기본 콘텐츠로 건너뛰기

How hackers exploit critical infrastructure

Edward Amoroso, CEO, TAG Cyber, July 19, 2018
The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT) and industrial control system (ICS) infrastructure have become much more prominent components of national critical infrastructure, that malicious hacking activity would be increasingly targeted in this direction.
It also stands to reason that the salient aspects of hacking – namely, remote access, automated tools, and weak attribution – would extend naturally to malicious targeting of critical OT/ICS infrastructure. These attributes are particularly attractive in this context, because criminals interested in disrupting factories, production systems, and other tangible infrastructure, previously had to establish physical presence or compromise some group with local access.
The new approach to OT/ICS hacking involves a combination of traditional techniques with domain expertise of the systems being targeted – although little expertise might be required to trigger damage to an ICS/OT system. The most powerful issue here is the ability for attackers to target tangible systems such as power plants and refineries, without having to step foot into the local facility. This is a major departure from historic norms.
It is instructive to review the details of some previous OT/ICS attacks with emphasis on how malicious actors adapted familiar hacking methods with the specifics of the targeted ICS system. In the sections below, we examine two of the more well-known example hacks that have occurred in the past few years – namely, the Stuxnet worm of 2010 and the Ukrainian Power attack of 2015.

Stuxnet attack

Stuxnet consisted of worm functionality operating in the upper layers of the Purdue Model that was designed to locate and attack OT resources in the lower layers. Specifically, the worm was propagated by unknowing humans with malware-infected USB sticks transported and used across critical infrastructure sites. Once resident on a Windows computer, the worm searched for the presence of Siemens control-system software used to control electromechanical devices.
If the Stuxnet search on a given Windows machine located the desired Siemens control software, the toolkit would propagate throughout all of the computers in the Siemens control system, through firewalls and across IP networks. When the Stuxnet malware found the responsible computers, then a powerful rootkit was downloaded into what is known as a programmable logic controller (PLC), as found in Layer 1 of the Purdue Model. PLCs control many types of physical systems.
While many questions remain as to the origin of the attack, the security community generally agrees that Stuxnet was developed to target gas centrifuges in Iran’s uranium enrichment facilities. The consensus opinion is that the worm used its rootkit payload to send special destructive commands to Iran’s enrichment infrastructure as an alternative to conventional forms of attack. The attack forced changes in the rotor speed of the gas centrifuges to cause permanent damage to these devices – all done remotely.
Stuxnet attack progression
Understanding how Stuxnet might have been prevented offers useful hints about OT/ICS security. First, one would likely point fingers at the Microsoft and Siemens software, both of which provided a friendly environment for the USB worm. Four zero-day vulnerabilities in Microsoft Windows, for example, were used to infect target systems. So, it is reasonable to recognize the impact of platform vulnerabilities as a root cause in present and future OT/ICS attacks. This is not a problem that will ever go away – all software has defects, and some of those defects are vulnerabilities, known and unknown.
Second, one would recognize the ease with which the worm was able to propagate from higher levels of the architecture to lower levels. This suggests that OT/IT interfaces require at least the same levels of gateway protection one finds in a typical enterprise gateway. This implies that the lower layers of the Purdue Model should not implicitly trust software operating at the higher levels.
This is easier said than done, but the way, because the worm demonstrated the functional ability to automatically jump through firewalls across encrypted, authenticated connections. Imposing new cyber security requirements such as two-factor authentication between processes communicating across the OT/IT interface would have done little to slow down Stuxnet.

Ukrainian power hack

In December of 2015, hackers compromised electric power distribution to citizens of Ukraine. Three energy companies – all with names too long to repeat here – were targeted and the bottom line is frightening: Nearly a quarter of a million people had no electricity for several hours. The origin and motivation of the attack have been debated, but would seem less relevant than the question of how to prevent such a thing from occurring in the future.
Analysis of the attack reveals use of a multitude of different SCADA cyberattack methods including the following components:
  • Trojan Malware – Advanced Windows-executable malware called BlackEnergy was identified, but was not implicated in the outage. Instead, standard hacktivist remote control methods were most likely used.
  • Spear Phishing – Attackers used email spear phishing with spoofed sender identity (Ukrainian Parliament) and malicious attachments.
  • Remote Control – The attack resulted in remote operation of power company substation equipment and systems.
  • Destructive Action – The KillDisk utility delivered as part of the attack destroyed files on substation servers and devices.
  • Denial of Service – Power company customer support centers experienced DDOS attacks to degrade their ability to provide service to affected customers.
This coordinated attack suggests that the IT/OT interface for these Ukrainian power companies was largely unprotected. Each of the components in the attack are well-known to the cyber defense community, and while no cyberattack risk can be reduced to zero in any case, the protections here seemed much too ineffective for users and systems in an electric power grid environment.
Perhaps the greatest lesson from the Ukrainian attack is that critical infrastructure providers must develop and maintain higher cyber security standards than purveyors of more mundane systems and services. The idea that such an extensive collection of attacks might be successfully engaged with these companies should sound alarms across the entire industry segment – and this includes power companies in larger countries such as the United States.
A basic notion that such companies might consider involves separation enclaves around power substation or related functions. This might be best accomplished using separate physical communications infrastructures. These separate physical enclaves would also benefit from powerful gateway solutions implementing unidirectional communications flow. This would ensure that hacks to the IT portion of a power company would not cascade to OT substations.
IT/OT substation protection using advanced separation technology
Regardless of the specific types of cyber security technologies being used, the idea that substations might be separated into physically discrete domains across power company infrastructure provides powerful protection against the types of cascading attacks so commonly found in advanced attacks, especially from nation-state actors.

