US 13 Apa Compromising Industrial Facilities From 40 Miles Away Slides
US 13 Apa Compromising Industrial Facilities From 40 Miles Away Slides
US 13 Apa Compromising Industrial Facilities From 40 Miles Away Slides
About Us
Lucas Apa
Vulnerability Research Exploitation Cryptography Reverse Engineering ICS/SCADA
Argentina Colombia
Carlos Penagos
Agenda
Motivation Industries and Applications Wireless Standards Journey of Radio Encryption Keys Vendor1 Wireless Devices Vendor2 Wireless Devices Vendor3 Wireless Devices
Motivation
Critical Infrastructures becoming targets Insider attacks (Lately)
Devices connected to Internet 0days to reach the PLC, RTU, HMI
Tank level monitoring Pipeline cathodic protection Rectifier voltage monitoring Gas/liquid flow measurement Pipeline pressure and valve monitoring
Energy - Utilities
Remote pumping stations Water treatment plants Water distribution systems Wastewater/sewer collection systems
Waste & Waste Water
7
10
11
Master Key Unsecured Transport Out-of-band Technique Secure other keys Link Key Unicast Unique between nodes Network Key Regenerated at Intervals Needed to join the NWK
Trust Center
A
MasterKey_TA LinkKey TA NetworkKey MasterKey_AB LinkKey AB
B
MasterKey_TB LinkKey TB NetworkKey MasterKey_AB LinkKey AB
12
No Encryption Key
No Encryption Key
No Encryption key
16
18
C:\>passgen.exe 2013-04-04 21:39:08 => 1365136748 => knc6gadr40565d3j8hbrs6o0 2013-04-04 21:39:07 => 1365136747 => nir3f1a0dm2sdt41q91c06nt 2008-04-17 15:20:47 => 1208470847 => re84q92vssgd671pd2smj8ig
19
vs
Easily breakable by an outsider Further Research with the Devices Comissioning Tools needs deep testing
20
21
22
Applications
Oil & Gas Refining / Petro Chemicals Water & Waste Water Utilities Industrial Process Monitoring
23
Transmitters
RTD Temperature Transmitter Analog/Discrete Transmitter Flow Totalizer Transmitter Pressure Transmitter Hydrostatic Level Transmitter Many more..
SCADA
DCS HMI EFM
24
25
From documentation: If the project file name is changed, a new Site Security Key will be assigned Possible Scheme: Per-Site Encryption
This Key MUST be somewhere on the Project File.
26
27
ProjectB
\x51\x58\x4f\x51
1364154449 Sun, 24 Mar 2013 19:47:29 GMT
28
Component Identification
Support Center
RISC
29
Component Identification
430F14 9
32
No Per-Client Key
Dear <<Reseller Sales Eng>>, We are going to borrow a used Analog Transmitter from one of our partners, We are going to test it for a few weeks and let you know if we decide to buy a new one. Are there any specific concern we might take into account when deploying this device to connect it with our <Device>? Or just upgrade all project configuration files? Thank you
Lucas, You just need to upgrade the configuration files. Thanks.
33
34
Wireless Gateway
Gateways are responsible for receiving/collecting data from wireless end nodes
The collected data can be communicated with third-party Modbus device such as a RTU, PLC, EFM, HMI, or DCS
35
Tx
Stolen Node
Tx
S e r i a l
Extraction
Site Security Key
Project File
C a p t u r e
FF 41 0A 00 0A 00 00 00 04 00 AB D0 9A 51 B0 ...
36
37
38
40
SCADA
DCS HMI EFM
41
Vendor3 Devices
Company Profile
Self-proclaimed leader in process and industrial automation Clients: Nearly all manufacturing companies from Fortune 500 22.000 different products across 40 industries
Nodes
42
Research
Wireless Family Technical Note: Multi-layer security protocol protects your data
Network Security Data Security Data Integrity and Control Reliability The wireless I/O systems provide a level of security, data integrity, and reliability far exceeding most wireless systems on the market today
44
45
46
48
49
Secure the Node Physical Access (Mainly KDC) Use hardware Anti-tamper mechanisms Audit Source Code // Audit Site regularly ICS-CERT Hardening Guides
50
Conclusions
Problem space has always been an open topic The journey of keys allows practical attacks WSNs standards maturity is growing Vendors can fail at implementing them No evidence of previous security reviews Testing the field location is possible with the proper Hardware and open source Software
CC1111
51
RZUSB
TelosB
HackRF
Aknowledgements
ICS/CERT US/CERT References: Piotr Szcezechowiak, Haowen Chan, A. Perrig, Seyit A. Camtepe, Bulent Yener, Rob Havelt, Travis Goodspeed, Joshua Wright IOActive, Inc.
52
THANK YOU !
Lucas Apa (lucas.apa@ioactive.com) Carlos Penagos (carlos.hollman@ioactive.com)