attacker aproach for attacking ics

30
Attacker approach for Attacker approach for attacking attacking attacking attacking Industrial Control Systems Industrial Control Systems

Post on 19-Oct-2014

499 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Attacker aproach for attacking ics

Attacker approach for Attacker approach for

attackingattackingattackingattacking

Industrial Control SystemsIndustrial Control Systems

Page 2: Attacker aproach for attacking ics

ICS from an attacker viewICS from an attacker view

• Highly attractable – Large scale damage, Effects daily life

• Systems are based on old technology – Information security is not

built-in, Security elements are not system specific

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

built-in, Security elements are not system specific

• System infrastructure is complex and includes proprietary

protocols

• ICS serve dynamic process and need frequent adjustments and

maintenance

Page 3: Attacker aproach for attacking ics

Attack type CategorizationAttack type Categorization

•• By Intention By Intention

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

•• By ScenarioBy Scenario

•• By System level being effectedBy System level being effected

Page 4: Attacker aproach for attacking ics

IntentionIntention

Unintentional Unintentional -- worms, viruses , control system failures

or consequences caused by internal

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Intentional Intentional -- Deliberate/ planned attack

or consequences caused by internal

personnel or faulty mechanisms

Page 5: Attacker aproach for attacking ics

Characteristics of an intentional targeted attackCharacteristics of an intentional targeted attack

• Requires detailed knowledge of the system and

supporting infrastructure

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

supporting infrastructure

• Directed to specific system elements and for a specific

outcome

• Almost always requires the help of an insider

• Code Will posses some control capabilities

Page 6: Attacker aproach for attacking ics

Basic attack ScenarioBasic attack Scenario

• Center to Field

• Field to Center

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Field to Center

• Center to center

• Field to Field

Page 7: Attacker aproach for attacking ics

System level being effectedSystem level being effected

• Global communication path

• HMI servers/stations

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Connection to filed elements

• HMI servers/stations

• PLC Memory/PLC logic

• PLC protocols

• IED elements signals

Page 8: Attacker aproach for attacking ics

MotivationMotivation

• Terror

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Terror

• Getting an advantage in war situation

• Industrial espionage

Page 9: Attacker aproach for attacking ics

Desired OutcomeDesired Outcome

• Alter

• Disrupt

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Deceive

• Degrade

• Destroy

• POC – Stage in attack tool dev.

• Building foundation for later use

Page 10: Attacker aproach for attacking ics

Time lineTime line

• Immediate effect

• Short term effect

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Long term effect

• Creating and maintaining attack base

Page 11: Attacker aproach for attacking ics

ControlControl

• Uncontrolled

• Unidirectional

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Bi directional

Page 12: Attacker aproach for attacking ics

MeansMeans

• DOS – Applications, control elements Network elements, Servers

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Physical damage

• Damage to DATA and/or Information

• Building Foundation for later use

Page 13: Attacker aproach for attacking ics

Scale of effectScale of effect

• Localized

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

• Localized

• Wide spread

• Cross infrastructures

Page 14: Attacker aproach for attacking ics

Choosing targetsChoosing targets

HMI servers

Control centerControl center

Field ElementsField Elements

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

GWs, FEPs, MTUs

Data Base/ Historian

Controller (logic/OS/Memory)

Protocols

Network and communication elementsNetwork and communication elements

Field ElementsField Elements

• IEDs

• Field controllers

• FIU

Page 15: Attacker aproach for attacking ics

Choosing Access pathChoosing Access path

Direct – Using local access to system elements (including use of

carriers)

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

carriers)

