1-OT Security POV
1-OT Security POV
TONY EL HAIBY
ASSOCIATE PARTNER-CROSS COMPETENCY MEA
w w w . m e n a i s c . c o m
IT
DIFFERENT
WORLDS
DIFFERENT
● Our Security approach at IBM METHODS
OT
3
Introduction to
OT
3
What is OT IT
Operational Technology (OT) is hardware and software
that detects or causes a change through the direct
OT
monitoring and/or control of physical devices such as
valves, pumps, temperature sensors, gas sensors, etc.
SCADA
within industrial processes.
4 PLC
DCS
Industrial Control Systems (ICS) are an element of OT
that are used to control valves, engines, conveyors, IED
smelters, mixers, and other machines to regulate RTU
various process values, such as temperature,
pressure, flow, chemical mixtures, and are also used ICS
to monitor them to prevent hazardous conditions.
SIS/ PROTECTION/
ESD
OT Security Standards Taxonomy
Industries
using
OT
PHARMACEUTICAL OIL & GAS ENERGY BUILDING LOGISTICS & MANUFACTURING WATER
(ELECTRICITY, MANAGEMENT TRANSPORTATION • AUTOMOTIVE
ALTERNATIVE) SYSTEM MANUFACTURING
• ELECTRONICS
• INDUSTRIAL PRODUCTS
ERP/ Data VPN Remote Access &
Email CORPORATE IT
ENTREPRISE ZONE
Finance Warehouse Corporate Internet Access
LEVEL 4 & 5 SECURITY
IT INFRASTRUCTURE
SYSTEMS &
Purdue Logical APPLICATIONS
MANUFACTURING ZONE
OPERATIONAL
LEVEL 3 - 1 CHALLENGES [MES] [EMS]
Plant TECHNOLOGY
Manufacturing Energy Management SECURITY
LEVEL 3 Execution Systems System Historian
● Legacy communications networks interfaces SITE
● Unmanaged Ethernet switches/ lack of MANUFACTURING
OPERATONS AND
available ports CONTROL
6 ● Latency introduction due to SPAN
● Legacy unsupported OS 3rd Party Remote
or Physical Access
● ICS/OT system vendor certification
requirements for changes
● Attacks from IT into OT LEVEL 2
AREA Digital Bus
● 3rd Party Access to OT SUPERVISORY Control Room
HMI
Process
CONTROLS Workstation Acquisition Historian Supervision
● Limited asset Information accuracy
OT INCIDENTS IT INCIDENTS
POWER OUTAGE DENIAL OF SERVICE
• Unauthorized control commands to IEDs • Infected computers on the internet
7 cause multiple breaker trips, isolating request services from a website.
substations, and cascading power failure. Website shuts down due to extreme load.
PRODUCTION OUTAGE SENSITIVE DATA LOSS
• Malicious malware that changes PLC • Phishing of CEO’s laptop leads to theft
programming causes outage. of financial data, resulting in reputation
loss, and stock price fall.
LOSS OF LIFE
• Safety control PLCs (emergency shutdown COMPANY IT ASSETS DELETED
systems) take offline by malware downloaded to • Malicious insider attains unauthorized
engineering workstation. Part of a coordinated access to Windows domain controller,
malicious attack. Explosion occurs when and sends malware to corrupt/wipe all
threshold temperatures exceeded. computing resources. Users, call center,
partners, and clients loss all services.
OT Security
8
8
IN IT ENVIRONMENTS, ATTACKER’S FOCUSING ON STEALING DATA
Figure:
9
Sampling of the Impact of Security Incidents by records and Cache Files Compromised, Time and Impact, 2016 through 2018
Source IBM X-Force
JUNE
2012 2015
First ever
malware-enabled
blackout in history
(Ukraine)
SCADA system (BlackEnergy)
for a New York
dam hacked
DECEMBER
Impact:
2016 2017
Hackers breach a Malware “NotPetya”
water company’s taking offline malware
SCADA system, Shamoon 2 substation in stopping e.g.
controlling water devastates oil & Ukraine Chernobyl
flow and chemical gas companies (Industroyer) radiation
levels and crosses into sensors
OT. Wipes disks
and leaves JUNE
political messages
MARCH
DECEMBER
Impact:
DECEMBER
MARCH Shamoon 3
cripples Saipem
Advisory on attacks and impacts
(since 2014) using many IT &
12
staging targets on across the Gulf
critical infrastructure
published by US-CERT
MARCH
2018 2019
Backdoor
discovered LockerGoga
which links impacts Norsk
BlackEnergy, Hydro OT & IT
Industroyer and global operations.
NotPetya to Financial impact
same source in excess of 30M
OCTOBER
SHODAN
THE WORLDS MOST DANGEROUS SEARCH ENGINE
Our Cities and Countries Critical Infrastructures can be searched…easily!
shodanhq.com
Like google searches the internet for publicly accessible devices. SHODAN focused primarily on
ICS devices, like city traffic lights, building/city cameras, water/power stations, nuclear stations.
Anyone can use it, it’s free and newly discovered devices are mapped daily!
13
SHODAN
INDUSTRIAL
CONTROL SYSTEM
14
VULNERABLE ICS EXAMPLE
FIND
SEARCH
15
1
VULNERABLE ICS EXAMPLE
RESEARCH
HACK
16
3 4
FIND
RESEARCH
17
1 2
GLOBAL NAVIGATION SATELLITE SYSTEMS
HACK
18
3
ELECTRIC APC EXAMPLE
19
PLC – EXAMPLE
20
PLC – EXAMPLE
21
MOST COMMON OT CYBERSECURITY MYTHS
22
MYTH 4 MYTH 5
Priority
Confidentiality Availability
Availability Confidentiality
23
24
Used 4 Windows 0-days for Part of a campaign against ICS Opportunistic scanning of vulnerable Not ICS specific, but used in largest
replication and privilege escalation vendors and their customers, Internet-connected HMIs attack against an ICS industry – Saudi
LNK/PIF auto execution, Print particularly in the EU General purpose “toolkit” with Aramco
Spooler, RPC remote execution, “Watering-hole” type of attack, rootkit and plugin modules Roughly 35,000 Windows computers
privilege escalation where malware was embedded into Part of a large, multi-faceted were rendered inoperable within
Used rootkit to hide and persist code legitimate ICS vendor software, to campaign also targeting hours
25
in PLCs be executed when downloaded government, academia, NATO, Sophisticated malware which
Very specific to a particular Siemens Has components of a general energy, and telecom spreads rapidly via Windows shares
PLC configuration, would not fire purpose Remote Access Trojan ICS attack module utilized a 0-day and reports back to a C&C server
unless present (RAT), including Command & (CVE-2014-0751) against GE Built for 32- and 64-bit versions of
Early version contained MitM code, Control, as well as exfiltration Cimplicity HMI Windows
actual effective attack did not need capability Reports of attacks against Siemens
to WinCC and Advantech WebAccess
PLC code modified
26
IT vs OT and Convergence?
28
29
IT – OT Security Strategy
30
1 2 3 4 5
31
PLAN
Management
Consulting
THANK YOU