Transcript
Page 1: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

1

Pwning the Industrial IoT: RCEs and backdoors are around!

Sergey Temnikov, Senior Security Researcher, Critical Infrastructure Defense TeamKaspersky Lab ICS CERTVladimir Dashchenko, Senior Security Researcher, Critical Infrastructure Defense TeamKaspersky Lab ICS CERT

Page 2: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

2

Page 3: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

3

Penetration testersMalware analysts

Security auditors

Industrial engineers

Security analysts

Security architects

Who are we?

Page 4: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

4

What’s the IIoT?

Page 5: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

5

What’s the IIoT?Simple words

Fancy concept/solution

Old security problems

IIoT

Page 6: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

6

Vulnerabilities

18

50

410

10

10

20

30

40

50

60

RCE DOS Injections File manipulations

Account manipulations

Vulnerabilities

Page 7: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

7

Vulnerability research approach

• Custom protocols

• DCOM

• OPC UA

Page 8: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

8

Vuln1. XML :(

Custom XML parser allows easy trace

Page 9: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

9

Vuln1. XML :(

Custom XML parser allows easy trace

Page 10: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

10

Vuln2. OPC UA :(

DOS and possible RCE

Page 11: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

11

Vuln3. Custom protocol

Not only ICS. It’s huge

Page 12: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

12

Vuln3. Custom protocolReported in Dec 2016 (2 RCE; 11 DOS)Reminded in the end of Dec 2016Sent report again in Jan 20176 months of nothingSilently pushes the driver updateNot installed with MS updatesWaited for CVEs (spoiler: no luck)Notified US ICS CERT about potential threat“Hey! We gonna talk about this at DEFCON” email ->private alert sent->confcall with VP/CTOPublishing public advisory with CVEs assigned (CVE-2017-11496, CVE-2017-11497, CVE-2017-11498)BUT THERE’S MORE

Page 13: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

13

Strange thing same vendor

Page 14: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

14

Strange thing same vendor

Looks like BEAR

Smells like BEAR

Acts like BEAR

Taste like BEAR

What’s that?

NOT-A-BEAR

Page 15: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

15

Strange thing same vendorRemotely enable and disable admin panel (undocumented). Panel available on 127.0.0.1

Remotely change proxy-server for the updates

Got the NTLM hash of user who runs the process

Still under research (got new RCEs; logical RCE?)

Page 16: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

16

Conclusion and advice

Share the knowledge

Stand corrected

If you want to do Industry 4.0, IIoT and blah-blah-blah – do it right and secure

3dr party software should be tested properly

Page 17: Pwningthe Industrial IoT: RCEs and backdoors are around!iotvillage.org/slides_dc25/Sergey_Vlad_DEFCON_IOT_Village_Public2017.pdf1 Pwningthe Industrial IoT: RCEs and backdoors are around!

17

THANK YOU!

Sergey Temnikov ([email protected])Vladimir Dashchenko ([email protected])


Top Related