Contents

Säkerhetspodcasten #127 - Om Industroyer med Anton Cherepanov och Robert Lipovský

Lyssna

mp3

Innehåll

Dagens avsnitt är en intervju inspelad under CS3 2017. Säkerhetspodcastens flygande reporter Robin von Post intervjuar Robert Lipovský och Anton Cherepanov från ESET om deras research kring malwaret Industroyer.

Inspelat: 2017-10-24. Längd: 00:13:09.

AI transkribering

AI försöker förstå oss… Ha överseende med galna feltranskriberingar.

1 00:00:00,000 --> 00:00:02,540 Hej och välkommen till Säkerhetspodcasten.

2 00:00:02,960 --> 00:00:07,660 Innan vi börjar dagens avsnitt skulle jag vilja tipsa om våra nya fina Säkerhetspodcasten-stickers

3 00:00:07,660 --> 00:00:10,980 som nu finns tillgängliga för alla våra lyssnare helt gratis.

4 00:00:11,620 --> 00:00:15,000 Det enda ni behöver göra för att få dem är att skicka ett frankerat kuvert till

5 00:00:15,000 --> 00:00:22,440 Assured AB Care of Säkerhetspodcasten på adressen Norra Lergatan 7 413 01 Göteborg

6 00:00:22,440 --> 00:00:26,360 så kommer en handfull nya fräscha-stickers som ett brev på posten inom ett par dagar.

7 00:00:26,360 --> 00:00:30,400 Det var alltså Norra Lergatan 7 413 01 Göteborg.

8 00:00:31,880 --> 00:00:37,280 Till dagens avsnitt då. Under hösten så har vi på Säkerhetspodcasten haft en reporter i fältet

9 00:00:37,280 --> 00:00:43,600 nämligen den eminente Robin von Post som har bandat en hel drös intervjuer på ett par konferenser i Stockholm.

10 00:00:44,560 --> 00:00:48,220 Vi skulle väldigt gärna vilja tacka Sectra som har lånat ut honom till oss

11 00:00:48,220 --> 00:00:52,520 och vill ni följa Robin så gör ni det enklast på at r von post på Twitter.

12 00:00:53,100 --> 00:00:55,980 Stort tack alltså till Sectra och till Robin.

13 00:00:56,360 --> 00:00:57,520 Nu rullar vi intervjun.

14 00:01:01,880 --> 00:01:10,180 This is CS3, the Stockholm International Summit on Cyber Security in SCADA and Industrial Control Systems.

15 00:01:10,560 --> 00:01:15,940 My name is Robin von Post on behalf of Säkerhetspodcasten and I’m sitting here together with my two friends

16 00:01:15,940 --> 00:01:20,760 Anton Sherepanov and Robert Lerpovski that recently came off the stage

17 00:01:20,760 --> 00:01:24,220 speaking about something interesting like the Indestroyer.

18 00:01:24,700 --> 00:01:25,740 Please introduce yourselves.

19 00:01:26,180 --> 00:01:26,300 Ja.

20 00:01:26,360 --> 00:01:27,740 So I’m Robert.

21 00:01:28,460 --> 00:01:29,180 I’m Anton.

22 00:01:29,500 --> 00:01:33,880 We work for Slovakia-based cyber security company ESET.

23 00:01:35,920 --> 00:01:39,640 We deal with all kinds of cyber attacks.

24 00:01:40,080 --> 00:01:48,140 So including these ICS types of attacks or general crimeware

25 00:01:48,140 --> 00:01:55,440 and everything in between attacks against companies, nations, states, governmental institutions, critical.

26 00:01:56,360 --> 00:01:58,420 Critical targets.

27 00:01:58,780 --> 00:02:05,940 So a combination of, we’re trying to get the big picture of the whole threat landscape out there.

28 00:02:06,500 --> 00:02:13,260 So in the presentation you said it’s the biggest threat to ICS environment since Stuxnet.

