Kaspersky Industrial CyberSecurity

28
1 Kaspersky Industrial CyberSecurity Антон Шипулин CISSP, CEH, CSSA Менеджер по развитию решений по безопасности критической инфраструктуры Лаборатория Касперского

Transcript of Kaspersky Industrial CyberSecurity

Page 1: Kaspersky Industrial CyberSecurity

1

Kaspersky Industrial CyberSecurity

Антон Шипулин

CISSP, CEH, CSSA

Менеджер по развитию решений

по безопасности критической инфраструктуры

Лаборатория Касперского

Page 2: Kaspersky Industrial CyberSecurity

2

Cyberattack vectors

PLC

Fieldbus

Control Network

SCADA/DCS Network

Plant DMZ Network

Office Network

PLC

SCADASCADA

SCADA

Internet

SCADA

Infected USB keys

Infected USB keys

Infected PLC logic

Infected Laptops

Insecure Wireless

BadAccessRules

Insecure Remote Support

Insecure Internet connection

Page 3: Kaspersky Industrial CyberSecurity

3

Cyberattack vectors

PLC

Fieldbus

Control Network

SCADA/DCS Network

Plant DMZ Network

Office Network

PLC

SCADASCADA

SCADA

Internet

SCADA

Infected USB keys

Infected USB keys

Infected PLC logic

Infected Laptops

Insecure Wireless

BadAccessRules

Insecure Remote Support

Insecure Internet connection

TAN

K

Control Valve

Level Meter

Malicious overrides of process setpointsTank overfill / fraud

Malicious changes of PID parameters

Equipment overstress/disruption

Pump

Malicious changes of measurement valuesTank overfill / fraud

Malicious changes of process control logic

hydraulic surge, equipment damage, emergency shutdown

Malicious STOP commandProcess out of control

PLC

SCADA

Page 4: Kaspersky Industrial CyberSecurity

4

Cyberattack vectors

Page 5: Kaspersky Industrial CyberSecurity

5

Kaspersky Industrial CyberSecurity

PLC

Fieldbus

Control Network

SCADA/DCS Network

Plant DMZ Network

Office Network

PLC

SCADASCADA

Internet

SCADA

KICS for Nodes

SCADA

KICS for Nodes

KICS for Nodes

SPAN

Kaspersky Security Center

KICS for Networks

Page 6: Kaspersky Industrial CyberSecurity

6

Kaspersky Industrial CyberSecurity (for Energy)

Page 7: Kaspersky Industrial CyberSecurity

7

Жизненный цикл атаки / Kill Chain

Этап Сценарий Реагирование

Доступ / Access

• Зараженный USB device, модем, Wi-Fi адаптер

• Точка доступа в сеть: ноутбук, wireless access point

• Установка соединения, получение доступа в сеть

• Device control

• Application control

• Antimalware

• Network Integrity Control (WL)

• Intrusion Detection System

Разведка /

Discovery

• Сканирование сети, поиск устройств и служб

• Подбор пароля к оборудованию

• Получение конфигурации, параметров и сбор трафика

для изучения и планирования атаки

• Network Integrity Control (WL)

• Intrusion Detection System

• Process Integrity Control (DPI)

Cyber-

Physical

Attack

• Запись вредоносной программы ПЛК через локальное

подключение

• Запись вредоносной программы ПЛК по сети

• Изменение параметра в памяти ПЛК

• Подмена параметров, команд в сетевом трафике

• Отправка вредоносных команд на ПЛК

• PLC Integrity Checker

• Network Integrity Control

• Intrusion Detection System

(Whitelisting)

• Process Integrity Control (DPI)

Доступ / AccessРазведка / Discovery

Cyber-Physical Attack

Page 8: Kaspersky Industrial CyberSecurity

8

KICS for Networks

► Software, Virtual or Hardware appliance

► Only passive / monitoring mode

• Mirroring port connection (SPAN)

• In-line connection (TAP)

Fieldbus

Control Network

SCADA/DCS Network

SPAN

KICS for Networks

PLC PLC

Kaspersky Security Center

SCADA

TAP

Page 9: Kaspersky Industrial CyberSecurity

9

Fieldbus

Control Network

SCADA/DCS Network

SPAN

KICS for Networks

PLC PLC

Remotenetwork

connections

Internal network

connections

Kaspersky Security Center

Direct local connections

SCADA

С&C ServersNetwork

Connections

TAP

Internet

KICS for Networks

► Inventory network assets and communications

► Detect unauthorized hosts and communications

► Detect intrusions (IDS)

► Detect critical PLC commands (DPI)

► Control over the technological process parameters (DPI)

► Store and provide incident data for investigation

Page 10: Kaspersky Industrial CyberSecurity

10

KICS for Networks: Supported Industrial hardware

► Ethernet IEEE 802.3 link protocol

► Supported controllers and relays:

• Siemens Simatic S7-300 series

• Siemens Simatic S7-400 series

• Siemens SIPROTEC 4 series

• Schneider Electric Modicom M340

• ABB Relion 670

• Mitsubishi MELSEC-Q

• Devices with the IEC 60870-5-104 protocols

• Devices with the IEC 61850 protocols (MMS, GOOSE)

• Allen-Bradley/ControlLogix 5571

• GE RX3i, C60, B30

• Emerson Delta – V

• Schneider Electric Modicon M580

• IED EKRA BE2704/243

• Micom P645

• SEL-421 SU,-401 U

• … *

* The list can be extended at the customer’s request

Page 11: Kaspersky Industrial CyberSecurity

11

PLC Commands Processing

Page 12: Kaspersky Industrial CyberSecurity

12

PLC Command Detection

PLC program changing attempt detected

Page 13: Kaspersky Industrial CyberSecurity

13

Process Control Rules

Page 14: Kaspersky Industrial CyberSecurity

14

Process Control Rules

Page 15: Kaspersky Industrial CyberSecurity

15

Process Control Change Detection

Parameter value changing attempt detected

Mistakenly or intentionally (can cause product damage)