Lessons for OT/ICS security

Designers and operators of OT/ICS infrastructure should recognize that incidents such as the Stuxnet worm and the Ukrainian Power Company attack offer clear hints as to the best security solutions for the sector. First, it should be clear that standard IT-based cyberattacks can and will be launched at their OT systems. This suggests that a role will exist for traditional security vendors who can adapt their approaches to work across OT/IT interfaces.
Second, they must recognize that exploitable ICS vulnerabilities will always exist in OT infrastructure, and that malware is being designed to specifically target these weaknesses. It is no longer an acceptable security solution to simply presume that because technology differences might exist between IT and OT-based systems, that cyberattacks will not cross the boundary. Recent evidence clearly suggests the contrary.
Finally, these recent attacks suggest that this presumed technology gap between IT and OT systems is certainly shrinking. The idea that malware might seek, find, and destroy SCADA capabilities in a worm launched using conventional IT social engineering (e.g., dropping memory sticks in parking lots) should create chilling prospects for OT/ICS security engineers. Let’s hope the community pays attention and takes protective action immediately.

댓글

이 블로그의 인기 게시물

지문 넘어 정맥·홍채로...4000억원 '생체인증' 선점경쟁

4000억원 규모 국내 생체인증 시장을 선점하기 위해 관련 업체 경쟁이 치열하다. 생체인증시스템이 현금자동입출금기( ATM )부터 공항 신분확인, 기업 출입관리까지 다양한 분야로 확대된다. 지문인증을 넘어 손바닥, 손가락 정맥(장정맥, 지정맥)과 안면, 홍채 등 다양한 신체 부위를 활용한 인증 솔루션이 각광 받는다. 25일 업계에 따르면  Sh 수협은행은 장정맥 기반 금융서비스를  ATM 에 먼저 적용한다. 자체 기기에 도입하는 데 그치지 않고, 장정맥 인증 확산을 위해 타행· GS 리테일과 제휴도 추진한다.  GS 25 편의점 내  ATM 에서 장정맥 인증으로 입·출금, 계좌이체 등이 가능해진다. 신협중앙회는 손가락 정맥패턴을 이용한 '지정맥' 인증 시스템을 고객 간편결제 서비스에 도입하는 방안을 검토한다. 지난해 시스템 통제와 임직원 확인용 지정맥 인증을 사내 도입했다. 생체인증은 금융권 중심으로  ATM 과 개인금고, 공항, 기업 출입 등 다양한 곳에 활용된다. 한국후지쯔는 신한은행 시작으로 국민은행, 우리은행,  NH 증권, 롯데카드, 케이뱅크 등에 장정맥 인증 서비스 '팜시큐어'를 공급했다. 제주·김포공항에 장정맥을 이용한 실명확인 시스템을 구축했다. 동서석유화학,  SK 텔링크 등 일반 기업도 도입했다. LG 히다찌는 지정맥 인증 서비스를 신협중앙회 사내통제시스템뿐 아니라  BNK 부산은행 스마트  ATM 에도 공급했다. 부산은행은  ATM 뿐 아니라 은행창구 등에도 지정맥을 활용한다.  LG 히다찌는 신한카드, 나이스정보통신 등과 업무협약을 맺고 오프라인 간편결제로 지정맥 활용 준비 작업에 나섰다. 계명대 동산의료원과도 업무협약을 맺고 병원 인증시스템 도입도 검토한다. 국내 스타트업 위닝아이는 카메라를 이용한 손바닥 인증 기술을 전북은행 '뉴스마트뱅킹', 한화손해보험 '스마트인슈', 신영증권 등에 공급했다. 현대모비스와 손잡고 차량용 인증 기술 개...

BLACK LABEL, An IoT Security and Platform Company, Signed An MOU of Developing Security Solution for WDF Cryptocurrency

On June 21, 2018, Black Label Gangnam signed an MOU for the development of an integrated security solution for electronic wallets, servers and shopping malls to be issued by (re) the WDF cryptocurrency by the World Distribution Federation.  (re) The World Trade Federation, under the umbrella of the United Nations, is building a global distribution platform with more than 80 member countries around the world. On this platform, we are developing cryptography for the payment of funds for distribution and for the payment of shopping malls, and have developed this security solution in conjunction with the black label and signed a working agreement for integration. We are going to issue an IC card with the black label's patented pattern-free personal identification code (RSA +, BLACK LABEL's Patent Technology) and apply it to individuals ' electronic wallets, company servers, and shopping mall payment security.  The biggest problem with cryptography is the physical security of...

BLACK LABEL IoT SECURITY SOLUTION, MUTUAL VERIFICATION SYSTEM

Black Label's security solution is a mutual verification system, which is a personal identification security solution through mutual verification between SIM and identity authentication server. Among existing wireless communication networks, a mobile communication network using a USIM, which is a personal identification device, is considered to be most secure against hacking. This is because the USIM card has a personal identification code, including the user's mobile communication number, so it sends and receives a telephone call or message after authentication. BLACK LABEL has developed a security solution called "Mutual Verification System" by utilizing the characteristics of SIM and enhancing the disadvantages of the personal identification process to enhance the personal identification security. The mutual verification system is a system that sends and receives personally identifiable information to the authentication server by infinitely changing the i...