29 00:02:13,360 --> 00:02:15,060 Could you elaborate on that?

30 00:02:15,740 --> 00:02:15,980 Yeah.

31 00:02:16,760 --> 00:02:21,700 Well, Indestroyer is a really unique malware.

32 00:02:23,080 --> 00:02:26,060 It’s first in something, it’s second in something else.

33 00:02:26,060 --> 00:02:26,640 And it’s fourth.

34 00:02:26,880 --> 00:02:28,440 So let me explain.

35 00:02:28,540 --> 00:02:35,040 It’s the first ever malware specifically designed to attack power grids.

36 00:02:35,840 --> 00:02:41,620 And it’s the second time that a malware was used to actually create a blackout.

37 00:02:42,100 --> 00:02:48,580 So the last blackout we’re talking about, the blackout which happened in December 2016 in Ukraine.

38 00:02:48,900 --> 00:02:53,280 That was almost exactly one year after a blackout in December 2015.

39 00:02:53,280 --> 00:02:56,040 Now back then they used a different.

40 00:02:56,060 --> 00:02:58,420 Again, malware.

41 00:02:59,000 --> 00:03:02,040 But there it was more of a general purpose.

42 00:03:02,860 --> 00:03:07,780 So the malware called Black Energy opened the door for the attackers.

43 00:03:07,980 --> 00:03:14,420 And then they remotely connected to the appropriate controlling workstation.

44 00:03:14,840 --> 00:03:20,320 And then they manually were clicking in the SCADA software application.

45 00:03:20,800 --> 00:03:23,040 Okay, open circuit breaker, open circuit breaker.

46 00:03:23,220 --> 00:03:24,840 And then the power went out.

47 00:03:24,840 --> 00:03:26,040 And the network.

48 00:03:26,040 --> 00:03:27,580 And the network operators, they were sitting behind that desk.

49 00:03:27,700 --> 00:03:32,560 They actually saw how the attacker was remotely accessing their system.

50 00:03:32,660 --> 00:03:33,560 They took a video of it.

51 00:03:33,780 --> 00:03:34,820 It’s available online.

52 00:03:35,060 --> 00:03:36,320 So it’s really interesting to see.

53 00:03:36,960 --> 00:03:39,080 Now compare that to Indestroyer.

54 00:03:40,080 --> 00:03:47,340 This malware had the ability to send the commands to so-called protection relays.

55 00:03:47,640 --> 00:03:50,780 Devices which control circuit breakers.

56 00:03:50,900 --> 00:03:53,280 And open them in an automatic fashion.

57 00:03:53,780 --> 00:03:55,640 So it’s a step above.

58 00:03:56,040 --> 00:03:57,740 The attack scenario in the previous year.

59 00:03:57,840 --> 00:03:59,180 So they grew in sophistication.

60 00:03:59,380 --> 00:04:00,300 So that’s really interesting.

61 00:04:01,020 --> 00:04:07,020 Okay, so you would say that it raised one level.

62 00:04:07,020 --> 00:04:12,100 I mean it’s now reducing the need to have a control, an HMI so to speak.

63 00:04:12,360 --> 00:04:16,720 But what’s the next level you would actually go into?

64 00:04:18,300 --> 00:04:22,340 I think the next level will be like it will work offline.

65 00:04:23,080 --> 00:04:25,040 Completely without internet.

66 00:04:25,340 --> 00:04:25,880 So you.

67 00:04:26,040 --> 00:04:27,620 Put it on USB-C.

68 00:04:27,760 --> 00:04:32,880 You walk to a great environment.

69 00:04:33,260 --> 00:04:33,900 You run it.

70 00:04:34,620 --> 00:04:35,620 And bam, it’s done.

71 00:04:35,620 --> 00:04:40,180 So that’s more like the Stuxnet autonomy way of working, right?

72 00:04:41,000 --> 00:04:48,280 So that’s still both these attacks in this December and last December was remotely controlled.

