Sam Skalicky Biru Cui. Discovery Architecture Evaluation Conclusion.

17
STUXNET Sam Skalicky Biru Cui

Transcript of Sam Skalicky Biru Cui. Discovery Architecture Evaluation Conclusion.

Page 1: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

STUXNETSam Skalicky

Biru Cui

Page 2: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Outline

Discovery Architecture Evaluation Conclusion

Page 3: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Discovery

VirusBlokAda Zero-day Microsoft

Stuxnet <= .stub + MrxNet.sys Symantec

Page 4: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Organization Installation Propagation Target & Process

Page 5: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Organization

Exports Resources Configuration

Page 6: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Installation

E 15: environment scan, escalation E 16: copy, hide, autorun (certificate)

Page 7: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Propagation WinCC SQL P2P RPC Printer spooler Removable disk

.lnk, ~WTR4141.tmp, ~WTR4132.tmp Autorun.inf

Page 8: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Target Step 7 (E2/E14) PLC

Data Blocks (DB) System Data Blocks (SDB) Organization Blocks (OB) Function Blocks (FC)

Page 9: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Process Broker FC: RECV OB1/OB35

Page 10: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Process Profibus ID CP Frequency converter

Page 11: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Architecture

Process

1.41kHz 1.064kHz 2Hz

Page 12: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Evaluation

Complex code size propagation methods zero-day exploit certificate steal specific target Step/PLC/FC

Page 13: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Speculation

Where

Page 14: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Speculation

What

Page 15: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

Risk

Very small risk to the majority of users Worm was target so specifically

Modifying large spinning motors to fail Shorting out Overheat Disengage from their mounting

Consumes disk space (500KB) New type of worm detected

Page 16: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

What’s next?

W32.Duqu, a new beginning?

Page 17: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion.

References

[1] “Frequently Asked Questions on Virus-L/comp.virus.” Internet: http://www.faqs.org/faqs/computer-virus/faq/, Oct. 9, 1995 [Jan. 7, 2012].

[2] “MS10-061: Printer Spooler Vulnerability.” Internet: http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx, Sept. 14, 2010 [Jan. 7, 2012].

[3] Nicolas Falliere, Liam O Murchu, and Eric Chien, “W32.Stuxnet” Synmatec, November 2010.

[4] K. Zetter, “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,” Internet: http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1, July 11, 2011