cyber threats on the industrial environment · como pedro por su smart-building author: eduardo...

36
Cyber Threats on the Industrial Environment Eduardo Arriols Nuñez

Upload: others

Post on 03-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Cyber Threats on theIndustrial Environment

Eduardo Arriols Nuñez

Page 2: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

1. Cyber Threats

2. Security Research

3. Conclusions

Page 3: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Cyber Threats

Page 4: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

¿What is a Cyber Threat?

Everyone know about traditional threats but…

¿How many of you know all the real threats and risks on your company?

Page 5: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Risks associated to IoT

IT Network

Industrial Network

Page 6: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Security Research

Page 7: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

1. Introduction

2. Control of the building

3. Organizations affected

4. Post-explotation

Page 8: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

1. Introduction

2. Control of the building

3. Organizations affected

4. Post-explotation

Page 9: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM
Page 10: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM
Page 11: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM
Page 12: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Keep It Simple

Page 13: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

1. Introduction

2. Control of the building

3. Organizations affected

4. Post-explotation

Page 14: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Building Management System

IntegratorsManufacturers

Page 15: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Find a backdoor: Existence of valid users in the system that werenot in the documentation.

• guest / *****

• test / ****

• demo / ****

1

Attack vector

Read access to BMS: Access to the BMS only with readpermissions.

2

Page 16: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Access to BMS configuration: Access with read permissions tosystem users and their encrypted passwords.

3

Attack vector

Page 17: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Identification of libraries: Access and download of BMS corelibraries with encryption and decryption functions.

4

Attack vector

Page 18: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Password decryption: Simple script for recovering the credentialsobtained before.

5

Attack vector

Page 19: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Access as administrator: Use of users and credentials obtained.6

Attack vector

Page 20: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

1. Introduction

2. Control of the building

3. Organizations affected

4. Post-explotation

Page 21: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Location of vulnerable systems

Page 22: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Private companies

Page 23: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Banks

Page 24: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Hospitals

Page 25: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Airports

Page 26: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Industrial companies

Page 27: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Jails

Page 28: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Police departaments

Page 29: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Government buildings

Page 30: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Demo time

Page 31: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

1. Introduction

2. Control of the building

3. Organizations affected

4. Post-explotation

Page 32: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

More advance actions

Signal alteration

Automation of all actions

Access to industrial network of the building

Access to internal network of company

Launch advanced and targeted attacks on a city

Page 33: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

Conclusions

Page 34: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

New technology

New threats

Evolution of threats

New securitychecks

Page 35: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

The Red Team exercise is the most specialized intrusion service that simulate a targetedattack from an adversary mindset. The exercises allows the company to identify their globalsecurity level, as well as the level of prevention and protection against targeted threats.

The only way to identify the global security and the Blue Team capabilities

Red Team Operations

DIGITAL SECURITY

SOCIAL ENGINEERING

PHYSICAL SECURITY

OFFENSIVE INTELLIGENCE

Page 36: Cyber Threats on the Industrial Environment · Como Pedro por su Smart-Building Author: Eduardo Arriols Nuñez Created Date: 5/16/2017 10:54:09 AM

¿Questions?

Eduardo Arriols Nuñ[email protected] @_Hykeos