50
Project RunAway Orlando, Florida February 2020

Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Project RunAway

Orlando, Florida

February 2020

Page 2: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Yair Attar, CTOMaj. (Res.)

The Team70+ experts

Automotive

1 of the top 3global OEMs

Maritime

1 of the top 3 global maritime

companies

Pulp & Paper

1 of the top 5 global paper

manufacturers

Machinery

A leading global industrial

engineering group

Energy

A global leading F500 sustainable energy company

Daniel Bren, CEOBrig. Gen (Res.)

OTORIO – INDUSTRIAL-NATIVE CYBER SECURITY SOLUTIONS PROVIDER

Partners168 years of industrial engineering

Page 3: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Even industrial companies can be hacked

You don’t need to be a nation state in order to have sustainable offensive capability

Page 4: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Even industrial companies can be hackedNo more need for zero days

No more need for nation state reconnaissance and knowledge

Page 5: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

But wait, how can we predict this?

Page 6: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Companies expose themselves more and more…

• Shodan

• Leaks

• Industry 4.0

• OT security – Still in infant stages

• Connectivity between IT/OT – OT information flows upwards more than before

• Vendor and supplier interaction and involvement is on the rise

Page 7: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

It all started when

• We started a thought experiment, what is out there that can compromise our industrial clients?

• We started looking for data that can be used to harm our customers

• Malicious Software libraries (Open-source)

• Downloadable infected OT software (Havex scenario)

• OT data exposure

• …Malicious Project files? (Stuxnet)

Page 8: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What are we talking about?

Project FilesCloud

Malicious

Page 9: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What are project files?

Page 10: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Overview• Project files are the saved files produced by the automation software used by industrial engineers to

configure and program the different automation components

• Most of the global automation vendors combined all their different programs into one platform (TIA portal, Automation Studio …)

Page 11: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Hardware configurations• Different services - SNMP, OPC, WEB, Industrial protocols• IP address, firmware, additional configurations

Page 12: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Network topology

Page 13: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Automation logic source code

Page 14: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Project files deep dive• Tags I/O references• Memory variables• Global data locations

Page 15: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

HMI screens

Page 16: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What are we talking about?

Cloud Malicious

Page 17: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

We started to search for them online• And found them on VT

• And on additional research sites

Page 18: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What is VT?

Page 19: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What is VT in a few words• VirusTotal is an online service that analyzes files and URLs enabling the detection of viruses, worms,

trojans and other kinds of malicious content using antivirus engines and website scanners

Page 20: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What is VT in a few words• Scanning reports produced are shared with the public VirusTotal community

• The contents of submitted files or pages may also be shared with premium VirusTotalcustomers

• Provides qualified customers and anti-virus partners with tools to perform complex criteria-based searches to identify and access harmful file samples for further study

Page 21: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

We found so much data in VT• Thousands of project files (and counting)

• PLC projects / HMI / DCS / SCADA• Manuals, Emails, CAD, Remote connection• Configurations & asset management sheets• Varity of sectors• Dozens of automation vendors• 100+ new files each month

Page 22: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What are we talking about?

Malicious

Page 23: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What can an attacker do with a project file?

Page 24: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Basic Attack Flow – A true story

External Internet

IT Layer

OT Layer

Exploitation

Disrupting Operations

Physical Damage IP Theft

Monetary Damage

Reputation Damage

Competitive Damage

Reconnaissance & initial access to the network

Propagation and enumeration, gaining high privileges in the IT layer

Usage of gathered credentials and footholds to reach and communicate with PLCs on the

production floor

Attackers are able to influence production in any way they wish – damaging operations or stealing

data

Page 25: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Now that the attacker has a project file• He can determine what company is more interesting to try and attack

• When he is already in the network, he can understand what IPs and assets are interesting to attack

• He can create a tailored payload for the assets he discovered

Page 26: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Using these files – technical perspective• Use the automation software and investigate the project

• License

• Big projects – a lot of work understanding

• Parse & analyze them somehow • Proprietary formats

• Undocumented + very small work has been done in the past

Page 27: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

But all this seems hard…

Can we automate this process?