73 00:04:48,400 --> 00:04:51,760 They had to have some kind of CC channel to work.

74 00:04:51,980 --> 00:04:52,540 Yeah, they did.

75 00:04:52,680 --> 00:04:55,920 I mean at one stage.

76 00:04:56,040 --> 00:05:02,880 Industry could have operated automatically because there was a launcher component where it was set to configure.

77 00:05:02,880 --> 00:05:11,860 So okay, launch the payloads, launch the modules responsible for opening the, for flipping the switches, for opening the circuit breakers at a specific time.

78 00:05:11,940 --> 00:05:12,760 There was a timestamp.

79 00:05:12,860 --> 00:05:17,080 That was shortly before the actual blackout happened.

80 00:05:17,640 --> 00:05:18,900 So there was a degree of automation.

81 00:05:19,080 --> 00:05:25,060 But before that stage was implanted, there was a lot of.

82 00:05:26,040 --> 00:05:29,040 The reconnaissance phase was, was really extensive.

83 00:05:30,240 --> 00:05:31,860 They had to map out the environment.

84 00:05:31,860 --> 00:05:34,440 They had to infect the systems.

85 00:05:34,440 --> 00:05:42,540 They, they used the MS SQL database that they had and then launched some commands through that.

86 00:05:42,540 --> 00:05:46,080 So that enabled them to stay under the radar, which is also quite interesting.

87 00:05:48,000 --> 00:05:54,620 But did this attack also utilize the VPN into the ICS environment like last year or was this?

88 00:05:55,340 --> 00:05:55,640 How?

89 00:05:55,640 --> 00:05:55,900 Did they?

90 00:05:55,900 --> 00:05:56,000 Reach?

91 00:05:56,000 --> 00:05:56,040 Yeah.

92 00:05:56,040 --> 00:05:57,480 How did they reach the CDC server so to speak?

93 00:05:59,180 --> 00:06:02,920 I think they used the standard internet channel.

94 00:06:03,800 --> 00:06:06,940 So it was an open channel into the ICS network?

95 00:06:06,940 --> 00:06:18,180 The most interesting question that I think no one told yet, that how this malware got inside in the first place.

96 00:06:18,340 --> 00:06:20,260 What was the infection vector?

97 00:06:21,100 --> 00:06:23,800 I’m really curious and I don’t know.

98 00:06:24,240 --> 00:06:25,900 Yeah, that’s, that’s still.

99 00:06:25,900 --> 00:06:49,200 Still an open unknown in the case of black energy, we, we knew because we witnessed, we observed spear phishing campaigns several months before the blackout and here we, we really don’t know, maybe, maybe it was a similar method of getting in.

100 00:06:49,200 --> 00:06:50,200 Maybe it was.

101 00:06:50,200 --> 00:06:55,860 Maybe they were already in place.

102 00:06:55,860 --> 00:07:01,120 So, so, so they weren’t properly cleaned up from before, so maybe there was like, like an open back door before.

103 00:07:01,120 --> 00:07:02,120 Like a sleeper agent.

104 00:07:02,120 --> 00:07:09,120 Yeah, maybe it was a insider operation, maybe it was, I mean, there are so many possibilities, we just don’t know.

105 00:07:09,120 --> 00:07:21,120 But, but then you said, I mean, we have the payloads that this launcher delivers, right?

106 00:07:21,120 --> 00:07:25,120 So, so it’s worked some different, like 101, 104 different.

107 00:07:25,120 --> 00:07:25,720 But, but.

108 00:07:25,720 --> 00:07:39,980 But one interesting thing that you said was that you also have the denial of service on, on the protection relays, because you have this pinballing on and off switching, but that is taken care of by the protection relays, right?

109 00:07:40,480 --> 00:07:44,180 That, that you protect the network from pinballing it down.

110 00:07:44,520 --> 00:07:53,460 Well, well, both of, both of the, both of the payloads and this denial of service, it affects the same type of devices, the protection relays.

