26
Session ID: Session Classification: Slide of 26 xxx-xxxx xxxxxxxxxxxx Stuxnet Lessons for Defenders William Cheswick cheswick.com http://www.cheswick.com/ches 1 Monday, February 18, 13

Stu t18 b

Embed Size (px)

Citation preview

Page 1: Stu t18 b

Session ID:

Session Classification:

▶ Slide ▶ of 26 xxx-xxxx

xxxxxxxxxxxx

Stuxnet Lessons for Defenders

William Cheswickcheswick.comhttp://www.cheswick.com/ches

1

Monday, February 18, 13

Page 2: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 76 2

▶ I have never mounted a sophisticated cyber attack, nor have I

been cleared for official training.  The observations here come from twenty years of evil thoughts and

pondering offensive cyber activities.

Note:

Monday, February 18, 13

Page 3: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 76 3

▶ “Security people are paid to think bad thoughts”

▶ - Bob Morris

Monday, February 18, 13

Page 4: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Goals

EspionageDamageLoss of confidenceFalse flag operations

4

Monday, February 18, 13

Page 5: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Damage

Soft damageCan be very subtle, and disrupt operations for years.

Hard damagebest if replacement equipment is scarcemassive attack can overwhelm supply chainsIt is also much harder to do

5

Monday, February 18, 13

Page 6: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Soft Damage

Erasing or changing dataSubverting or destroying backups.

Make operators take the wrong actionPerhaps convince management that the project is not worthwhile

6

Monday, February 18, 13

Page 7: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Hard Damage

Destroying hardwaredisk crashes?Flash has a limited number of writes

Damage or destroy equipmentTake out a dam, blow transformers, etc.

7

Monday, February 18, 13

Page 8: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

“Gremlin attack”

Reduce confidence in the ventureMake them reject certain approaches“Cursing” a technique, certain equipment, or people

8

Monday, February 18, 13

Page 9: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

False flag operations

Attribution is the major problem in information warfare these daysMake it look like someone else is doing something bad

9

Monday, February 18, 13

Page 10: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Exploits

Day 0 exploits are rare, expensive, and have a shelf lifeStandard attacks still workCryptoBBB“social engineering” i.e. spy techniques

10

Monday, February 18, 13

Page 11: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26 11

software hacksday 0 exploits

expensive, single use, has a shelf lifewell-known exploits on old software

(which is common)

email/web injectionUSB sticks

Gain access

Monday, February 18, 13

Page 12: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

peoplenetworkdevicessoftware

12

Mapping

Monday, February 18, 13

Page 13: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

People

network administratorskey engineers/scientists

13

Monday, February 18, 13

Page 14: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

the Official Mapping/tracerouteSNMP dumpsreverse DNSpassive packet monitoringactivity of people (see above)

14

Network

Monday, February 18, 13

Page 15: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

industrial controllersnetwork gearclient hostsmisc. devices

often not updated

15

Devices

Monday, February 18, 13

Page 16: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Feedback

Operational progress, i.e. debuggingEspionage

16

Monday, February 18, 13

Page 17: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Exfiltrating Data

To the InternetVPNsstego: TCP headers, web requests, email, etc.Depends on the volume, which can be huge

Over the cell networkUSB sticks/laptops/cell phones?

strip search on your way out?

17

Monday, February 18, 13

Page 18: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Attacker’s concerns

Getting noticedGetting caughtExpending exploitsMisleading information

the double agent problem

Wasting time and money

18

Monday, February 18, 13

Page 19: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Attacker’s concerns

Controlling exponential growthMorris wormStuxnet got away, after a while

19

Monday, February 18, 13

Page 20: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 76 20

▶We know these attacks are real, and we know that you don’t have to be separating uranium

isotopes to be worth all this effort.

Monday, February 18, 13

Page 21: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26 21

You may well be a target

Attacks, even APT attacks, are relatively cheapThere is virtually no downside for the attackers

Monday, February 18, 13

Page 22: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

There are weak points in these attacks

Discovery phase can create brief signatures on the network and in hosts.Secret honeypots and sentinels can force attackers to show their handDeception toolkits

22

Monday, February 18, 13

Page 23: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Some thoughts

Require deep monitoring of your own peopleData exfiltration could be detectableBoot from clean operating system sources

23

Monday, February 18, 13

Page 24: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Network monitoring

Detect all SNMP activityLow TTL packets are highly suspect (traceroute of any kind)Any usual net activityHigh-entropy packets and flowsDay 0 backups for comparisons

24

Monday, February 18, 13

Page 25: Stu t18 b

▶ Presenter Logo

▶ Slide ▶ of 26

Network topography

Internet gateway? Really?Bulkheads and enclaves.

25

Monday, February 18, 13

Page 26: Stu t18 b

Session ID:

Session Classification:

▶ Slide ▶ of 26 xxx-xxxx

xxxxxxxxxxxx

Stuxnet Lessons for Defenders

William Cheswickcheswick.comhttp://www.cheswick.com/ches

26

Monday, February 18, 13