Top Banner
Cyber Security in Real-Time Systems Threats to SCADA and other real time systems an update from the coal face. David Spinks – Independent Cyber Security Consultant April 2015 CSIRS Cyber Security in Real-Time Systems
33
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security Threats to Industrial Control Systems

Cyber Security in Real-Time Systems

Threats to SCADA and other real time systems an update from the coal face.

David Spinks – Independent Cyber Security Consultant

April 2015

CSIRSCyber Security in Real-Time Systems

Page 2: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Why me?

Page 3: Cyber Security Threats to Industrial Control Systems

1970/75 – Glaxo Laboratories Cambois Northumberland -Worlds First Large Scale Automation

Page 4: Cyber Security Threats to Industrial Control Systems

1990 - 2000

Railtrack Safety Critical Software

Sizewell B Software Emergency Shut Down code validation

UK Government assessment of Embedded Software Aviation

Page 5: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Industrial Control SystemsCurrent Business

Environments&

Drivers

Page 6: Cyber Security Threats to Industrial Control Systems

“The Grey”

Traditional IT Industrial Control Systems

?

Page 7: Cyber Security Threats to Industrial Control Systems

IT Tools, Methods, Culture ICS Culture, Tools

Very different and apparently no middle ground

“The Cavalry fast moving and flexible” The Cannons fixed, slow yet effective not changed much for centuries

Page 8: Cyber Security Threats to Industrial Control Systems

Scada Hybrid Networks security comparison

Page 9: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Little or no action to close the gap?

Page 10: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Advanced :

Planned ahead of timeExecuted by individuals who have expertiseIntelligence gathered about “target” in advanceAdoption of social engineering techniquesCovering of entry and exit pointsMotive not always understoodPerpetrated by unknown agencies

Multiple points of entry technical and non-technicalComplex execution across a period of time may be months or yearsUse of multiple technologies, tools and techniquesInsider threat must be considered a possible entry point Will explore logical and physical security weaknessesMay extend to supply chain

Changes in education of IT and ICS engineers

Changes in culture in large organisations

Disclosure & Legislation & Regulation

Information exchange

Investments in ICS security

Changes in ICS vendor culture

Possible Actions

Page 11: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

What do recent statics and surveys show us?

Page 12: Cyber Security Threats to Industrial Control Systems

Trends impacting ICS Cyber Security

Business demands that data be passed from ICS to IT. Direct and indirect connections.

Sophistication of attacks (the ones we know about) is increasing.

75% of breaches are discovered by third parties.

Resulting impacts of each attack is growing exponentially.

Page 13: Cyber Security Threats to Industrial Control Systems

Documented Attacks on ICS from US ICS Cert Report

Page 14: Cyber Security Threats to Industrial Control Systems

The majority of incidents were categorized as having an “unknown” access vector. In these instances, the organization was confirmed to be compromised; however, forensic evidence did not point to a method used for intrusion because of a lack of detection and monitoring capabilities within the compromised network

Page 15: Cyber Security Threats to Industrial Control Systems
Page 16: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Example of poor monitoring of a SCADA

system.

Page 17: Cyber Security Threats to Industrial Control Systems

Information about the 8 November incident came to light via the blog of Joe Weiss who advises utilities on how to protect hardware against attack.Mr Weiss quoted from a short report by the Illinois Statewide Terrorism and Intelligence Center which said hackers obtained access using stolen login names and passwords. These were taken from a company which writes control software for industrial systems.The net address through which the attack was carried out was traced to Russia, according to Mr Weiss. The report said "glitches" in the remote access system for the pump had been noticed for months before the burn out, said Mr Weiss.

Page 18: Cyber Security Threats to Industrial Control Systems

“I could have straightened it up with just one phone call, and this would all have been defused,” said Jim Mimlitz, founder and owner of Navionics Research, who helped set up the utility’s control system. “They assumed Mimlitz would never ever have been in Russia. They shouldn’t have assumed that.”