111 00:07:53,600 --> 00:07:55,680 It just has a different effect.

112 00:07:55,720 --> 00:08:05,680 So, one is causing them to, to open circuit breakers, and the other one is causing the, the, the exploit is causing them to be irresponsive.

113 00:08:05,680 --> 00:08:09,780 So it’s a denial of service attack against Siemens C-Protect.

114 00:08:10,440 --> 00:08:19,180 So once that happens, an operator would have to go figure out which, which protection relays it’s not responding.

115 00:08:20,200 --> 00:08:22,160 It might not be the easiest side of the day.

116 00:08:22,240 --> 00:08:22,820 They have to find it.

117 00:08:22,860 --> 00:08:25,600 They have to maybe travel somewhere and go there and manually restart.

118 00:08:25,600 --> 00:08:34,220 It’s so, and when these, when these two things are, are used in combination, it amplifies the whole effect of the attack.

119 00:08:34,720 --> 00:08:39,460 But was it really an amplification then that, that you saw in this December?

120 00:08:41,200 --> 00:08:48,920 It’s, it’s hard to say because we analyzed the malware and we were not in that place.

121 00:08:49,260 --> 00:08:49,460 Yeah.

122 00:08:49,680 --> 00:08:54,620 So our task was just to analyze the malware, what capabilities it has.

123 00:08:54,620 --> 00:08:54,900 And.

124 00:08:55,600 --> 00:08:58,380 We described it in our research.

125 00:08:59,920 --> 00:09:06,720 Because I guess that, I mean, some parts of an electricity system is to keep the balance and the protection relays are there.

126 00:09:07,000 --> 00:09:16,780 So if you disable them, you will have physical, I mean, you said it like the, the permanent damage that you’re after really.

127 00:09:17,920 --> 00:09:21,280 So, so why do you think that, uh, Ukraine was a target?

128 00:09:22,840 --> 00:09:24,580 That’s, that’s a very good question.

129 00:09:24,620 --> 00:09:25,280 Um.

130 00:09:25,600 --> 00:09:37,780 There are various, there’s theories that Ukraine is a testbed for, for, uh, attackers before maybe they, they try the attacks out somewhere else.

131 00:09:38,360 --> 00:09:41,500 Uh, who knows?

132 00:09:41,560 --> 00:09:41,920 Who knows?

133 00:09:41,920 --> 00:09:53,960 I mean, Ukraine is quite unfortunate to be in this situation for the past, at least three years when all, all types of industries across the whole country.

134 00:09:53,960 --> 00:09:54,460 Uh.

135 00:09:54,460 --> 00:09:54,720 Uh.

136 00:09:54,720 --> 00:09:54,920 Uh.

137 00:09:54,920 --> 00:10:00,820 Across the whole country have basically been, been targeted and it’s, it’s really overwhelming.

138 00:10:00,820 --> 00:10:03,220 So yeah.

139 00:10:05,480 --> 00:10:05,720 Yeah.

140 00:10:05,720 --> 00:10:08,760 It’s, it’s, uh, who lives to see, right?

141 00:10:08,840 --> 00:10:08,980 Yeah.

142 00:10:09,620 --> 00:10:09,980 Okay.

143 00:10:10,220 --> 00:10:12,260 Uh, that’s, that’s interesting.

144 00:10:12,300 --> 00:10:20,040 Um, regarding the, the, the payloads that were written, I mean, they were quite specific now.

145 00:10:20,240 --> 00:10:24,060 I mean, that’s, that’s, that’s your takeaway that these are targeting now.

146 00:10:24,060 --> 00:10:24,680 These, uh.

147 00:10:24,680 --> 00:10:34,700 Specific protocols and, and systems, uh, so you haven’t seen any reuse of other malware components in that sense.

148 00:10:34,700 --> 00:10:36,620 This is like from scratch written.

