Top Banner
Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A. Trombetta European Commission Joint Research Centre Critis 2008, Rome, October 15, 2008
19

Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

May 30, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Scada Malware,A Proof of Concept

A. Carcano, I. Nai Fovino, M. Masera, A. TrombettaEuropean Commission Joint Research Centre

Critis 2008, Rome, October 15, 2008

Page 2: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Outline

• Motivations

• Testing Environment

• Experimental Program

• Results

• Conclusion

Page 3: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

CI Dependence on IT Systems

• Today most of critical infrastructures depend highly on the underlying communication networks.

Central Monitoring Unit

CommunicationsNetwork

Sensor

Remote Terminal Unit 1

Remote Terminal Unit 2

Sensor

Programmable Logic Controller

Sensor

Fiber, Radio, Modem,Microwave, Telephone, Wireless, Powerline Carrier

Adapted from: Joint Program Office for Special Technology Countermeasures Naval Surface Warfare Center, Dahlgren Division

-Remote Control-Remote maintenance-New features

-New Vulnerabilities-New Attack Scenarios-New Threats

Page 4: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Computer Attacks

Most of attacks are Malware basedMost of attacks are Malware basedVirusVirus

WormWorm

TrojanTrojan

diagnostics diagnosticsvibrations

common services

gateway

Process networkcontrol

field bus

actuators / transductorsControl system

Combustionchamber

air

gas

fumesTurbogasTurbine GCompressor Steam

generator

fumeswater

steam

GTurbine

comandsalarms - blocks

supervisionmonitoringdiagnostics

Fieldcontrol

Turbo Gascontrol

Office network

routerWorkstation

Intranet

firewallfirewall

DMZData Network

data server

router

ExternalNetwork

comandscontrol datasupervisionmonitoringdiagnostics

Plantcontrol

Known EffectsUnknown Effects

Need of concrete studieson the effects of Malwareson Critical Infrastrucutres

Page 5: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Problems

• How to simulate malwares on Critical Infrastructures?

• How and where to study their effects?

Page 6: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Malware Simulation: MAlSim Toolkit

• MAlSim Toolkit:• Various families of malware (worms,

viruses, malicious mobile code etc.)• Various species of malware of the

same family (e.g. macro viruses, metamorphic and polymorphic viruses etc.)

• Well-known malware (e.g. Code Red, Nimda, SQL Slammer)

• Non-existent configurations

Page 7: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Power Plant Simulator

Power Plant EnvironmentPower Plant Environment Field NetworkField Network

Process NetworkProcess Network

Data NetworkData Network

DMZ NetworkDMZ Network

Intranet NetworkIntranet Network

Attack SourceAttack Source InsideInside

OutsideOutside

System MeasurementsSystem MeasurementsAnalysis SystemsAnalysis Systems Vulnerabilities RepositoryVulnerabilities Repository

Binaries RepositoryBinaries Repository

InSAWInSAW

Experiments ArchiveExperiments Archive

Page 8: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Ad-Hoc SCADA Malwares

ConsiderationsAbout “SCADA”

Protocols

Such protocols, are normallyused by some dedicated servers in order to send

commands to the field devices

ModBUS

DNP3

ProfiBUS

…Others…- Application layer messaging protocol

- Provides Client/Server communication service

- TCP/IP Implementation - Widely Used

Lack of:

-Integrity controls-Authentication Mechanisms-Non Repudiation Mechanisms- Anti-replay Mechanisms

It is possible to create a set of MalwaresWhich take advantage of such basic vulnerabilities

Page 9: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Attack Scenarios (1)

ModBUS Malware DOS- Attack Scope

- To desynchronize the communication between Master and Slave - To completely avoid the communication stream between Master and

Slaves- Code Implementation

- A Packet builder, which forges in the proper manner ModBUS over TCP packets.

- A Discovery engine, which explores the network in order to identify the IP addresses of the Modbus slaves.

