SlideShare a Scribd company logo
Joe Slowik / @jfslowik
Dragos, Inc. | October 2019
id jslowik
uid=1000(jslowik)
gid=1000(jslowik),
05(philosophy),
09(US_Military), 14(US_DOE),
17(Dragos_Inc)
ICS-
Specific
Security
Threat
Intelligence
Dragos
Platform
IR and
Assessment
Services
➢
➢
➢
➢
https://ics.sans.org/media/An-Abbreviated-History-of-Automation-and-ICS-
Cybersecurity.pdf
http://www.a2n.net/site/wp-content/uploads/2017/03/IoT_04.png
Confidentiality
Integrity Availability
Past and future of integrity based attacks in ics environments
ICS
Operations
Process
Safety
Process
Reliability
Process
Integrity
ICS
Operations
Process
Safety
Process
Reliability
Process
Integrity
Output Validation
• Manufacturing
tolerances
• Product quality
• Product
consistency
Long-Term
Operations
• Process control
and
understanding
• Maintenance,
upkeep, and
modification
Safety
• Integrity is vital to
reliability which
enables safety
• Unsafe processes
are non-functional
processes
ICS Attack
Turn off
the power
Blow up
the plant
Destroy
centrifuges
ICS Attack
Degrade process in hard-
to-diagnose fashion
Introduce defects or lack
of reliability
Undermine process safety
Preparatory Actions
Deny Degrade Destroy
Breach victim IT
network
Identify points
of contact with
ICS
Enumerate and
categorize
control system
environment
Deliver effects
on objective
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environments
Recon & Initial
Access
Many
Attempts
Deny,
Degrade,
Destroy
Few
Examples
More
Aggressive
Attacks
Greater
Adversary
Risk
Tolerance
Pursuit of
Physical ICS
Attacks
Heightened
Danger to
Asset
Owners
Stuxnet
CRASHOVERRIDE
TRISIS
Past and future of integrity based attacks in ics environments
• Use lots of zero days!
• Destroy centrifuges!
• Eliminate Iranian nuclear enrichment activity
Popular
Conception
• Increase operational variation in centrifuges, increasing
failure rate
• Modify process telemetry to hide defect
• Create hard-to-diagnose uncertainty in enrichment
process
Reality
Direct
Impact
•Some process disruption
•Equipment failure
Indirect
Impact
•Operators could no longer
trust the process
•Leadership no longer trusted
scientists, supply chain
Result
•Uranium still enriched
•Rate of production slowed
•Trust in the process reduced
Increase cost of enrichment program
Combined with physical measures*
emphasized risk of current activity
Likely facilitated JCPOA negotiations
Past and future of integrity based attacks in ics environments
Penetrate ICS,
place malware
on computers
communicating
to field devices
Schedule
malware
execution to
open breakers
at target
transmission
site
Perform a
limited wipe
and system
disabling event
on infected
machines
Target
protective
relays with DoS
exploit post-
attack*
Attack Operations
• 2015: Manual interaction
with control systems
• 2016: Interactions encoded
in malware*
Attack Impact
• 2015: Disrupt electricity
distribution, inhibit
recovery
• 2016: Disrupt electricity
transmission, inhibit
recovery, attempt to
impact protection systems
Attack Success
• 2015:
• 3 distribution companies
• 225k customers
• Several hours
• 2016:
• Single
transmission/distribution
site
• <225k customers
• Approx. 1-2 hours
• Serial-to-ethernet firmware modification
• Killdisk wiper deployment on
workstations, HMIs
2015
• File and service wiper on impacted
workstations
• Attempted protective relay DoS
2016
Attackers used “wiper” to delay recovery in 2015 – but
UA operators quickly moved to manual restoration
Assume attackers took note: wiper functionality in
2016 would not delay (near-term) service recovery
2016 “wiper” intended for other purposes: eliminate
logical view and control of SCADA environment
https://new.siemens.com/global/en/products/energy
/energy-automation-and-smart-grid/protection-
relays-and-control.html
https://www.littelfuse.com/products/protection-
relays-and-controls/protection-relays/protection-
relay-pages/what-is-a-protection-relay.aspx
Create hazardous situation for
personnel and equipment
Induce islanding among affected
substations
Create pre-conditions for a possible
physical impact on reconnect
Past and future of integrity based attacks in ics environments
Create large-scale
transmission outage
• Timing coincides with 2015 event
• Pressures utility to restore ASAP
Wiper event products
loss of view, loss of
control
• Wiper delays restoration
• More importantly degrades visibility into
SCADA
DoS SIPROTEC
Protective Relays
• Remove transmission protection on de-
energized line
• Loss of view makes this difficult to
ascertain
Anticipate rush to
