energy sector cyber attacks: front lines · energy sector cyber attacks: ... 15 copyright ©...

31
Copyright © FireEye, Inc. All rights reserved. 1 ENERGY SECTOR CYBER ATTACKS: FRONT LINES Presented by Chris Sistrunk, Senior Consultant EnergySec Webinar – May 3, 2016

Upload: lamanh

Post on 15-May-2018

223 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 1

ENERGY SECTOR CYBER ATTACKS: FRONT LINES

Presented by Chris Sistrunk, Senior Consultant EnergySec Webinar – May 3, 2016

Page 2: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 2

Agenda •  M-Trends 2016 – What has Mandiant responded to? •  Threat landscape overview •  Attack readiness •  Case study •  Key takeaways/outlook

Page 3: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 3

BY THE NUMBERS M-TRENDS 2016

Page 4: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 4

Who’s a Target?

11% High Tech

10% Business and Professional Services

9% Financial Services and Insurance

10% Media and Entertainment

9% Retail

7% Education

6% Biotechnology and Pharmaceauticals

5% Construction and Engineering

4% Healthcare

4% Aerospace and Defense

3% Transporation

21% Other

In 2015 we noted changes in the number of engagements at companies in several key industries: High Tech –up from 7% to 11%

Retail –down from 14% to 9%

Other: Legal Services, Telecommunication, Government, Agriculture & Forestry, Energy

1%

Page 5: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 5

How Compromises Are Being Detected

47% Internal 53% External

Page 6: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 6

59

DAYS LESS THAN 2014

146 DAYS

Dwell Time

Page 7: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 7

416

243 229 205 146

2011 2012 2013 2014 2015

Median Days Before Discovery

Page 8: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 8

Internal Detection Vs. External Notification

Page 9: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 9

APT Phishing

0%

5%

10%

15%

20%

25%

30%

35%

Day

of W

eek

Em

ail w

as S

ent

Current Events 12%

Delivery 15%

Document 15%

Invitation 3%

IT & Security 36%

Other 17%

Translate 1%

Video 1%

89% of Phishing Email sent on Weekdays Majority of phishing emails were IT or security related, often attempting to impersonate the targeted company´s IT Deparment or an anti-virus vendor

Page 10: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 10

THREAT LANDSCAPE

Page 11: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 11

Data Theft Cyber Crime Nuisance Hacktivism

Objective

Example

Targeted

Character

Access & Propagation

Economic, Political Advantage

Financial Gain

Defamation, Press & Policy

Botnets & Spam

Advanced Persistent Threat

Credit Card, PHI, and PII Theft

Website Defacements

ý þ þ þ Automated Persistent Financially

Motivated Conspicuous

Network Attack

Escalation, Destruction

Destroy Critical Infrastructure

þ Conflict Driven

Conficker Telvent BWL Ransomware ? Ukraine Attack

Breaking Down the Threat

Page 12: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 12

UKRAINE ATTACK: ANALYSIS & RECOMMENDATIONS

Mapping controls to attacker techniques, tactics, & procedures (TTPs)

Page 13: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 13

Gain Initial Access Into Target

Strengthen Position within Target

Steal Valid User Credentials Identify Target

Package and Steal Data or Perform

Destructive Actions

Establish Foothold

Escalate Privileges

Internal Recon

Complete Mission

Initial Compromise

Move Laterally

Maintain Presence

Anatomy of a Targeted Attack

Page 14: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 14

TTP: Spearphishing •  Email attachment sandbox detonation •  Security awareness training for employees •  Reminders (ex. External origin warning)

TTP: BlackEnergy3 installation •  Malware protection strategy •  IOC matching SCADA/DCS

Initial compromise

Page 15: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 15

SCADA/DCS

Gain access to the ICS

TTP: Active Directory compromise •  Network segmentation •  Separate AD server for ICS environment

TTP: Multiple command and control machines •  IP whitelisting for access to ICS network •  Virtualize ICS applications to simplify connectivity from