Mimlitz’s small integrator company helped set up the Supervisory Control and Data Acquisition system (SCADA) used by the Curran Gardner Public Water District outside of Springfield, Illinois, and provided occasional support to the district. His company specializes in SCADA systems, which are used to control and monitor infrastructure and manufacturing equipment.

Mimlitz says last June, he and his family were on vacation in Russia when someone from Curran Gardner called his cell phone seeking advice on a matter and asked Mimlitz to remotely examine some data-history charts stored on the SCADA computer.

Page 19: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Common ground might be the Security

Operations Centres?

Page 20: Cyber Security Threats to Industrial Control Systems

Post Event Investigations:

Access to HR

Attendance records

Door access logs

Audit records

Phone logs

Systems logs

Page 21: Cyber Security Threats to Industrial Control Systems

Potential Common Ground

Security

Operations Centre

IT ICS

Threats

Very few common methods such as NIST & Identity Management

Use Cases Mitigation

Impacts

DO-178C (avionics), ISO 26262 (automotive systems), IEC 62304 (medical devices), CENELEC EN 50128 (railway systems),

ISO 27001:2013Cobit 4.1ISFISO 20000

Tools

Risks

Investigations

Page 22: Cyber Security Threats to Industrial Control Systems

Potential Solution:

Small team cross trained across IT and ICS

Adoption of common language and understanding of impacts

Shared understanding of Threats

Devise and plan for integrated tools ICS<>IT

Speak to bot camps

Common understanding of potential impacts

But would require commitment and proper funding

Page 23: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Information and White Papers

Page 24: Cyber Security Threats to Industrial Control Systems

Lots of white papers and solutions are available

Page 25: Cyber Security Threats to Industrial Control Systems
Page 26: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Highest and Serious Threats

Page 27: Cyber Security Threats to Industrial Control Systems

Lessons still to be learnt

Insider threats

Social engineering

Prevent rather than respond

Effective intelligence and analysis

Planned and tested response to threats

Page 28: Cyber Security Threats to Industrial Control Systems

Solution:

Understand what is “normal”

Monitor for unusual trends

Collect and analyse cyber intelligence

Investigate

Act accordingly

Actions

Page 29: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Recent media reports

of interest

Page 30: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Planned ahead of timeExecuted by individuals who have expertiseIntelligence gathered about “target” in advanceAdoption of social engineering techniquesCovering of entry and exit pointsMotive not always understoodPerpetrated by unknown agencies

Rail signal upgrade 'could be hacked to cause crashes'

Prof David Stupples told the BBC that plans to replace ageing signal lights with new computers could leave the rail network exposed to cyber-attacks.UK tests of the European Rail Traffic Management System are under way.Network Rail, which is in charge of the upgrade, acknowledges the threat.

http://www.bbc.co.uk/news/technology-32402481

Page 31: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Advanced :

Planned ahead of timeExecuted by individuals who have expertiseIntelligence gathered about “target” in advanceAdoption of social engineering techniquesCovering of entry and exit pointsMotive not always understoodPerpetrated by unknown agencies

The debate erupted after cybersecurity expert Chris Roberts, founder of One World Lab in Denver, sent a tweet while he was a passenger on a United Airlines flight suggesting he could hack into the airline’s onboard system to trigger the oxygen masks to drop.

When the plane landed in Syracuse, FBI agents were waiting to question him and confiscate his electronic devices, according to a statement from Roberts’ attorneys.

United Airlines also was not amused and banned Roberts from flying on the carrier.

On the 27th April 2015 …. Yesterday

Page 32: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Advanced :

Planned ahead of timeExecuted by individuals who have expertiseIntelligence gathered about “target” in advanceAdoption of social engineering techniquesCovering of entry and exit pointsMotive not always understoodPerpetrated by unknown agencies

Persistent :

Today - American Airlines planes grounded by iPad app error

Page 33: Cyber Security Threats to Industrial Control Systems

CSIRSCyber Security in Real-Time Systems

Linkedin CSIRS :

http://www.linkedin.com/groupRegistration?gid=3623430

[email protected]

Questions?