149 00:10:36,660 --> 00:10:37,040 Yeah.

150 00:10:37,340 --> 00:10:39,680 It’s, it’s written from the scratch.

151 00:10:39,740 --> 00:10:52,860 And interesting part about this payload that, uh, you can actually, it has configuration and you can actually adopt this, uh, payload to any environment.

152 00:10:53,180 --> 00:10:53,780 Of course.

153 00:10:53,780 --> 00:10:56,760 Uh, uh, without, uh, rewriting the code itself.

154 00:10:56,760 --> 00:11:08,740 So of course you have to do, uh, some reconnaissance phase, but because you can do it, it makes it so dangerous.

155 00:11:08,840 --> 00:11:09,120 Yeah.

156 00:11:09,360 --> 00:11:09,620 Yeah.

157 00:11:10,160 --> 00:11:13,580 And, and now, since it’s, I mean, the, the, it’s out of the box, right.

158 00:11:13,580 --> 00:11:17,660 So you can take other, other, uh, groups could actually take on.

159 00:11:17,660 --> 00:11:18,000 Yeah.

160 00:11:18,000 --> 00:11:20,520 Anyone could, uh, get it and adopt to the, to the.

161 00:11:20,520 --> 00:11:20,580 Mm.

162 00:11:20,580 --> 00:11:20,600 Mm.

163 00:11:20,600 --> 00:11:20,640 Mm.

164 00:11:20,640 --> 00:11:20,700 Mm.

165 00:11:20,700 --> 00:11:20,760 Mm.

166 00:11:20,760 --> 00:11:20,820 Mm.

167 00:11:20,820 --> 00:11:20,880 Mm.

168 00:11:20,880 --> 00:11:20,900 Mm.

169 00:11:20,900 --> 00:11:20,960 Mm.

170 00:11:20,960 --> 00:11:21,000 Mm.

171 00:11:21,000 --> 00:11:21,040 Mm.

172 00:11:21,040 --> 00:11:21,140 Mm.

173 00:11:21,140 --> 00:11:21,160 Mm.

174 00:11:21,160 --> 00:11:21,180 Mm.

175 00:11:21,180 --> 00:11:21,200 Mm.

176 00:11:21,200 --> 00:11:21,240 Mm.

177 00:11:21,240 --> 00:11:21,260 Mm.

178 00:11:21,260 --> 00:11:21,280 Mm.

179 00:11:21,280 --> 00:11:21,300 Mm.

180 00:11:21,300 --> 00:11:21,360 Mm.

181 00:11:21,360 --> 00:11:21,380 Mm.

182 00:11:21,380 --> 00:11:21,400 Mm.

183 00:11:21,400 --> 00:11:21,420 Mm.

184 00:11:21,420 --> 00:11:21,440 Mm.

185 00:11:21,440 --> 00:11:21,460 Mm.

186 00:11:21,460 --> 00:11:21,600 Mm.

187 00:11:21,600 --> 00:11:21,640 Mm.

188 00:11:21,640 --> 00:11:21,660 Mm.

189 00:11:21,660 --> 00:11:21,700 Mm.

190 00:11:21,700 --> 00:11:22,640 Mm.

191 00:11:22,640 --> 00:11:22,820 Mm.

192 00:11:22,820 --> 00:11:22,980 Mm.

193 00:11:22,980 --> 00:11:23,080 Mm.

194 00:11:23,080 --> 00:11:23,120 Mm.

195 00:11:23,120 --> 00:11:23,220 Mm.

196 00:11:23,220 --> 00:11:23,240 Mm.

197 00:11:23,240 --> 00:11:23,260 Mm.

198 00:11:23,260 --> 00:11:23,340 Mm.

199 00:11:23,340 --> 00:11:23,440 Mm.

200 00:11:23,440 --> 00:11:23,520 Mm.

201 00:11:23,520 --> 00:11:23,580 Mm.

202 00:11:23,580 --> 00:11:23,640 Mm.

