SlideShare a Scribd company logo
SESSION ID:
#RSAC
Bob Griffin
Attacks on Critical Infrastructure:
Insights from the “Big Board”
TECH-W03
Chief Security Architect
RSA, the Security Division of EMC
@RobtWesGriffin
Daniel Cohen
Head of RSA FraudAction
RSA, The Security Division of EMC
@iFraudFighter
#RSAC
Critical infrastructure are the assets, systems, and networks,
whether physical or virtual, so vital to the United States that their
incapacitation or destruction would have a debilitating effect on
security, national economic security, national public health or safety,
or any combination thereof.
USA Department of Homeland Security
What is a critical infrastructure from attacker
point of view? An opportunity!
Internet
DMZ
SCADA OPC
SCADA HMI
SCADA Network
Corporate Network
#RSAC
More Insights from the Dark Web:
Terracotta and GlassRat
Bob Griffin
#RSAC
Terracotta
4
https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/
#RSAC
Terracotta
5
#RSAC
How Terracotta Works
6
#RSAC
GlassRat
7
Detected February 2015 but had been in the wild since 2012
Linked to other campaigns such as Mirage (2012)
Targets Chinese nationals in commercial enterprises world-wide
https://blogs.rsa.com/resource/peering-into-glassrat/
#RSAC
GlassRat Dropper (Installer)
8
Double clicking on the flash.exe files causes the dropper to launch.
1. Dropper (flash.exe) writes the GlassRAT DLL to the ProgramData folder
2. 2. Dropper runs the DLL file using the built-in Windows utility rundll32.exe
3. 3. GlassRAT DLL file modifies the run key for logon persistence with user-level permissions
with the following registry key.
HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun Update
4. 4. the dropper deletes itself with and embedded command:
“cmd.exe /c erase /F "%s",”
#RSAC
GlassRat Code Signing
9
#RSAC
The Common Theme: Analytics & Cyber Security
Bob Griffin and Daniel Cohen
#RSAC
Analytics at the RSA AFCC
11
http://australia.emc.com/video-collateral/demos/microsites/mediaplayer-
video/glimpse-rsa-anti-fraud-command-center.htm
#RSAC
Detecting Terracotta
12
https://blogs.rsa.com/wp-content/uploads/2015/08/Terracotta-VPN-Report-Final-8-3.pdf
#RSAC
Detecting GlassRat
13
http://charge.rsa.com/wp-content/uploads/2015/09/Finding-The-R.A.T-With-ECAT.pdf
#RSAC
The recent DragonFly campaign showed how the attackers could use malware
to take control of SCADA systems
Attacks on the Smart Grid
ICS Software
House website
DragonFly
Attackers
1- Compromise
2- Upload malicious
Software update
3- Install malicious
update
C2 Server
5- Send Commands4- Havex trojan
Connect
14
#RSAC
SPARKS Project Consortium
https://project-sparks.eu/
15
#RSAC
Analysis using Static Rules Validator
This component searches for systems’ asserts violations
Rules List contains the assertions to verify
Adapter translate the rules in common language
Parser get the rules and search for negative or positive outliers
Static Rules Validator
Rules list ParserAdapter
16
#RSAC
Outliers against a predefined bound
E.g. Voltages should not fluctuate very much
Examine voltages and frequency only
Static Rules: Variable outlier
17
#RSAC
Calculate physical relationships between variables
18 separate equations
Measurement is asynchronous
Use difference between RHS and LHS (error)
Determine probability of error from historical data
Flag when below some threshold
Static Rules: Rule Outlier
cos−1 𝑉 𝐴
2
+𝑉 𝐵
2
−𝑉 𝐴𝐵
2
2𝑉 𝐴 𝑉 𝐵
+ cos−1 𝑉 𝐵
2
+𝑉𝐶
2
−𝑉 𝐵𝐶
2
2𝑉 𝐵 𝑉𝐶
+ cos−1 𝑉𝐶
2
+𝑉 𝐴
2
−𝑉𝐶𝐴
2
2𝑉𝐶 𝑉 𝐴
= 360°
18
#RSAC
Symmetrized KL distance on rule errors
Symmetrisation due to Kullback & Leibler
𝐷 𝐾𝐿 = 𝑑 𝐾𝐿(𝑗, 𝑖) − 𝑑 𝐾𝐿(𝑖, 𝑗)
Historical data (baseline) vs Current measurement
Anomaly when value above some threshold
Static Rules: Kullback Leibler
19
#RSAC
Static Rules: Dead Sensor Clustering
Cluster sensors that stop recording in time
User configurable time window
Anomalous when cluster size > threshold
Sensors
Time
20
#RSAC
Static Rules: Dead Sensor Clustering
Anomalous Cluster
Sensors
Time
Benign Cluster
21
#RSAC
Analysis using Dynamic Detection
This component uses machine learning techniques to evaluate the entire
system state
Rules Extractor get data from last readings
Historical KB compare the new feature with system history
Evaluator use tolerance to reduce FP and noise
Auto-Detector
Rules Extractor EvaluatorHistorical KB
22
#RSAC
Abundance of normal data. Little to no outlier data
Train a one-class SVM using only normal data
Group similar sensors and train a model for each sensor using only
Early studies show good performance but modelling needs more
work
Dynamic Detection: ML Outliers
23
#RSAC
Some Screenshots of SPARKS’ Dashboard
24
#RSAC
Applying this Session
Evaluate your current approach to responding to cyber threats in
the light of the kinds of attacks we’ve discussed
Identify an area in which security analytics could improve your
ability to detect and respond to cyber attacks
 Identify compromised end-user devices (eg, anomalies in behavior)?
 Identify compromised servers (eg, evidence of beaconing)?
 Identify lateral movement across your network (eg, anomalies in
network traffic)?
Prototype or pilot security analytics in that area
25
#RSAC
26
Thank you!
daniel.t.cohen@rsa.com
@iFraudFighter
www.linkedin.com/in/danieltcohen
robert.griffin@rsa.com
blogs.rsa.com/author/griffin
project-sparks.eu/blog/
@RobtWesGriffin
www.linkedin.com/pub/robert-griffin/0/4a1/608