IT to ICS; “Jumpbox” concept with detailed logging

TTP: Credential Capture/Use; ICS reconnaissance •  Network security monitoring for abnormal behavior

TTP: Remote Desktop HMI sessions through VPN

•  Two-factor authentication •  Ability to shut down VPN access •  Ability to disable Remote Desktop/Remote Assistance

Page 16: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 16

SCADA/DCS

TTP: Destructive malware on ICS hosts •  Malware protection strategy / Application

whitelisting •  Robust backup & recovery procedures –

including things like spares, firmware images, RTU configurations

TTP: Issue interactive commands on ICS •  Incident response planning and practice •  Ability to sever all remote connections •  Ability to move to manual operations

TTP: Telephone Denial of Service (TDoS) •  Alternate outage communication channel

Disrupt operations

Page 17: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 17

Ukraine Attack Lessons Learned •  Targeted attackers have:

•  Motivation

•  Determination

•  Resources

•  Cooperation and Coordination

•  Electric utilities must have:

•  Defensible architecture

•  Monitoring and detection capability

•  Integrated IT/OT incident response plan

•  Most importantly…people

Page 18: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 18

Recommendation

Build an ICS architecture that you can actually defend

Page 19: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 19

SCADA/DCS

þ Network Segmentation Isolate the ICS network from the IT network as much as possible

þ Rationalize remote access If you can’t eliminate remote access, reduce complexity of connectivity from IT to ICS via application virtualization or other methods

þ Two-factor authentication Make the attacker work harder than just stealing administrator credentials

þ Application whitelisting, malware protection, and IOC matching

Make it difficult for the attacker to install malware, execute files, and persist

Summary of key ICS security architecture technical controls

Page 20: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 20

Enhance your ICS-specific monitoring & detection

Recommendation

Page 21: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 21

ICS network security monitoring strategy

þ Network sensor covering ICS ingress/egress point

Gain a full understanding of how compromised machines are communicating with your ICS

þ  IDS/IPS Increase your ability to recognize attacks on ICS from the IT environment

þ Log collection Windows Events, Syslog increasingly generated by controllers

þ Agents on Windows hosts (after validation)

Work with your vendor, validate it yourself, or take a calculated risk

Page 22: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 22

Have an integrated IT/OT incident response plan

Recommendation

Page 23: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 23

What is an IRP and why do we need one?

Acme, Inc.

Cyber Security Incident Response Plan

Version 1

þ Establish high-level governance þ Aligns policies, responsibilities,

and efforts under a Mission Statement

þ Defines roles & responsibilities þ Provides common definitions so

everyone understands terminology and meaning

Page 24: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 24

+

Why? •  Coordinated and comprehensive •  Business risks and drivers are shared •  Cyber security and operational expertise are found in different places

Create one plan mapped to IT and ICS environments

Page 25: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 25

There’s a standard for that!

NIST SP 800-81 Revision 2:

Computer Security Incident Handling Guide

•  Definitions for key terms like “incident” and “event”

•  Elements of a good policy, plan, and procedure for incident response

•  List of the most common type of computer security incidents

•  Incident Response Scenarios

Page 26: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 26

THINGS TO THINK ABOUT

Major themes and takeaways for defenders

Page 27: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 27

Air gapped industrial control systems are the exception and not the rule

Takeaway #1

Page 28: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 28

Successful attacks on ICS do not necessarily need to exploit ICS-specific vulnerabilities

Takeaway #2

Page 29: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 29

Compliance and best practices aren’t good enough… you need to know if you are compromised

Takeaway #3

Page 30: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 30

No organization can prevent 100% of attacks – you win by minimizing an attack’s impact

Takeaway #4

Page 31: ENERGY SECTOR CYBER ATTACKS: FRONT LINES · ENERGY SECTOR CYBER ATTACKS: ... 15 Copyright © FireEye, Inc. ... 31 Copyright © FireEye, Inc. All rights reserved. QUESTIONS?

Copyright © FireEye, Inc. All rights reserved. 31

QUESTIONS?