sam skalicky biru cui. discovery architecture evaluation conclusion

17
STUXNET Sam Skalicky Biru Cui

Upload: tre-rendell

Post on 14-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

STUXNETSam Skalicky

Biru Cui

Page 2: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Outline

Discovery Architecture Evaluation Conclusion

Page 3: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Discovery

VirusBlokAda Zero-day Microsoft

Stuxnet <= .stub + MrxNet.sys Symantec

Page 4: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Organization Installation Propagation Target & Process

Page 5: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Organization

Exports Resources Configuration

Page 6: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Installation

E 15: environment scan, escalation E 16: copy, hide, autorun (certificate)

Page 7: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Propagation WinCC SQL P2P RPC Printer spooler Removable disk

.lnk, ~WTR4141.tmp, ~WTR4132.tmp Autorun.inf

Page 8: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Target Step 7 (E2/E14) PLC

Data Blocks (DB) System Data Blocks (SDB) Organization Blocks (OB) Function Blocks (FC)

Page 9: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Process Broker FC: RECV OB1/OB35

Page 10: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Process Profibus ID CP Frequency converter

Page 11: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Architecture

Process

1.41kHz 1.064kHz 2Hz

Page 12: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Evaluation

Complex code size propagation methods zero-day exploit certificate steal specific target Step/PLC/FC

Page 13: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Speculation

Where

Page 14: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Speculation

What

Page 15: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

Risk

Very small risk to the majority of users Worm was target so specifically

Modifying large spinning motors to fail Shorting out Overheat Disengage from their mounting

Consumes disk space (500KB) New type of worm detected

Page 16: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

What’s next?

W32.Duqu, a new beginning?

Page 17: Sam Skalicky Biru Cui.  Discovery  Architecture  Evaluation  Conclusion

References

[1] “Frequently Asked Questions on Virus-L/comp.virus.” Internet: http://www.faqs.org/faqs/computer-virus/faq/, Oct. 9, 1995 [Jan. 7, 2012].

[2] “MS10-061: Printer Spooler Vulnerability.” Internet: http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx, Sept. 14, 2010 [Jan. 7, 2012].

[3] Nicolas Falliere, Liam O Murchu, and Eric Chien, “W32.Stuxnet” Synmatec, November 2010.

[4] K. Zetter, “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,” Internet: http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1, July 11, 2011