203 00:11:23,640 --> 00:11:23,660 Mm.

204 00:11:23,660 --> 00:11:24,000 Mm.

205 00:11:24,000 --> 00:11:24,020 Mm.

206 00:11:24,020 --> 00:11:24,040 Mm.

207 00:11:24,040 --> 00:11:24,460 Mm.

208 00:11:24,460 --> 00:11:24,660 Mm.

209 00:11:24,660 --> 00:11:24,760 Mm.

210 00:11:24,760 --> 00:11:24,920 Mm.

211 00:11:24,920 --> 00:11:25,020 Mm.

212 00:11:25,020 --> 00:11:25,040 Mm.

213 00:11:25,040 --> 00:11:25,100 Mm.

214 00:11:25,100 --> 00:11:25,160 Mm.

215 00:11:25,160 --> 00:11:25,260 Mm.

216 00:11:25,260 --> 00:11:26,580 That’s the real, that’s the real problem.

217 00:11:26,580 --> 00:11:27,220 Mm.

218 00:11:27,220 --> 00:11:27,320 Earlier.

219 00:11:27,320 --> 00:11:33,080 Earlier there was a discussion and we, we actually finished on that note in the, in the discussion panel.

220 00:11:33,380 --> 00:11:41,300 Uh, basically malware, it’s just, it’s just a tool, it’s just a weapon, right, so it all boils down to, uh, to a guns debate.

221 00:11:41,320 --> 00:11:41,480 Mm.

222 00:11:41,480 --> 00:11:41,520 Mm.

223 00:11:41,520 --> 00:11:41,620 Mm.

224 00:11:41,620 --> 00:11:41,780 Mm.

225 00:11:41,780 --> 00:11:44,700 vad som är rätt, vad som inte är rätt, användandet av det här.

226 00:11:46,240 --> 00:11:55,380 Men problemet med malware är att, jag menar, fysiska armar, fysiska armar är väldigt svåra att kontrollera.

227 00:11:55,540 --> 00:11:59,020 Och malware är ännu svårare, det är omöjligt att kontrollera.

228 00:11:59,020 --> 00:12:06,180 Jag menar, du kan kopiera det, och det kommer att leka, och det kommer att bli abuserat i alla fall på fel sätt.

229 00:12:06,180 --> 00:12:13,340 Och sen har du den falska flaggan i situationen, jag menar, du hittar upp den här arman, och du använder den,

230 00:12:13,420 --> 00:12:18,500 och sen har du en bra falsk flagga att gå in i och se ut som en annan attacker, jag menar.

231 00:12:18,580 --> 00:12:24,040 Exakt, exakt. Och det är därför attackerna använder dem, för de vet om de här förmågorna.

232 00:12:24,560 --> 00:12:25,120 Det är svårt att försöka.

233 00:12:25,900 --> 00:12:32,920 Så du nämnde i take-aways i slutet av din presentation att, jag menar, två saker är en global fördjupning,

234 00:12:33,440 --> 00:12:35,500 och du har omöjlig potential.

235 00:12:35,880 --> 00:12:36,060 Så.

236 00:12:36,180 --> 00:12:41,480 Så frågan till slutet av den här intervjun skulle vara, hur förbereder du dig för Kristnadsdagen den här åren?

237 00:12:42,900 --> 00:12:45,000 Några vakationer.

238 00:12:45,020 --> 00:12:47,800 Några vakationer. Vi kommer att vara på hög alerta.

239 00:12:49,220 --> 00:12:56,000 Och vi hoppas att det blir oändligt, men vi kommer att se.

240 00:12:57,000 --> 00:13:05,920 Okej, Anton och Robert, jag uppmärksammar att du tog dig tid att prata med oss här, och ha en fin fortsättning på den här konferensen.

241 00:13:06,180 --> 00:13:06,540 Tack så mycket.

242 00:13:06,560 --> 00:13:06,740 Tack.