More Related Content

PDF
Smart Megalopolises. How Safe and Reliable Is Your Data?
PDF
Realities of Data Security
PDF
A New Security Paradigm for IoT (Internet of Threats)
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
DON'T Use Two-Factor Authentication...Unless You Need It!
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PDF
Rise of the Hacking Machines
Smart Megalopolises. How Safe and Reliable Is Your Data?
Realities of Data Security
A New Security Paradigm for IoT (Internet of Threats)
Applying Auto-Data Classification Techniques for Large Data Sets
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
DON'T Use Two-Factor Authentication...Unless You Need It!
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Rise of the Hacking Machines

What's hot (20)

PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
PDF
Making Threat Intelligence Actionable Final
PDF
Aspirin as a Service: Using the Cloud to Cure Security Headaches
PDF
Soc 2030-socs-are-broken-lets-fix- them
PDF
Achieving Defendable Architectures Via Threat Driven Methodologies
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
Implementing An Automated Incident Response Architecture
PDF
Pulling our-socs-up
PDF
Insights from-NSAs-cybersecurity-threat-operations-center
PDF
Predicting exploitability-forecasts-for-vulnerability-management
PDF
Westjets Security Architecture Made Simple We Finally Got It Right
PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
PDF
Designing Virtual Network Security Architectures
PDF
Cloud Breach – Preparation and Response
PDF
Confusion and deception new tools for data protection
PDF
ICS Network Security Monitoring (NSM)
PDF
What Is Next-Generation Endpoint Security and Why Do You Need It?
PDF
Applied cognitive security complementing the security analyst
PDF
BlueHat v18 || Dep for the app layer - time for app sec to grow up
PDF
Incident response-in-the-cloud
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Making Threat Intelligence Actionable Final
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Soc 2030-socs-are-broken-lets-fix- them
Achieving Defendable Architectures Via Threat Driven Methodologies
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Implementing An Automated Incident Response Architecture
Pulling our-socs-up
Insights from-NSAs-cybersecurity-threat-operations-center
Predicting exploitability-forecasts-for-vulnerability-management
Westjets Security Architecture Made Simple We Finally Got It Right
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
Designing Virtual Network Security Architectures
Cloud Breach – Preparation and Response
Confusion and deception new tools for data protection
ICS Network Security Monitoring (NSM)
What Is Next-Generation Endpoint Security and Why Do You Need It?
Applied cognitive security complementing the security analyst
BlueHat v18 || Dep for the app layer - time for app sec to grow up
Incident response-in-the-cloud
Ad