Page 16: Kaspersky Industrial CyberSecurity

16

Machine Learning for a Baseline Profile

Page 17: Kaspersky Industrial CyberSecurity

17

Network Communication Whitelist / Inventory

Page 18: Kaspersky Industrial CyberSecurity

18

Network Communications Detection

External network connection detected

Possible botnet C&C server connection

Page 19: Kaspersky Industrial CyberSecurity

19

SPAN

KICS for Networks

Fieldbus

Control Network

SCADA/DCS Network

PLC PLC

KICS for Nodes Kaspersky

Security Center

SCADA

KICS for Nodes

KICS for Nodes

KICS for Nodes: Technological Specifics

► A dedicated set of components [next slide]

► Computational load is reduced

256-512 MB RAM on Windows XP SP2 / XP Embedded

► Monitoring mode

► For isolated environment (airgap)

► ICS vendors certification

Page 20: Kaspersky Industrial CyberSecurity

20

KICS for Nodes

► Application Startup Control

► Device Control

► Antimalware Engine

► Anti-Cryptor

► Wi-Fi network control

SPAN

KICS for Networks

Fieldbus

Control Network

SCADA/DCS Network

PLC PLC

SCADA

KICS for Nodes

KICS for Nodes

Infected USB keys

UnalowedWireless

MalwareFun

Insecure Remote Access

Kaspersky Security Center

Ransomware

KICS for Nodes

Infected PLC logic

Page 21: Kaspersky Industrial CyberSecurity

21

SPAN

KICS for Networks

Fieldbus

Control Network

SCADA/DCS Network

PLC PLC

SCADA

KICS for Nodes

KICS for Nodes

Infected USB keys

UnalowedWireless

MalwareFun

Insecure Remote Access

Kaspersky Security Center

Ransomware

KICS for Nodes

Infected PLC logic

KICS for Nodes: Supported OS► Windows XP Professional with SP2 and higher x86;

► Windows Vista with SP 2 x86/x64;

► Windows 7 Professional x86/x64;

► Windows 7 Enterprise/Ultimate x86/x64;

► Windows 7 Professional with SP1 and higher x86/x64;

► Windows 7 Enterprise/Ultimate with SP1 and higher x86/x64;

► Windows 8 Pro x86/x64;

► Windows 8 Enterprise x86/x64;

► Windows 8.1 Pro x86/x64;

► Windows 8.1 Enterprise x86/x64.

► Windows 10 Pro x86/x64;

► Windows 10 Enterprise x86/x64.

► Windows Server 2003 Standard/Enterprise with SP1 and higher x86/x64;

► Windows Server 2003 Standard/Enterprise with SP2 and higher x86/x64/

► Windows Server 2008 Standard with SP1 and higher;

► Windows Server 2008 Enterprise with SP1 and higher;

► Windows Server 2008 R2 Standard;

► Windows Server 2008 R2 Enterprise;

► Windows Server 2008 R2 Standard with SP1;

► Windows Server 2008 R2 Enterprise with SP1;

► Windows Server 2012 x64;

► Windows Server 2012 R2 x64;

► Windows Server 2016.

► Windows XP Embedded x86;

► Windows Embedded Standard 7 x86/x64;

► Windows Embedded 8.1 Industry Pro x86/x64;

► Windows Embedded 8.0 Standard x86/x64.

Page 22: Kaspersky Industrial CyberSecurity

22

PLC

Fieldbus

Control Network

SCADA/DCS Network

SPAN

KICS for Networks

KICS for Nodes

PLC

Infected PLC logic

Insecure Remote Access

Kaspersky Security Center

SCADA

KICS for Nodes

Infected USB keys

PLC Integrity Check / Attack Detection

Page 23: Kaspersky Industrial CyberSecurity

23

PLC Project Integrity Checker

PLC program

unauthorized

changing attempt

detected. Locally or

over the Network

Page 24: Kaspersky Industrial CyberSecurity

24

KICS Integration

PLC

Fieldbus

Control Network

SCADA/DCS Network

PLC

KICS for Nodes

SCADA

KICS for Nodes

KICS for Nodes

SPAN

Kaspersky Security Center

KICS for Networks

SIEM/LM

Kaspersky Security Center

Upstream KSC ERP/MES• CEF 2.0• LEEF (KSC)• Syslog• Mail

• IEC 60870-5-104

• OPC DA 2.0

Page 25: Kaspersky Industrial CyberSecurity

25

Situational Awareness

Page 26: Kaspersky Industrial CyberSecurity

26

2

6

Page 27: Kaspersky Industrial CyberSecurity

27

TAN

K

Control Valve

Level Meter

Malicious overrides of process setpointsTank overfill / fraud

Malicious changes of PID parameters

Equipment overstress/disruption

Pump

Malicious changes of measurement valuesTank overfill / fraud

Malicious changes of process control logic

hydraulic surge, equipment damage, emergency shutdown

Malicious STOP commandProcess out of control

PLC

SCADA

Доступ / AccessРазведка / Discovery

Cyber-Physical Attack

Page 28: Kaspersky Industrial CyberSecurity

28

Давайте обсудим?

Антон Шипулин

CISSP, CEH, CSSA

Менеджер по развитию

решений по безопасности

критической инфраструктуры

Лаборатория Касперского

Москва, Ленинградское шоссе, д.39А, стр.3

Т: (495) 797 8700 #1746

[email protected]

www.kaspersky.ru

https://ics.kaspersky.com

https://ics-cert.kaspersky.ru