hacking critical infrastructure like you’re not a n00b

46
#RSAC Jason Larsen Hacking Critical Infrastructure Like You’re Not a N00b HT-F03 CyberSecurity Researcher IOActive

Upload: priyanka-aash

Post on 07-Apr-2017

126 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Jason Larsen

Hacking Critical Infrastructure Like You’re Not a N00b

HT-F03

CyberSecurity ResearcherIOActive

Page 2: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

I just got a shell on the control system, now what?

Page 3: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Inherent Dangers

Page 4: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Researching Hazards

Page 5: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Hazard Mitigations

Nearly every hazard will have some mitigation

Just because there is a mitigation, doesn’t mean that mitigation is effective

There is always a strong pressure to declare a problem solved

Page 6: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Typical HMI Screen

Page 7: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Let’s Make Some Moonshine

Page 8: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Let’s Make Some Moonshine

Page 9: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Let’s Make Some Moonshine

Moonshine tastes awful! Burn it instead!

Page 10: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Easy Button Attacks

• At S4 Reid Wightman described one such attack…..• Variable frequency drives have skip frequencies to

stop the VFD from operating at a resonant frequency

• The engineer has already calculated the exact VFD frequency that is a problem

• Easy button attacks are great if they happen to line up with what you want to achieve

What if there is no easy button?

Page 11: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Possible Weaponization Strategies

Flaming pool of death

Flaming inferno of death

Steam Collapse

Page 12: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Flaming Pool of Death

Page 13: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Flaming Inferno of Death

Page 14: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Steam Collapse

14

Page 15: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Point Database

• The attacker will need to extract the point database• This is a toy process so it only has 22 points

Page 16: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Timing And State Diagrams (TSD)

Page 17: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Processes aren’t vulnerable all the time

Page 18: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Page 19: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Page 20: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Learning phaseExtracted

“runs”Believable noise

Spoofed sensor signal

Page 21: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

We’re winning!!

Page 22: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

That’s not right!

Page 23: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Vacuum Breaker - Move Along

Steam TransferTemperature/PressureBuilds

Page 24: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Just letting go is like ringing a bell

Page 25: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Page 26: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Mapping TSD to Devices

Alarm Pathways and Sanity Checks as well as Data Flows

Page 27: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Distributed Checks

Sending messages between devices is messyThe process doesn’t stop to wait on your message

This causes lots and lots of edge cases

Autonomous agents in each control “zone” works betterEach agent will need it’s own independent TSD logic

Mapping Devices to Implants

Page 28: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Creating and Validating TSD

Page 29: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Creating and Validating TSD

Page 30: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Methane vs CO2

Page 31: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Simple Scaling

Page 32: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Best-Fit Monotonic Line Approximation

Page 33: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Relaxing a graph matches points based on artifacts just like a human would

Force Relaxing

Page 34: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

For every pair of time series, we can calculateScale – 5.25

Offset - 52.64

Slope – 2.28

Delay – 9 seconds

Fitness – 88.06%

In general, the greater the disturbance in the loop, the better the correlation matrix will work

Model Outputs

Page 35: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Let’s overlay the correlation matrix on top of our existing TSD diagram

Page 36: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Uncertainty Tables

An exploit chain can always be built, but how confident are you it will work?

Page 37: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Comparing Attack Strategies

Page 38: Hacking Critical Infrastructure Like You’re Not a N00b

Feedback with Topology

How do you know when something has gone horribly wrong on the far side?

There is no “Pipe Roundness” sensor

Page 39: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Topology Invariance

Topologies are generally static in a process operating in the same mode

Individual characteristics of a topology may be conserved

Page 40: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Topology Invariance

Page 41: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Flow A

Flow B

Flow C

(Integration under the flow curve yields volume)

Level A

Level B

Level C

(Level A * Volume A) = (Level B * Volume B) + (Level C * Volume C)(Flow A) = (Flow B) + (Flow C)(Level A * Volume A) = (Flow B) + (Flow C)

Topology Characteristic Invariance

Mostly true, but stuff happens

Page 42: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Change in Physics

42

Page 43: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Feedback Till Topology Changes

Success can often be registered as a topology change

Often some values that are conserved are no longer conserved during the damage phase

Page 44: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Why don’t we see more “Cyber Weapons”?

Given the amount of work, there is also a high degree of uncertainty that the weapon will actually work

You’re not always at war with someone so you need a kindler-gentler way of testing

Economic disruption can be used to validate future cyber weapons against real targets

Expect to see an increase in economic disruptions in high-value targets

Page 45: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Ukraine Attack

This is more of an easy-button attack with some force multipliers

• Attackers only had to turn off the power• No great knowledge of the process

required

• Typical DoS against the call center

Page 46: Hacking Critical Infrastructure Like You’re Not a N00b

#RSAC

Questions?

Jason Larsen

[email protected]