Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC...

26
SESSION ID: SESSION ID: #RSAC David Formby Out of Control: Ransomware in Industrial Control Systems SEM-M03 PhD Candidate, Georgia Institute of Technology www.ece.gatech.edu/cap CEO/CTO, Fortiphyd Logic www.fortiphyd.com

Transcript of Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC...

Page 1: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

SESSIONID:SESSIONID:

#RSAC

DavidFormby

OutofControl:RansomwareinIndustrialControlSystems

SEM-M03

PhD Candidate, Georgia Institute of Technology www.ece.gatech.edu/cap CEO/CTO, Fortiphyd Logic www.fortiphyd.com

Page 2: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

Pu/ngontheBlackHat

2

Most malware authors and attackers are in it for the money Ransomware is the hot new business model

$209 Million profit in Q1 2016 Source: CNN, “Cyber-extortion losses skyrocket, says FBI”

High profile ransomware attacks San Francisco’s light rail system Hospitals

Where might an enterprising young hacker attack next?

Page 3: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

MarketResearch

Page 4: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

BriefHistoryofRansomware

4

Locker Ransomware Renew software license Fake AV FBI threats Awareness and security tools decreased effectiveness

Crypto Ransomware No false pretense, clear extortion No easy recovery

SymantecWhitepaper“TheEvoluIonofRansomware”

Page 5: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

BriefHistoryofRansomware

5

Page 6: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

TheRansomwareRaces

6

Time

Cost

Personaldata

UlEmatum

Hospitals

ICS

Page 7: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

OverviewofIndustrialControlSystems

7

InternetWebServer

Email BusinessWorkstaIons

PLCs,controllers

CorporateNetwork

ControlNetwork

Historian EngineeringStaIon

HMI

PhysicalPlant

Page 8: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

ICSSecurity

8

Most protocols have no message authentication Accept any command injected on the network

Most PLC programming interfaces lack solid password authentication

Nonexistent Misleading Poor protection against brute forcing

Rely on fallacies Security through obscurity “Airgaps”

Page 9: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

WhatMakesaRansomwareAQackSuccessful?

9

Hospitals Easier targets

Old equipment Traditionally weak security posture

Increasing time pressure

Lives at stake

Crown jewels = patient data

ICS Networks Easier targets

Old equipment Traditionally weak security posture

Increasing time pressure

Lives at stake

Crown jewels = safe operation

Page 10: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

MarketSizeAnalysis

10

Businesses Hit by Ransomware

70% paid the ransom

Median payout approx. $10k

Small, medium sized businesses less prepared

PLCs on the Internet MicroLogix 1400

1,300

Schneider Modicon M221 200

1,500 $10,000 50%

TrivialPLCs Expectedpayout ConservaIvesuccessrate

X X = $7.5Million

Source:IBM,“Ransomware:Howconsumersandbusinessesvaluetheirdata”

Page 11: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

AUack

11

Page 12: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

WaterTreatmentFacility

12

TypicallymixedwithchlorinetokillbacteriaWeuseiodinebecauseit’ssafertohandleandcoolerlooking

TestbedsimulatestheDisinfecIonandStoragestages

Source:CDC,“WaterTreatment”

Page 13: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

Recon

SearchengineforconnectedICSdevices

Page 14: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

Recon

14

Commonprotocol,Modbus

Over13,000results

Plentyofchoicestochoosefrom,justpickone

Page 15: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

IniIalFoothold

15

Schneider Modicon M241 Running CODESYS V3 Third party PLC runtime environment used by over 200 vendors Password — No brute force checks — No strength policy

Controlling the water input and monitoring the storage levels

Page 16: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

InternalNetworkScan

16

ReprogramtheM241toscantheinternalnetworkandgrabmodelnumbers

AllenBradleyMicroLogix1400

ModiconM221

Page 17: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

InternalNetworkScan

17

Allen Bradley MicroLogix 1400

Password only checked in engineering software, NOT the PLC

SMTP mail client

Controlling the addition of chlorine (iodine)

Schneider Modicon M221 Password only checked in engineering software, NOT the PLC

Controlling the final output of treated water

Page 18: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

ActualNetwork

18

Internet

Allow:External to AInternal to Internal

A CB

Pumpoutput

Mixwithchlorine

Monitorlevels,input

Waterusedbycustomers

StorageTankWaterfrom

previousstage

Page 19: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

ActualNetwork

19

Inputwatervalve

Outputwatervalve

MixingvalvetocontrolraIoofwater/iodine

Programmablelogiccontrollers

Levelsensors

Page 20: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

HowCanWeMaximizeSuccessRate

20

Pick targets with high downtime costs Understand the process behind the PLCs Threaten to screw things up if they don’t meet deadline

What if they just unplug everything?

Covertly move system into critical state before notifying them Allow reserve storage tank to get low first, blinding operators Make continued operation by attacker more attractive than shutting everything down

Page 21: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

WaterTreatmentTestbed

21

hQps://youtu.be/KTKRjvTgTQI

Page 22: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

AQack

22

hQps://youtu.be/t4u3nJDXwes

Page 23: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

Discussion

Page 24: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

Apply:LessonsLearned

24

ICS networks and devices are STILL very vulnerable Poor/nonexistent password protection Vendors slow to fix obvious problems A lot of exposed devices on the Internet

Ransomware trend is likely to jump to ICS Early signs attacking corporate networks of ICS Easy targets Money and lives at stake

Page 25: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

Apply:Defenses

25

Know your network Devices, remote vendor connections

Security assessment Firewall rules, segmented network, proper remote access Passwords

Monitor at the ICS level Communication patterns PLC programming events

Pressure vendors to build more security into their products

Page 26: Out of Control: Ransomware in Industrial Control …cap.ece.gatech.edu/plcransomwareslides.pdf#RSAC Pung on the Black Hat 2 Most malware authors and attackers are in it for the money

#RSAC

ThankYou!

26

DavidFormby

[email protected]

@gtcapgroup@davidjf12

ForEphydLogic

[email protected]

@forEphyd