physical restoration
• Create conditions for overcurrent event
• SIPROTEC DoS results in physical
damage
Anticipate rush to
recovery
Create unsafe
state at time of
restoration
Produce
physically-
destructive impact
Past and future of integrity based attacks in ics environments
Gain access to and harvest credentials from IT network
(Mimikatz, ‘SecHack’)
Leverage multiple open- or commercial-source tools for
post-exploitation (WMImplant, administrative tools)
Utilize remote access to OT network via stolen credentials
Continue pivoting through network via credential capture
Gain sufficient access to SIS to deploy TRISIS
Media and Conference Circuit
• Emphasis on plant
operations disruption
• ‘Malware that can kill’
Actual Implications
• SIS interaction introduced an
in-memory rootkit allowing
adversary access
• Access could enable
arbitrary modification of SIS
• Integrity of SIS compromised
to unknown effect
https://realpars.com/wp-
content/uploads/2018/08/What-Is-a-Safety-
Instrumented-System..png
https://www.livingreliability.com/en/wp-
content/uploads/2014/07/EmersonSisCourse1_Depic
tionOfLayersOfProtection.jpg
Compromise
SIS and plant
DCS
Modify SIS
safety
settings to
support
desired
impact
Modify or
manipulate
DCS to
create
unsafe plant
state
SIS
modification
allows
unsafe state
to persist or
accelerate
Record safe conditions as unsafe (plant DoS)
Directly trip SIS for multiple possible reasons
Record unsafe conditions as safe (possible destructive event)
Modify SIS to reduce
safety effectiveness
Leverage DCS
compromise to
produce dangerous
plant status
Maximize potential
damage due to SIS
failure in impacting
plant
Stuxnet: Mostly* worked
CRASHOVERRIDE: Largely failed
TRISIS: Failed
Integrity attacks undermine
confidence in process while
potentially producing impact
Delayed direct impact can
produce effects at time of
adversary choosing
Immediate direct impacts are
least flexible and likely to scale
Process
Manipulation
Manufacturing
Operations
Electric
Generation and
Distribution
Oil & Gas
Production
Introduce defects into manufacturing process
Add difficult-to-diagnose errors to process
Increase likely product failure rate
Manipulate testing tolerances for equipment
quality control
Past and future of integrity based attacks in ics environments
• Target equipment and process safety
• TRISIS-like attacksSafety
• Undermine ability to protect personnel and equipment
• CRASHOVERRIDE-like DoSProtection
• Impact frequency consistency to introduce process variability
• Generate oscillating conditions to produce AURORA-like eventReliability
Past and future of integrity based attacks in ics environments
Electric Utility
Operation Attacks
Generation Frequency
Instability
Protective Relay Disabling
Translate loss of Frequency
Stability into Physical
Damage
ICS
Security
Traditional IT-
Centric
Defense
Process
Monitoring
and Analysis
Resilience
and Recovery
Investment
Identify indications of ICS breach
Correlate IT intrusion information to anomalous
process data
Deploy knowledge to investigate process
disruptions
Facilitate post-incident recovery and analysis
Continued Adversary Interest in ICS
Increased Acceptance of Physical Damage
Need for Defenders to Embrace Logical and Process Monitoring, ICS-
Focused Defense
• Evolution of ICS Attacks and Prospects for Future Disruptive Events – Dragos (https://dragos.com/wp-
content/uploads/Evolution-of-ICS-Attacks-and-the-Prospects-for-Future-Disruptive-Events-Joseph-Slowik-1.pdf)
• Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE – Dragos
(https://dragos.com/whitepapers/CrashOverride2018.html)
• CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack – Dragos
(https://dragos.com/wp-content/uploads/CRASHOVERRIDE.pdf)
• Industroyer – ESET (https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf)
• Analysis of the Cyber Attack on the Ukrainian Power Grid – SANS (https://ics.sans.org/media/E-
ISAC_SANS_Ukraine_DUC_5.pdf)
• Staged Cyber Attack Reveals Vulnerability in Power Grid – CNN (http://www.cnn.com/2007/US/09/26/power.at.risk/)
• Common Questions and Answers Addressing the Aurora Vulnerability – Mark Zeller
(https://cdn.selinc.com/assets/Literature/Publications/Technical%20Papers/6467_CommonQuestions_MZ_20101209_Web.p
df?v=20150812-151908)
• Myth or Reality – Does the Aurora Vulnerability Pose a Risk to My Generator? – Mark Zeller
(https://cdn.selinc.com/assets/Literature/Publications/Technical%20Papers/6452_MythReality_MZ_20110217_Web2.pdf?v=2
0181015-210359)
Past and future of integrity based attacks in ics environments