Viewers also liked (17)

DOC
Le petit nicolas les auteurs
PPTX
Money game
PPT
A saúde os estados físicos
PPTX
Les amis de nicolas
PPTX
Verbo doer - Desde - Há
DOC
Tintin le premier homme sur la lune - fiche
DOCX
Corrientes económicas
PDF
Disappoinmtments and failures
PPS
Piano Bar
PDF
13 3.el mito de las conexiones de masa, tierra y chasis
PDF
Благотворительная онлайн конференция 1day1step: работа и бизнес из дома
PDF
Critical Infrastructure Protection against targeted attacks on cyber-physical...
PDF
Understanding Water and Terrorism
PDF
Sponsorship Opportunities
PPTX
Anatomia - Sistema Imunológico
PPT
Anatomia - sistema renal
PPT
Water Pollution
Le petit nicolas les auteurs
Money game
A saúde os estados físicos
Les amis de nicolas
Verbo doer - Desde - Há
Tintin le premier homme sur la lune - fiche
Corrientes económicas
Disappoinmtments and failures
Piano Bar
13 3.el mito de las conexiones de masa, tierra y chasis
Благотворительная онлайн конференция 1day1step: работа и бизнес из дома
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Understanding Water and Terrorism
Sponsorship Opportunities
Anatomia - Sistema Imunológico
Anatomia - sistema renal
Water Pollution
Ad

Similar to Attacks on Critical Infrastructure: Insights from the “Big Board” (20)

PDF
Monitoring ICS Communications
PPTX
RSA 2018: Recon For the Defender - You know nothing (about your assets)
PDF
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
PDF
For Critical Infrastructure Protection
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
How to Analyze an Android Bot
PDF
Hacking a Professional Drone
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PDF
Finding Triggered Malice in Android Apps
PPTX
Cloud Security Essentials 2.0 at RSA
PDF
"Giving the bad guys no sleep"
PDF
Stop Passing the Bug: IoT Supply Chain Security
PDF
The Unexpected Attack Vector: Software Updaters
PDF
str-w04_next-wave-of-security-operationalization
PDF
SDN and Security: A Marriage Made in Heaven. Or Not.
PDF
Automating cloud security - Jonny Griffin
PDF
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
PDF
Hacking Exposed: The Mac Attack
PDF
Hacking Exposed: The Mac Attack
PDF
RSA ASIA 2014 - Internet of Things
Monitoring ICS Communications
RSA 2018: Recon For the Defender - You know nothing (about your assets)
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
For Critical Infrastructure Protection
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
How to Analyze an Android Bot
Hacking a Professional Drone
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Finding Triggered Malice in Android Apps
Cloud Security Essentials 2.0 at RSA
"Giving the bad guys no sleep"
Stop Passing the Bug: IoT Supply Chain Security
The Unexpected Attack Vector: Software Updaters
str-w04_next-wave-of-security-operationalization
SDN and Security: A Marriage Made in Heaven. Or Not.
Automating cloud security - Jonny Griffin
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
RSA ASIA 2014 - Internet of Things

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Modernizing your data center with Dell and AMD
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Machine learning based COVID-19 study performance prediction
Modernizing your data center with Dell and AMD
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”

Attacks on Critical Infrastructure: Insights from the “Big Board”