Page 28: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Framework overview

• Interactive Python framework• Input - parsed “project file”• Tag & code analysis• Automatic industrial payload based on it

Page 29: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Framework overview

Original Project File

XML Representation

Tag Analysis Code AnalysisMalicious Payload

SP_Tank_Level=

BAD_VALUE

S7Comm Packet

TIA project Step7 project

2 XML

Page 30: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Tag analysis – which tag to change?

• HMI tags• All HMI tags may be cool

• Configurable values that appear in HMI screens may be important (because they affect something)

• Tags with limitations are more interesting

• Dictionary analysis• Tags with predefined names

• Purpose-specific dictionary

• Code analysis• Statistical

• Symbolic execution

Page 31: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Payload generation

• S7Comm – change I/O, memory and DB• Over TCP/IP, can be attacked remotely

• More possibilities to affect the process

• Limitations: password protection, PUT/GET is not enabled, optimized DBs

• PROFINET I/O – change I/O• Layer 2 protocol

• Limitations: must be in the controller’s LAN

Page 32: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Demo Time

Page 33: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Demo time

• POC version –• Only supports Siemens projects

• Limited analysis

• Limited payload generation

• Factory I/O instead of real process• Looks good

• Connects to ours physical S7-1500 (+ET200S) PLC

• Really simulates a physical process

• https://factoryio.com/

Page 34: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What are we talking about?

Page 35: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

So how big is this event?

Page 36: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

How did the files end up in VT?

• Intentional/unintentional• Amount of data

• Geographical/Sector spread

• Sensitive files

• Automatic/manual + what?• AV

• EDR

• Intrusion detection systems

• Email gateway filters

IT Network

OT Network

Corporate

Engineers

Process 1 Process 2

Backups,FileServers

Level 4IT Network

Level 3Operations

Level 2Process Network

Level 1Control Network

EWS

VT

Email gateway

Page 37: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

How did the files end up in VT? - example

Company X InternationalWell known European Automotive supplier

Employees – 1000+

• 500MB+ of files

• Dozens of project files – Various types of machines

• Along with the projects themselves – PDFs, manuals, network architectures, CADs…

• In most cases the data was attached to e-mail correspondences

Dozens of the largest global OEM’s + Tier1’sas customers

Page 38: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

OEM

How did the files end up in VT? - example

Supplier

Mail service

VT

OEM

TIER 1

Page 39: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different
Page 40: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Sectors

Page 41: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Types

Page 42: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different
Page 43: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What have we done?• Contacted VT

VT has a lot of warnings in the site about it, like "you further agree that you will only upload samples that you wish to publicly share and that in any case, you will not knowingly submit any sample to the service that contains confidential or commercially sensitive data or personal data of any individual without lawful permission"

You can find a "I have accidentally uploaded something private" topic in VT’s contact form to take care of unintentional upload cases

Page 44: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What have we done?• Contacted Siemens CERT

It is a user’s responsibility not to use an AV solution that uploads all his/her data to a third party. Especially if that third party then in turn forwardsthe data to other unknown entities that pay for this service. This is not only true for ICS related data (such as TIA project files), but also for other data that is exchanged via email

Page 45: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

What have we done?• Notified the different CERTs from the areas that got hurt

Page 46: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

This is some crazy sh*t, what can we do to protect ourselves?

Page 47: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Protect! • Use the Software’s access management when available

• Protect files at rest• Access protection using file system rights

• Encrypt files in transit• Encrypted ZIP archives

• Storage in an encrypted drive container

https://support.industry.siemens.com/cs/document/85237682/how-can-you-protect-step-7-(tia-portal)-projects-against-unauthorized-access-and-modifications-?dti=0&lc=en-WW

Page 48: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Project protection

Page 49: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

Prevent unintentional upload to VT• Define EDR/DLP to stop uploading to VT

• Define mail scanner to stop uploading to VT

• Carbon Black example

https://www.carbonblack.com/2017/08/09/directdefense-incorrectly-asserts-architectural-flaw-in-cb-response/

Page 50: Project RunAway · • Vendor and supplier interaction and involvement is on the rise . It all started when ... •Most of the global automation vendors combined all their different

STAY SAFE

Matan [email protected] @matan_dobr

Yoav [email protected] @YoavfFlint

Special thanks goes to: Itamar Shiryan, Omri Bavly, Anton Dvorkin and all the rest of the team @OTORIO