defending your base of operations: how industrial control systems are being targeted at technet...

29
Defending Your Base of Operations How Industrial Control Systems are being Targeted TechNet Augusta 2015

Upload: afcea-international

Post on 22-Jan-2018

817 views

Category:

Government & Nonprofit


1 download

TRANSCRIPT

Page 1: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Defending Your Base of Operations

How Industrial Control Systems are being Targeted

TechNet Augusta 2015

Page 2: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Role of Cyber in Conflict?

Page 3: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Cyber Statecraft

Russia is using cyber attacks including online network disruptions, espionage, disinformation and propaganda activities in the Ukraine conflict.

Iran and North Korea now consider disruptive and destructive cyberspace operations a valid instrument of statecraft, including during what the U.S. considers peacetime. These states likely view cyberspace operations as an effective means of imposing costs on their adversaries while limiting the likelihood of damaging reprisals.

Terrorist groups and non-state actors also have shown an interest in cyber attacks but lack the capability of state-sponsored threats.

The director of the Defense Intelligence Agency, Marine Corps Lt. Gen. Vincent Stewart,House Armed Services CommitteeFeb. 3, 2015

Page 4: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 5: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Artic Competition Scenario

Page 6: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Cyber Espionage & IPB

www.fireye.com

FireEye Threat Intelligence assesses that threat actors aggressively target strategic industries and government and military organizations in search of valuable economic, political, or military intelligence.

• State sponsored threat actors• Possibility of strategic offensive computer network attacks

“Russia-based threat groups are known to target Nordic governments and industries that compete with Russia in the European energy market. Russia and its Arctic Circle neighbors have overlapping territorial claims and conflicting interests in the region.”

https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-nordic-threat-landscape.pdf

Page 7: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

IPB & Espionage: The Patient Warrior?

The patient warrior codex: Do no instantly

recognizable harm today. Maneuver to gain the

advantage and accumulate small victories in time. Act

so not to be perceived as striking. All the time learning,

taking, and eventually formulating a decisive blow.

Is IPB the cyber equivalent of the Battle of Ilipa in 206 BC?

Day after day, the battle lines formed up as both sides sized each other up. One side was being lulled by the routine, while the other was learning and formulating their attack. Each day the Carthaginian force took the field, Scipio was taking away something valuable from them...until he understood their critical weakness

…and on any given day we may wake to a surprise as the opponent’s line draws down with the full benefit of knowing us

Page 8: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

What Has Changed?The value-driven business model of targeted cyber attack.

Page 9: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Installation ‘ICS’ Susceptibility

Page 10: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Dangerous Seas - Behind?

OPM Espionage

Havex

Black Energy

APT1 Energy Campaign

German Iron Works

Page 11: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Tip of the Iceberg (ICS Attackers)

Page 12: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Observed Attack Trends• ICS-specific targeting, delivery, payloads (Stuxnet, Havex, BE2)

• Overcome expected defenses - gap jumping (Stuxnet, Havex)

• Protocol custom/capable attacks (Havex)

• ICS-specific exploit tool development (Researchers, Havex, BE2)

• ICS-specific exploit tools used (Honeypot research, Havex, BE2)

• Process-focused & equipment under control (Stuxnet, BSI Incident)• Firmware aware (Honeypot research)

• Data destruction/resource depletion (Incidents, BE2 Module)

• Sophisticated cyber tradecraft able to defeat security tools

Page 13: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Requires Multi-Staged Attacks

Page 14: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Stage 1 - ICS Kill Chain

Page 15: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Stage 2 - ICS Kill Chain

Page 16: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 17: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 18: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Energy Targeting

Page 19: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 20: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 21: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 22: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

How Sophisticated is It?

Page 23: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 24: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 25: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

ICS 515

Page 26: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015
Page 27: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Importance of Engineering

Technology

O

p

e

r

a

t

i

o

n

s

P

r

o

c

e

s

s

“Attackers are learning the importance of what is below the waterline…so

should we”

Page 28: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Cyber Informed engineering

Page 29: Defending Your Base of Operations: How Industrial Control Systems are Being Targeted at TechNet Augusta 2015

Questions?