stuxnet mass weopan of cyber attack

29
STUXNET-MASS WEOPAN OF CYBER ATTACK PRESENTED BY NIKAM AJINKYA R. T.E IT PDVVP COE AHMEDNAGAR

Upload: ajinkya-nikam

Post on 13-Apr-2017

250 views

Category:

Technology


4 download

TRANSCRIPT

Page 1: Stuxnet mass weopan of cyber attack

STUXNET-MASS WEOPAN OF CYBER ATTACK

PRESENTED BYNIKAM AJINKYA R.

T.E ITPDVVP COE AHMEDNAGAR

Page 2: Stuxnet mass weopan of cyber attack

WHAT IS STUXNET????

TECHNICAL ANALYSIS

CONCLUSION

INDEX POINTS

Page 3: Stuxnet mass weopan of cyber attack

INTRODUCTION

Page 4: Stuxnet mass weopan of cyber attack

Main victims????

Page 5: Stuxnet mass weopan of cyber attack

What it use to bypass???

Page 6: Stuxnet mass weopan of cyber attack
Page 7: Stuxnet mass weopan of cyber attack

What was it looking to shutdown???

Page 8: Stuxnet mass weopan of cyber attack

WHAT IT DID???

Page 9: Stuxnet mass weopan of cyber attack

IRANS CRYSIS

Page 10: Stuxnet mass weopan of cyber attack

Who was Behind???

Page 11: Stuxnet mass weopan of cyber attack

Who Was Behind??

Page 12: Stuxnet mass weopan of cyber attack

What it Can Do???

Page 13: Stuxnet mass weopan of cyber attack

Industrial control systems (ICS) are operated by a specialized assembly like code on programmable logic controllers (PLCs).

The PLCs are programmed typically from Windows computers

The ICS are not connected to the Internet ICS usually consider availability and ease of

maintenance first and security last ICS usually consider the “airgap” as

sufficient security

TECHINICAL ANALYSIS

Page 14: Stuxnet mass weopan of cyber attack

Reconnaissance◦ As each PLC is configured in a unique manner◦ Targeted ICS’s schematics needed◦ Possible methods:

Design documents may have been stolen by an insider Retrieved by an early version of Stuxnet

◦ Stuxnet could only be developed with the goal of sabotaging a specific set of ICS.

Scenario (2)

Page 15: Stuxnet mass weopan of cyber attack

The malicious binaries need to be signed to avoid suspicion◦ Two digital certificates were compromised◦ High probability that the digital certificates/keys were

physically stolen from the companies premises◦ Realtek and JMicron are in close proximity

Scenario (3)

Page 16: Stuxnet mass weopan of cyber attack

Initial Infection ◦ Stuxnet needed to be introduced to the targeted

environment Insider Willing third party Unwilling third party such as a contractor

◦ Delivery method USB drive Windows Maintenance Laptop

Scenario (4)

Page 17: Stuxnet mass weopan of cyber attack

Infection Spread◦ Look for Windows computer that program the PLC’s

(Called Field PG) The Field PG are typically not network Spread the Infection on computers on the local LAN

Zero-day vulnerabilities Two-year old vulnerability Spread to all available USB drives

◦ When a USB drive is connected to the Field PG, the Infection jumps to the Field PG The “airgap” is thus breached

Scenario (5)

Page 18: Stuxnet mass weopan of cyber attack

Target Infection ◦ Look for Specific PLC

Running Step 7 Operating System◦ Change PLC code

Sabotage system Hide modifications

◦ Command and Control may not be possible Due to the “airgap” Functionality already embedded

Scenario (6)

Page 19: Stuxnet mass weopan of cyber attack

Infection Statistics Percentage of Stuxnet infected Hosts with Siemens

Software installed

Page 20: Stuxnet mass weopan of cyber attack

Stuxnet calls LoadLibrary ◦ With a specially crafted file name that does not exist ◦ Which causes LoadLibrary to fail.

However, W32.Stuxnet has hooked Ntdll.dll◦ To monitor for requests to load specially crafted file

names. ◦ These specially crafted filenames are mapped to another

location instead◦ A location specified by W32.Stuxnet. ◦ Where a .dll file has been decrypted and stored by the

Stuxnet previously.

Bypassing Intrusion Detection

Page 21: Stuxnet mass weopan of cyber attack

Stuxnet use trusted Windows processes or security products◦ Lsass.exe◦ Winlogin.exe◦ Svchost.exe◦ Kaspersky KAV (avp.exe)◦ Mcafee (Mcshield.exe)◦ AntiVir (avguard.exe)◦ BitDefender (bdagent.exe)◦ Etrust (UmxCfg.exe)◦ F-Secure (fsdfwd.exe)◦ Symantec (rtvscan.exe)◦ Symantec Common Client (ccSvcHst.exe)◦ Eset NOD32 (ekrn.exe)◦ Trend Pc-Cillin (tmpproxy.exe)

Stuxnet detects the version of the security product and based on the version number adapts its injection process

Code Injection

Page 22: Stuxnet mass weopan of cyber attack

Stuxnet collects and store the following information:◦ Major OS Version and Minor OS Version◦ Flags used by Stuxnet◦ Flag specifying if the computer is part of a workgroup or

domain◦ Time of infection◦ IP address of the compromised computer◦ file name of infected project file

Configuration

Page 23: Stuxnet mass weopan of cyber attack

Installation: Control Flow

Page 24: Stuxnet mass weopan of cyber attack

Stuxnet contacts the command and control server◦ Test if can connect to:

www.windowsupdate.com www.msn.com

◦ On port 80 ◦ Sends some basic information about the compromised

computer to the attacker◦ www.mypremierfutbol.com◦ www.todaysfutbol.com◦ The two URLs above previously pointed to servers in

Malaysia and Denmark

Command & Control

Page 25: Stuxnet mass weopan of cyber attack

Command & Control (2)

Page 26: Stuxnet mass weopan of cyber attack

Stuxnet has the ability to hide copies of its files copied to removable drives Stuxnet extracts Resource 201 as MrxNet.sys.

◦ The driver is registered as a service creating the following registry entry:◦ HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\

MRxNet\”ImagePath” = “%System%\drivers\mrxnet.sys”◦ The driver file is a digitally signed with a legitimate Realtek digital

certificate. ◦ The driver then filters(hides) files that :

Files with a “.LNK” extension having a size of 4,171 bytes.• Files named “~WTR[FOUR NUMBERS].TMP”,

whose size is between 4Kb and 8Mb; the sum of the four numbers, modulo 10 is null. For example, 4+1+3+2=10=0 mod 10

Examples: Copy of Copy of Copy of Copy of Shortcut to.lnk Copy of Shortcut to.lnk ~wtr4141.tmp

Windows Rootkit

Page 27: Stuxnet mass weopan of cyber attack

LNK Vulnerability (CVE-2010-2568)

AutoRun.Inf

Propagation Methods: USB

Page 28: Stuxnet mass weopan of cyber attack

CONCLUSION

Page 29: Stuxnet mass weopan of cyber attack

THANK YOU!!!!!!!!!!!