andrew@theinternet

ICPSS Lecture Notes - Lesson 5 - Industrial Cyber Security History and Threats

Industrial Cyber Security History and Threats

  • Compared to traditional IT systems, CPS’s are:
    • more specialized
    • greater demands on reliability and longevity
    • high-stakes systems

Need to improve

  • The need to improve cannot be overstated
  • Physical security on many CPS’s are decent, but digital is not great
    • Physical is often helped by being geographically remote
    • Given that physical is decent, digital usually represents the only feasible way in
  • Historically CPS networks were air-gapped, leaving infosec as something that didn’t need to be thought about
    • in modern times, this airgap almost never actually exists, for cost and convenience reasons

What is the state of security posture for CPS’s

  • A massive pentest found tens of thousands of vulns
  • Also provided metadata around responses
    • average time to patch found was 331 days, with a long right tail
    • industry standard disclosure practice is to disclose upon patch release, giving a window between patch release and patch application for badness to happen
    • This is not (necessarily) due to negligence. Control systems are hard to patch due to things like topology, downtime requirements, and such.
      • A common response to this is to focus on strengthening the perimeter defenses in lieu of patching

Summary of Past Incident Reports

  • Most attacks seem to be opportunistic
    • This may change going forwards
  • Initial attacks tend to use simpler exploits
    • This may just be because nothing more complex was needed, not because nothing better exists
  • The majority of cyber-attracks are financially motivated
    • Again, may change going forwards
  • New malware samples are increasing at an alarming rate
  • The majority of attacks originate externally
  • However, the majority of incidents affecting industrial systems are unintentional
  • New malware code samples are increasingly more sophisticated
  • Malware and “hacking as a service” is increasingly available

APTs and Weaponized Malware

  • APT Qualities
    • Not intended to impact or disrupt network operations
    • Designed to avoid detection over long periods of time
  • Weaponized Malware Qualities
    • Possible intentions include network disruption
    • Possible intentions include physical damage of systems or devices

High Profile Cases

  • Night Dragon
    • A series of attacks over a 2 year period targeting oil and energy companies, stealing sensitive information
  • Stuxnet
    • A worm developed to infect as many computers as possible.
    • When it found Iranian centrifugrs, it activated and ruined them

The future of malware

  • Sophistication will continue to increase over time
  • It’s expensive to develop things from scratch, so it’s reasonable to expect that the majority will be evolutions on existing tools and techniques, instead of from-scratch new builds

Insider Threats

  • One of the most common pitfalls is to roll out security policies without building an appropriate threat model. This results in policies targeting the wrong things.
  • The most probable threat is an insider.
    • Employees with direct access to data
    • Employees with admin privileges
    • Employees with indirect access to data
    • Subcontractor with access to specific ICS componensts or subsystems for operation
    • Services providers with access to specific ICS components or subsystems for support

Recent history

  • Disclosures spiked around 2010
    • The year Stuxnet was discovered
  • This is likely due to:
    • a combination of increased awareness around ICS
    • increased hacktivism in cultural contexts
    • improved availability of Open Source Tools for conducting attacks