Indirect – Remote access Using network ,communication lines

Combined – local and remote access

Page 16: Attacker aproach for attacking ics

scalescale

OutcomeOutcome

MeansMeans• Alter

• Disrupt

• Deceive

• Degrade

• Destroy • Localized

• DOS

• Damage to

Flow ChartFlow Chart

TargetsTargets

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Time lineTime line

Control typeControl type

Access pathAccess path

• Destroy

• POC

• Building

Foundation

for later use

• Localized

• wide spread

• Cross –

infrastructures

• Damage to

DATA and

Information

• Physical

damage

• Immediate

• Short term

• Long term

• Uncontrolled

• Unidirectional

• Bi directional • Direct Local

• Indirect -

Remote

• Combined

TargetsTargets

• Control center

• Network and

communication

• Controller

• Field elements

Page 17: Attacker aproach for attacking ics

scalescale

OutcomeOutcome

• Alter

• Disrupt

• Deceive

• Degrade

• Destroy • Localized

• DOS

• Damage to

Flow ChartFlow Chart

TargetsTargets

MeansMeans

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Time lineTime line

Control typeControl type

Access pathAccess path

• Destroy

• POC

• Building

Foundation

for later use

• Localized

• wide spread

• Cross –

infrastructures

• Damage to

DATA and

Information

• Physical

damage

• Immediate

• Short term

• Long term

• Uncontrolled

• Unidirectional

• Bi directional • Direct Local

• Indirect -

Remote

• Combined

TargetsTargets

• Control center

• Network and

communication

• Controller

• Field elements

Page 18: Attacker aproach for attacking ics

• Software architecture

– Two tier architecture - HMI and communication server are

installed on the same machine

Topology based scenariosTopology based scenarios

installed on the same machine

– Three tier architecture- HMI clients, HMI server and or

communication server are installed on different machines

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 19: Attacker aproach for attacking ics

Basic ICS architecture

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 20: Attacker aproach for attacking ics

• Network architecture

– SCADA topology – PLC are installed across distributed,

Topology based attack scenarioTopology based attack scenario

– SCADA topology – PLC are installed across distributed,

large scale, wide area network, where the PLC might

operate using local logic commands.

– DCS , PLC and industrial control elements are installed on a

local area network , where most logic is installed on the

DCS software and not on the PLC.

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 21: Attacker aproach for attacking ics

Attack vectorsAttack vectors

• Protocols based attacks

• PLC logic based attacks • PLC logic based attacks

• SCADA/DCS software based attacks

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 22: Attacker aproach for attacking ics

Protocols +PLC Protocols +PLC

Two tier based attacks Two tier based attacks

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 23: Attacker aproach for attacking ics

Software + PLC Software + PLC

Two tier based attacks Two tier based attacks

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 24: Attacker aproach for attacking ics

Network two tier based attacks Network two tier based attacks

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 25: Attacker aproach for attacking ics

Combined three tier based attacks Combined three tier based attacks

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 26: Attacker aproach for attacking ics

Attack considerations Attack considerations

• Physical, logical or both

• SCADA ,DCS or mix

• Two tier or three tier

• method -Protocol or software

• Main targets

– HMI

– I/O server

– PLC

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 27: Attacker aproach for attacking ics

Attack scenarios Attack scenarios

• Physical interrupt

• DCS

• Two tier

• Engineering workstation

• PLC logic change

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 28: Attacker aproach for attacking ics

Attack Attack sequence sequence

• DCS software - technician laptop

• Protocol based attack

• Installed on the DCS control room main switch

• Step one : Proxy ARP manipulation - directing all

traffic from the HMI, engineering workstation to the

attacker laptop

• Attacker laptop will be used to intercept the

“command and utility” password

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 29: Attacker aproach for attacking ics

Attack Attack sequence sequence

• With the utility and command password, the

attacker will gain access to the PLC main

management interface

• Current logic is downloaded

• New logic is uploaded

• The virtual PLC software on the laptop, imitates the

old logic operation transmitting the old Tag’s data to

the operators (Business as usual from operator’s

view)

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved

Page 30: Attacker aproach for attacking ics

Attack Attack sequence sequence

• New PLC logic architecture

– Long term effect

– Low signature – Low signature

• Logic operation

• Steam turbine Vibration parameters modification

• When turbine start to vibrate out of the normal rate The

PLC shall transmit normal operation readings (This can go

on for years)

© 2008 PRE-VISION DATA SECURITY LTD. All rights reserved