emulating adversary tactics safely in industrial networks · emulating adversary tactics safely in...

24
Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: [email protected] Web: www.dragos.com

Upload: others

Post on 22-Apr-2020

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Emulating Adversary Tactics Safely in Industrial Networks

Robert M. LeeTwitter: @RobertMLee

Email: [email protected] Web: www.dragos.com

Page 2: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Emulating Adversary Tactics Safely in Industrial Networks

Robert M. LeeTwitter: @RobertMLee

Email: [email protected] Web: www.dragos.com

How Not to be an Asshole in ICS

Page 3: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Agenda

• Intel and Red Teaming • Dymalloy, Electrum, Covellite:• Industrial Threat Background • Doing it Wrong • Achieving Success

Page 4: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Agenda

• Intel and Red Teaming (Indicators Aren’t Intel)• Dymalloy, Electrum, Covellite:• Industrial Threat Background (What You’ll Emulate)• Doing it Wrong (Asshole Moves)• Achieving Success (How Not to be an Asshole)

Page 5: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

@_LittleBobby_www.LittleBobbyComic.com

Intelligence and Red Teaming

Page 6: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

The Making of an Activity Group

6

IntrusionsIntrusion

SetsCampaignsGroup

Group

Campaign 1

Victim Organization

Intrusion Analysis

Victim Organization

Intrusion Analysis

Campaign 2

Victim Organization

Intrusion Analysis

Victim Organization

Intrusion Analysis

Campaign 3

Victim Organization

Intrusion Analysis

Victim Organization

Intrusion Analysis

Page 7: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

The Diamond Model

Victim

Capability/TTPsInfrastructure

Adversary

Ref: http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf

Page 8: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Dymalloy

Page 9: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

DYMALLOY

• North American electric operators• Turkish energy providers• Western Europe electric operators

Multi-State Adversary Interests

• Malicious docs w/ credential harvesting via external SMB connections

• RATs from publicly available toolkits• Custom-developed information

theft toolkits built on public tools• One non-public toolkit

• Compromise ISP IPs• Compromised business

connections for initial infection and subsequent implants

Links: Dragonfly 2.0Not Dragonfly 1.0Industrial Threat Background

Page 10: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Doing it Wrong

• Electric Utility Story• Scanning non-common ports• SMB lateral movement• Aggressive scanning

Page 11: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Achieving Success

Leverage Known RATs

Hardcoded IPs pulling down PNGs

Exfiltration of HMI info via DNS

Page 12: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Success: Leveraging the Right Detection

Environment Threat

Modeling Threat Behavioral Analytics

Configuration Analysis Indicators

Page 13: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Covellite

Page 14: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

COVELLITE

• Electric utility companies in the United States

North Korean State Interests

• Sophisticated implant with secure communication channels

• Similar features to malware used against South Korean targets

• Specific session key used for payload and second encrypted layer

• 41 minute and 30 second sleep

• Legitimate infrastructure• University IPs for C2

Links: Unknown

Industrial Threat Background

Page 15: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Doing it Wrong

• Gas Pipeline Story:• Not getting authorization for

each new system• Gaining access and not

emulating the threat• Thinking you understand the

engineering

Page 16: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Achieving Success

• Properly themed phishing email• Encoded Payload in .Doc

• Access IT systems and pivot to OT• Leverage self-registered C2 servers themed to

universities• Leverage implant with anti-forensic features and

41 minute sleep• In OT environment (with approval and

Operations oversight) exfiltrate HMI screenshots

Page 17: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Success: Test Their Collection Management Framework

EndpointProtection

System

Windows Systems Network Firewall

Data Type System Alert Host Based Logs Netflow System Alert

Kill Chain Coverage

Exploitation & Installation

Exploitation,Installation, and

Actions on Objectives

InternalReconnaissance, Delivery, and C2

InternalReconnaissance, Deliver, and c2

Follow on Collection

Malware sample Files and timelines Packet Capture Netflow

Typical Storage in Days 30 days 60 days 23 days 60 days

Page 18: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Electrum

Page 19: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

ELECTRUM

• Ukrainian Utility Companies• Electric • Water

Russian State Interests

• Long term access to ICS• CRASHOVERRIDE• ICS Specific Modules• Operations Knowledge

• Dual-use infrastructure such as TOR to host C2

• Internal proxies setup

Links: Development team for Sandworm

Industrial Threat Background

Page 20: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

CRASHOVERRIDE

Page 21: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

What Not To Do

• Energy Company:• Conducted the test 100% right• Recommendations 100% off• Over-hyped the importance

such as CRASHOVERRIDE IOCs

Page 22: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Achieving Success

Understand Detection Type

Understand the Business Unit

Goals

Recommendations to a Threat Model

Do Not Touch Final Control

Elements

Page 23: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Success: Tailoring Their Threat Model

Page 24: Emulating Adversary Tactics Safely in Industrial Networks · Emulating Adversary Tactics Safely in Industrial Networks Robert M. Lee Twitter: @RobertMLee Email: rlee@dragos.com Web:

Questions?

Robert M. LeeTwitter: @RobertMLee

Email: [email protected] Web: www.dragos.com