- A Packet deliverer, which sends in an optimized way the previously forged packets to the target slaves, in order to saturate the bandwidth as soon as possible.

Page 10: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

- Infection Trigger:

Attack Scenarios (1)

FW-VPN

Master/Secondary

ModBus DOS Worm

Slammer

Slammer Infection Engine

Modbus Packet Generator

Discovery Engine

Malsim Framework

-Slammer-Nimda-Poskiwing(6 october)- …

Page 11: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Test Results

1. Anti-viruses do not recognize the ad-hoc crafted malware

2. Firewalls do not stop the traffic generated by the malware since it has the shape of “legal ModBUStraffic”

Page 12: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Attack Scenarios (2)

ModBUS COM Worm- Attack Scope

– The scope of the Com Worm attack is to take the control of the slaves of the process control architecture by taking advantage of the lack of authentication and integrity countermeasures of the ModBUS protocol.

- Code Implementation- A Packet builder- A Discovery engine- A Strategy & analysis module, which, on the basis of the information

gathered by the discovery engine and some built-in heuristics identifies the strategy to adopt in order to send packets which could create damages to the system.

- A Packet deliverer, which send the forged packets to the target slaves

Page 13: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Experimental tests

• Worm prototypes:- Step 1 Malware: it replicates the MODBUS function 15 (0x0F), used to

force each coil in a sequence of coils to either be ON or OFF in a remote device(valve).

- Step 2 Malware: Through the function 16 it is able to write a block of contiguous Input registers (1 to 123) in a remote device.

- Step 3 Malware: by combining the two ModBUS functions (0x01) (read output values) and (0x0F) used to force a sequence of coils, it revert completely the configuration of the target system (e.g. if a valve is opened it will be closed and viceversa.

Page 14: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Experimental Considerations

• Antiviruses do not identify the new worms

• Firewall completely ignores the attacks since the traffic appears completely legal

• The slaves execute in all the cases all the worm command, without identifying any anomaly.

Page 15: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Conclusion

• Industrial SCADA protocols are far to be considered secure• In this paper we proved that the scenario in which a worm could

take the control of a portion of an industrial plant is nowadays a reality.

• Traditional Antiviruses and FW are inadequate for several reasons:– SCADA systems are very specialized systems, using dedicated

protocols (sometimes proprietary).– Anomaly detection techniques cannot be easily deployed into

industrial systems.– Patches could interfere with some particular ad-hoc sw.

• Future works:- SCADA Intrusion Detection System- Secure SCADA protocols

Page 16: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.
Page 17: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Old Operating Systems:

• Win NT 3.0 /4.0• Win 2000• BSD• SCO

…Considerations (1)

Rare Patching

Policies

Low “ICT Security Perception”

Considerationsabout Process Sub-Systems

Process Sub-Systems

are typically prone to

traditional malwares

Page 18: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

Consequences of pervasive ICT

- Software Vulnerabilities- Architectural Vulnerabilities- ICT Security Policy Vulnerabilities

Consequences- New Attack Scenarios- New Risks- Old Safety studies no more

“actual”

- Need for new Models- Need for new Risk

assessment methods- Need for new experimental - studies

Page 19: Scada Malware, A Proof of Concept - Roma Tre Universitycritis08.dia.uniroma3.it/pdf/CRITIS_08_27.pdf · Scada Malware, A Proof of Concept A. Carcano, I. Nai Fovino, M. Masera, A.

- Infection Triggers:

Attack Scenarios (1)

E-mail

FW-VPN

Master/Secondary

Social Engineering

E-Mail Forge

Malware Camouflage

Phishing

DNS

Fake Site Creation

DNS Poisoning

Operator PC Infection

ModBus DOS Worm

Slammer

Slammer Infection Engine

Modbus Packet Generator

Discovery Engine

Malsim Framework

-Slammer-Nimda-Poskiwing(6 october)- …