More Related Content

PDF
Cyber consequences, operational dependencies, and full scope security
PPTX
Managing Multiple Assessments Using Zero Trust Principles
PDF
Gpc case study_eng_0221
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
PDF
PMCD Fall 2015 Newsletter
PDF
Cis controls v8_guide (1)
PPTX
Security assessment with a hint of CISSP Prep
PDF
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Cyber consequences, operational dependencies, and full scope security
Managing Multiple Assessments Using Zero Trust Principles
Gpc case study_eng_0221
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
PMCD Fall 2015 Newsletter
Cis controls v8_guide (1)
Security assessment with a hint of CISSP Prep
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies

What's hot (20)

PDF
Intel Presentation from NIST Cybersecurity Framework Workshop 6
PPTX
Introducing Kaspersky Security for Virtualization - Light Agent
PPTX
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
PDF
Software Vulnerabilities Risk Remediation
PDF
Symantec_2004_AnnualReport
PDF
PCI DSS & Virtualization
PDF
Software Development Life Cycle – Managing Risk and Measuring Security
PDF
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
PDF
第7回VEC制御システムサイバーセキュリティカンファレンス
PDF
Nist.sp.800 37r2
PDF
Introduction to NIST Cybersecurity Framework
PDF
American Bar Assoc. ISC 2009
PPTX
Effective Cyber Defense Using CIS Critical Security Controls
PPTX
Kaspersky security for virtualization light agent launch presentation
PDF
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
PDF
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
PPTX
Practical steps for assessing tablet & mobile device security
PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
PPTX
Introducing Kaspersky Security for Virtualization
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Introducing Kaspersky Security for Virtualization - Light Agent
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Software Vulnerabilities Risk Remediation
Symantec_2004_AnnualReport
PCI DSS & Virtualization
Software Development Life Cycle – Managing Risk and Measuring Security
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
第7回VEC制御システムサイバーセキュリティカンファレンス
Nist.sp.800 37r2
Introduction to NIST Cybersecurity Framework
American Bar Assoc. ISC 2009
Effective Cyber Defense Using CIS Critical Security Controls
Kaspersky security for virtualization light agent launch presentation
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Practical steps for assessing tablet & mobile device security
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Introducing Kaspersky Security for Virtualization
Ad

Similar to Past and future of integrity based attacks in ics environments (20)

PDF
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
PDF
Demystifying Cyber Attacks on ICS-.pdf
PDF
Mission kill process targeting in ics attacks
PPT
Cybersecurity for Control Systems: Current State and Future Vision pt.1
PPT
Control system including PLC cybersecurity
PPTX
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
PDF
Dragos and CyberWire: ICS Ransomware
PDF
The Current ICS Threat Landscape
PPT
Power Grid Communications & Control Systems
PPTX
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
PPTX
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
PDF
115.pdf
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
PPTX
ICS_Security_Use_Case_Presentation (1).pptx
PDF
ICS security
PDF
IT vs. OT: ICS Cyber Security in TSOs
PDF
Mission Impact Assessment for Industrial Control Systems
PDF
[CLASS 2014] Palestra Técnica - Alexandre Euclides
PDF
Securing Industrial Control System
PDF
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Demystifying Cyber Attacks on ICS-.pdf
Mission kill process targeting in ics attacks
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Control system including PLC cybersecurity
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
Dragos and CyberWire: ICS Ransomware
The Current ICS Threat Landscape
Power Grid Communications & Control Systems
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
115.pdf
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
ICS_Security_Use_Case_Presentation (1).pptx
ICS security
IT vs. OT: ICS Cyber Security in TSOs
Mission Impact Assessment for Industrial Control Systems
[CLASS 2014] Palestra Técnica - Alexandre Euclides
Securing Industrial Control System
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Ad

More from Joe Slowik (10)

PDF
The Convergence of Threat Behaviors Across Intrusions
PDF
The Disclosure Dilemma - Ensuring Defense
PDF
Understanding Indicators
PDF
Burrowing Through The Network - Contextualizing The Vulkan Leaks
PPTX
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
PDF
Thrice Is Nice: Ukraine In Review
PDF
Full-Spectrum Information Operations for Critical Infrastructure Attacks
PDF
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
PDF
EASE spectre meltdown_support
PDF
SANS DFIR Prague: PowerShell & WMI
The Convergence of Threat Behaviors Across Intrusions
The Disclosure Dilemma - Ensuring Defense
Understanding Indicators
Burrowing Through The Network - Contextualizing The Vulkan Leaks
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Thrice Is Nice: Ukraine In Review
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
EASE spectre meltdown_support
SANS DFIR Prague: PowerShell & WMI

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25 Week I
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Reach Out and Touch Someone: Haptics and Empathic Computing
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx

Past and future of integrity based attacks in ics environments