+ All Categories
Home > Technology > Stuxnet: Cómo tomar el control de una Planta Nuclear

Stuxnet: Cómo tomar el control de una Planta Nuclear

Date post: 18-Nov-2014
Category:
Upload: cxo-community
View: 1,852 times
Download: 1 times
Share this document with a friend
Description:
El gusano Stuxnet tuvo su resonante ruido en materia al ataque industrial generado en los últimos meses. Pero ¿cuánto sabemos en detalle de la metodología utilizada? En esta presentación Tomer realiza un desarrollo completo sobre todos los conceptos y pasos realizados con este malware diseccionado con un objetivo dirigido. Los temas que se destacarán serán las terminologías asociadas a este ataque, detalles específicos sobre Stuxnet, y paso a paso como se realizó las etapas de toma de la planta nuclear secuenciadas en infiltración, propagación y explotación. Por Tomer Teller, Evangelista en Seguridad
41
©2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. Stuxnet: How to Take Over a (Nuclear) Power Plant Tomer Teller, Security Evangelist April 2011
Transcript
Page 1: Stuxnet: Cómo tomar el control de una Planta Nuclear

©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.

Stuxnet: How to Take Over a (Nuclear) Power Plant

Tomer Teller, Security Evangelist

April 2011

Page 2: Stuxnet: Cómo tomar el control de una Planta Nuclear

2 2 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

The Idea Behind Stuxnet

Simple!

We don’t want Iran to get the bomb

Sabotage the uranium enrichment process

Page 3: Stuxnet: Cómo tomar el control de una Planta Nuclear

3 3 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Real-time control system

Controls:

– Valves

– Drive speed

Does not run Windows

But..

The Target

Page 4: Stuxnet: Cómo tomar el control de una Planta Nuclear

4 4 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Operator Hello?

We are in Business

Operator (Field PG)

Controller (PLC)

Page 5: Stuxnet: Cómo tomar el control de una Planta Nuclear

5 5 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

The Operation

Drop Malware Reprogram Controller (Payload)

Target: Centrifuge in Natanz Mission Goal: No Nukes

Page 6: Stuxnet: Cómo tomar el control de una Planta Nuclear

6 6 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Agenda

1 Terminology

Stuxnet Overview 2

Infiltration, Propagation and Exploitation 3

Summary 4

Page 7: Stuxnet: Cómo tomar el control de una Planta Nuclear

7 7 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Terminology I

Exploit Software that takes advantage of

a bug in order to cause unintended

behavior (getting inside)

Worm Malware that replicates itself within

the network (propagate)

Payload The actual malicious activity,

e.g., delete file, download file

(create damage)

Page 8: Stuxnet: Cómo tomar el control de una Planta Nuclear

8 8 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Terminology II

PLC

A Programmable Logic

Controller (PLC) —

control of machinery on

factory assembly lines

Field PG Typical Windows machines,

used to program PLCs

Field PG PLC

Page 9: Stuxnet: Cómo tomar el control de una Planta Nuclear

9 9 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Visual Terminology

Operator (Field PG)

Controller

Industrial Machinery

Page 10: Stuxnet: Cómo tomar el control de una Planta Nuclear

10 10 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

“Groundbreaking” Worm

So what is so special about Stuxnet?

Why is it ―groundbreaking?‖

While We Are In This Room…

More than 50,000 new worms are propagating on the Internet

~1000 of them are undetected by antivirus

~1–2 employ unknown vulnerabilities (0-day)

Page 11: Stuxnet: Cómo tomar el control de una Planta Nuclear

11 11 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Stuxnet Overview

Architecture

Single file

(Archive)

Exploits

4 unknown

Windows bugs

2 stolen

certificates

PLC pre-recorded

commands

Techniques

Antivirus evasion

Peer-2-Peer

network

Command and

control

Page 12: Stuxnet: Cómo tomar el control de una Planta Nuclear

12 12 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Infection Statistics

This is not normal…

Number of Unique Infected Hosts by Country

Page 13: Stuxnet: Cómo tomar el control de una Planta Nuclear

13 13 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Welcome to the Battlefield

The Bushehr Nuclear Power Plant, Iran

Page 14: Stuxnet: Cómo tomar el control de una Planta Nuclear

14 14 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Operator PC (Windows)

Field PG PLC

What’s Going To Happen?

Found

Operator

Internal

Network

Page 15: Stuxnet: Cómo tomar el control de una Planta Nuclear

15 15 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Typical PLC Deployment (Goal)

Operator PC (Windows)

Field PG PLC

Internal

Network

Write

Read

Water pipe Pipeline Gas centrifuge

Page 16: Stuxnet: Cómo tomar el control de una Planta Nuclear

16 16 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Infiltrate the power plant

GOAL:

Reprogram the controller

Mission Objectives:

Propagate inside the network

Infect the operator computer

Page 17: Stuxnet: Cómo tomar el control de una Planta Nuclear

17 17 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Mission #1: Introduce Threat To Target Network

Page 18: Stuxnet: Cómo tomar el control de una Planta Nuclear

18 18 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

The Infection

Infected a willing or unknowing third party – An insider

– A contractor

– A SCADA Conference USB give-away

The original infection was most likely introduced by a removable drive

Page 19: Stuxnet: Cómo tomar el control de una Planta Nuclear

19 19 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Getting From the USB to the Computer

Stuxnet Used Two Methods to Infect the

Computer via USB

Method #1

Malformed

shortcut file

(.LNK)

Method #2

Autorun

design flaw

(.INI)

Page 20: Stuxnet: Cómo tomar el control de una Planta Nuclear

20 20 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Method #1: The LNK Vulnerability

