYWHERE

Recent advisories from the US

Department of Homeland Security ICS

CERT:

https://ics-cert.us-cert.gov/advisories

All these new disclosures are from the

month of September 2019.

Page 8: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

Many IT / Operation managers believe their systems are “air gapped”. However, most systems are connected:

Directly to the outside world

Web servers

VPN for remote diagnostics /engineering

Indirectly via corporate networks:

Historians

MES systems

VPN

“Jump servers”

ICS ARE CONNECTED

Page 9: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

ICS CONNECTIVITY WILL INCREASE

DRIVEN BY “PLANT DIGITIZATION” OR

“INDUSTRIAL IOT” ALSO CALLED “INDUSTRY 4.0

(4IR)”

THIS IS THE PROMISE OF EFFICIENCY GAIN IN

PRODUCTION PROCESSES VIA THE USE

OF “BIG DATA”.

DIRECT PROCESS EFFICIENCY GAINS DUE

TO PROCESS AND OPERATIONS

OPTIMIZATION

PREVENTATIVE AND PREDICTIVE

MAINTENANCE

CREATION OF NEW PRODUCTS

THIS IS BASED ON THE COLLECTION,

ANALYSIS, AND SHARING OF

INDUSTRIAL DATA

Page 10: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

Linux vulnerability

TLS vulnerability

Probably many more

ICS ARE VULNERABLE TO IT ISSUES

Page 11: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

SPECIFIC THREATS ALSO EXIST

CrashOverride malware represents a scalable, capable platform. The modules and

capabilities publically reported appear to focus on organizations using ICS protocols

IEC101, IEC104, and IEC61850

As CrashOverride is a second stage malware capability and has the ability to operate

independent of initial C2, traditional methods of detection may not be sufficient to detect

infections prior to the malware executing.

Source: ICS-CERT

Page 12: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

THERE ARE MANY TYPES OF THREATS ACTORS

Internal threat (“disgruntled” employees, knowledgeable contractors, etc)

Hacktivist

“independent” hackers

Organized Crime

State actors: intelligence agencies, military organizations, state sponsored hacking groups, etc

NONE OF THEM CAN BE IGNORED!!!

You may not be a target of choice but your organization could be a target of opportunity or just collateral damage.

Page 13: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

ICS contractor rejected for permanent job

Modified ICS system program repeatedly while company was trying to troubleshoot.

Dumped millions of liters of sewerage in parks, rivers and ground of a hotel.

2 years in Jail

INTERNAL: WASTE MANAGEMENT SYSTEM - AUSTRALIA

Page 14: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

In 2006, a pair of LA traffic engineers hacked traffic lights to cause gridlock as part of a labor protest.

INTERNAL: LA TRAFFIC SYSTEM

Page 15: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

HACKTIVISTS

Try to exert political pressure through cyber compromise.

Usually not ICS related, minimal damage.

• State of Michigan Website - Flint Water crisis

• North Carolina government website – transgender law

• City of Baton Rouge website – after fatal police shooting

This could change …

Page 16: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

HACKERS

Just because they can…

Usually not targeting particular organization, just

looking for easy targets.

They can still do real damage.

ICS seen as an interesting “play ground” as they

are usually not so hard to penetrate.

Page 17: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

ORGANIZED CRIME

“…the attackers used a spear phishing campaign

aimed at particular individuals in the company to

trick people into opening messages that sought

and grabbed login names and passwords.”

Operators lost control of the plant and were

asked to pay a ransom to get control back.

Page 18: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

230,000 computers in 150+ counties infected within 24 hours

ORGANIZED CRIME: RANSOMWARE - WANNACRY

Page 19: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

STATE ACTORS: LESSONS FROM STUXNETEven “Air gapped” system can be vulnerable

Page 20: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

August 2008 -

“Hackers had shut

down alarms, cut off

communications and

super-pressurized the

crude oil in the line. The

main weapon at valve

station 30 on Aug. 5,

2008, was a keyboard.”

STUXNET WAS NOT THE FIRST CYBER WEAPON

Page 21: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

STATE ACTORS: PETYA

Page 22: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

STATE ACTORS: PETYA

Page 23: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

TERRORISM IS A NEW CYBER SECURITY THREAT

Page 24: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

NSA tools used for over a decade, then disclosed by “ShadowBroker”

Used a month later in Wannacry for ransomware and EternalRocks (worm demonstration ?

Doesn’t seem to cause real damage)

ADVANCED THREATS CAN BECOME COMMON QUICKLY

Page 25: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

WEAPON IN FUTURE CONFLICTS

Future conflicts will use as many cyber “weapons” as “kinetic” ones.

Critical infrastructure is a target

No picking on the US, but typically documented information is coming from there. Russia, Iran,

North Korea and many other nations are all very active in this area.

Page 26: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

FIVE MYTHS OF INDUSTRIAL CONTROL SYSTEMS SECURITY

We’re not connected to the internet

We’re secure because we have a firewall

Hackers don’t understand SCADA/DCS/PLC

Our facility is not a target

Our safety systems will prevent any harm

Page 27: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

WHAT CAN BE DONE? BEST PRACTICE

We need to harden our systems so that inherent vulnerabilities

do not lead to large scale compromise: basic cyber hygiene

Patch management

End-point protection (Anti-virus)

Application whitelisting

Log monitoring (SIEM)

Backup management

But is not entirely realistic in an OT environment !

No “reboot time window” available

Hard to keep anti-virus patterns up to date

Requires IT skilled personnel

Old software may not have patches available.

Any change brings risk of stopping operations

Page 28: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

IIOT CYBERSECURITY NATIONAL POLICY?

Page 29: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

TICK TOCK?

Page 30: Cyber security Meetup Colombo, 26th September 2019...Even “Air gapped” system can be vulnerable August 2008 - “Hackers had shut down alarms, cut off communications and super-pressurized

https://www.youtube.com/watch?v=8ThgK1WXUgk

https://www.youtube.com/watch?v=bV47gBsrDkc