Design-level flaw in Windows Desktop Explorer (not Internet Explorer) when viewing shortcuts

Shortcut Properties

File Name: Shortcut

File Size: 1 KB

ICON Location: c:\icon

In our scenario,

this file was the

Stuxnet worm d:\bad_file

Page 21: Stuxnet: Cómo tomar el control de una Planta Nuclear

21 21 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

How Stuxnet Exploits This Vulnerability

Stuxnet

Arrives on a

Removable

Drive (USB)

The Stuxnet worm

Shortcut file that points at the worm

Once

Viewed and

Exploited

Hides the files on the USB

Hides itself from antivirus

Page 22: Stuxnet: Cómo tomar el control de una Planta Nuclear

22 22 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Autorun.inf—“Cunning” Hack

An Autorun.inf file is a configuration file placed on removable drives that instructs Windows to automatically execute a file when inserted

STUXNET’s CODE

[autorun]

OPEN = setup.exe

Filename:

autorun.inf

Stuxnet

AutoRun

Page 23: Stuxnet: Cómo tomar el control de una Planta Nuclear

23 23 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Autorun.inf—“Cunning” Hack

An Autorun.inf file is a configuration file placed on removable drives that instructs Windows to automatically execute a file when inserted

STUXNET’s CODE

[autorun]

OPEN = setup.exe

Filename:

autorun.inf

Stuxnet

AutoRun

Page 24: Stuxnet: Cómo tomar el control de una Planta Nuclear

24 24 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

But, Files Are Visible on the USB Drive…

Catch Me If You Can

Page 25: Stuxnet: Cómo tomar el control de una Planta Nuclear

25 25 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

But, Files Are Visible on the USB Drive…

Catch Me If You Can

Files are still there.

We just don’t list them anymore

Page 26: Stuxnet: Cómo tomar el control de una Planta Nuclear

26 26 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

ANY * ANY * INFECT

Stuxnet Used Two Methods to

Infect the Computer via USB

Page 27: Stuxnet: Cómo tomar el control de una Planta Nuclear

27 27 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Compromised Certificates

Both of these companies seem to have offices

in the Hsinchu Science and Industrial Park (Taiwan),

which could indicate an insider job

These Kinds of Activities Require a Legitimate

Certificate Signed and Trusted by Microsoft

Page 28: Stuxnet: Cómo tomar el control de una Planta Nuclear

28 28 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

DEMO TIME

Autorun.inf

LNK vulnerability (MS10-046)

Page 29: Stuxnet: Cómo tomar el control de una Planta Nuclear

29 29 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Operator PC (Windows)

Field PG PLC

Mission #1 Completed

Internal

Network

Page 30: Stuxnet: Cómo tomar el control de una Planta Nuclear

30 30 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Infiltrate the power plant

GOAL:

Reprogram the controller

Mission Objectives:

Propagate inside the network

Infect the operator computer

Page 31: Stuxnet: Cómo tomar el control de una Planta Nuclear

31 31 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Microsoft Knew About This One,

and Claimed it Wasn’t Critical Enough

Network Example

To Printer

To File

Admin Area

Page 32: Stuxnet: Cómo tomar el control de una Planta Nuclear

32 32 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Stuxnet Communication Components

Communicate via Peer-2-Peer

Communicate with attackers

Infected machine

acting as Client

Infected machine

acting as Server

Get Version

Send Version

Request Update

Send Update

Master?

Do X

Do Y

Attackers

Internet

Page 33: Stuxnet: Cómo tomar el control de una Planta Nuclear

33 33 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Internet

Operator PC (Windows)

Field PG PLC

Mission #2 Completed

Found

Operator

Internal

Network

Ping

Alive!

C&C

Page 34: Stuxnet: Cómo tomar el control de una Planta Nuclear

34 34 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Infiltrate the power plant

GOAL:

Reprogram the controller

Mission Objectives:

Propagate inside the network

Infect the operator computer

Page 35: Stuxnet: Cómo tomar el control de una Planta Nuclear

35 35 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

This is a rootkit – Software which

subverts the operation system

Mission #3: Infecting The Target

Monitors PLC commands being written and read

Infects a PLC by inserting bad commands

Masks the fact the PLC is infected

When Stuxnet Reaches a Field PG,

It Installs a Trojan Horse That:

Page 36: Stuxnet: Cómo tomar el control de una Planta Nuclear

36 36 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Infected PLC Example (READ/WRITE)

Operator (Field PG) Controller Operation

Change

Speed

Infected

with

Stuxnet

5

Pre-recorded value

500 5

Operation

Monitor

Speed

5

Show expected value

500 5

Page 37: Stuxnet: Cómo tomar el control de una Planta Nuclear

37 37 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Mission Objectives:

Infiltrate the power plant

Propagate inside the network

Infect the operator computer

GOAL:

Reprogram the controller

Page 38: Stuxnet: Cómo tomar el control de una Planta Nuclear

38 38 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Mission Objectives:

Infiltrate the power plant

Propagate inside the network

Infect the operator computer

GOAL:

Reprogram the controller

Mission

Accomplished!!

Page 39: Stuxnet: Cómo tomar el control de una Planta Nuclear

39 39 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Summary

Complex Stuxnet is a very sophisticated threat

Quiet Built to stay ―under the radar‖

Dedicated Targeted Iranian nuclear plant

Expensive Used 4 unknown vulnerabilities

Blueprint Stuxnet is a template for criminals

Productivity Can target other companies

Page 40: Stuxnet: Cómo tomar el control de una Planta Nuclear

40 40 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Questions

Page 41: Stuxnet: Cómo tomar el control de una Planta Nuclear

41 41 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Thank You

Tomer Teller, Security Evangelist

Email : [email protected]


Recommended