SlideShare a Scribd company logo
1 of 23
Download to read offline
Project SHINE
[UPDATED] Findings Report Results
Bob Radvanovsky, CIFI, CISM, CIPS
rsradvan@infracritical.com
Jake Brodsky, PE
jbrodsky@infracritical.com
1
10th SANS ICS Security Summit, Orlando, FL, February 23-24, 2015
Project SHINE (SHodan INtelligence Extraction)
Tuesday, February 24, 2015
SHodan INtelligence Extraction
• Project SHINE was dependent upon SHODAN search engine;
• SHODAN incepted circa 2008;
• SHINE development started mid-2008, ended 31-Jan-2014;
• Question raised: Are industrial control systems directly
exposed to the Internet?
• No one appeared to know the magnitude of the issue,
or how widespread the issue was; and,
• In doing so, this was how Project “SHINE” got started...
2
Project SHINE
Mission Objectives
● To selectively perform searches from definable, searchable
term criteria sets using open intelligence sources;
● To correlate data into meaningful, abstractive and relevant
data that could be utilized to demonstrate further trending
and/or correlation analysis based on the data given;
● To seek a baseline of how many control systems’ devices exist
on the Internet (as of the conclusion of Project SHINE on 31-
Jan-2014, we were unable to establish a baseline); and,
● To raise public awareness via governments & media outlets.
3
Data Artifacts
● The crux of this project was choosing suitable, meaningful
search terms that identified control systems devices;
● The project was looking for not just control systems, but also
any infrastructure supporting it, such as HVAC systems, serial
converters, etc.;
● There were matches not related to actual infrastructure;
● Some units were not counted as some manufacturers’ names
changed as firms were bought and sold; and,
● Other devices may have been spuriously counted as similar
software may have been used by multiple manufacturers.
4
Types of Devices Discovered
5
• Traditional SCADA/ICS
 RTU Systems
 PLC Systems
 IEDs/Sensory Equipment
 SCADA/HMI Servers
 Building Automation
 Medical Devices (DAS)
• Non-Traditional SCADA/ICS
 Intelligent Traffic Control
 Automotive Control
 Traffic/Lighting Control
 HVAC/Environment Control
 Power Regulators/UPS
 Security/Access Control
 Serial Port Servers
 Data Radios
 Mining Equipment
 Traffic Cameras
Manufacturer Results
6
927
total number of
search terms
886
unique number
of search terms;
traditional and
non-traditional
578
unique number
of search terms;
non-traditional
removed
207
total number of
manufacturers
182
unique number
of traditional
manufacturers
41
total search term difference;
traditional and non-traditional
349
total search
term difference;
non-traditional
removed
25
total manufacturer difference
Top 11 Manufacturers
7
Manufacturer Count % Out of 100%
ENERGYICT 106235 18.10%
SIEMENS 84328 14.37%
MOXA 78309 13.34%
LANTRONIX 56239 9.58%
NIAGARA 54437 9.27%
GOAHEAD-WEB 42473 7.24%
VXWORKS 34759 5.92%
INTOTO 34686 5.91%
ALLIED-TELESYS 34573 5.89%
DIGI INTERNATIONAL 30557 5.21%
EMBEDTHIS-WEB 30381 5.17%
The devices found
estimated at
586,997, approx.
26.84% of total
2,186,971 devices
Top 16 HVAC/BACNet Manufacturers
8
The devices found
estimated at
13,475, approx.
0.62% of total
2,186,971 devices
Manufacturer Count % Out of 100%
HEATMISER 6487 48.13%
HONEYWELL 3588 26.63%
YORK 921 6.83%
BACNET INTERNATIONAL 560 4.16%
TRANE 506 3.76%
JOHNSON CONTROLS 460 3.41%
CARRIER 234 1.74%
TEMPERATURE GUARD 180 1.34%
LG ELECTRONICS 145 1.08%
LIEBERT 126 0.94%
CENTRALINE 81 0.60%
STULZ 77 0.57%
CONTROL4 38 0.28%
BOSCH AUTOMATION 37 0.27%
LENNOX 24 0.18%
CUMMINGS 11 0.08%
Top 6 Serial->Ethernet Manufacturers
9
The devices found
estimated at
204,416, approx.
9.35% of total
2,186,971 devices
Manufacturer Count % Out of 100%
MOXA 78309 38.31%
LANTRONIX 56239 27.51%
ALLIED TELESYS 34573 16.91%
DIGI INTERNATIONAL 30557 14.95%
ATOP SYSTEMS 3846 1.88%
MULTITECH SYSTEMS 892 0.44%
Example: MODBUS
10
Create a search
entry, and look
for MODBUS
devices
Search string would be:
http://www.shodanhq.com/search?q=modbus
Example: MODBUS
11
If searched on Google,
this device is…
HTTP/1.0 401 Unauthorized
Date: Thu, 18 Sep 2008 16:06:08 GMT
Server: Boa/0.93.15
Connection: close
WWW-Authenticate: Basic
realm="ModbusGW"
Content-Type: text/html
Returned HTTP header information from
one of the sites searched by SHODAN;
the detail information to that entry looks
like this…
Search Terms Found (Per Day)
12
0
50
100
150
200
250
300
350
400
450
500
14-Apr-2012
31-Jan-2014
654 days
Max Search Terms Found = 469 (out of 927)
Total Counts(Per Day)
13
14-Apr-2012
31-Jan-2014
654 days
0
2000
4000
6000
8000
10000
12000
14000
16000
Max Total Count = 13498
Counts by Country
14
Project RUGGEDTRAX
Mission Objectives
• To provide substantiation that directly connecting an ICS device
onto the Internet could have consequences;
• Obtain current ICS equipment through public sources (eBay), and
deploy equipment as actual cyber assets controlling perceived
critical infrastructure environments;
• Ascertain any pertinent threat/attack vectors, and magnitude of any
attacks against perceived critical infrastructure environments;
• Record access attempts, analyze network packets for patterns; and,
• Report redacted public awareness to governments & media outlets.
15
Device Specifications
● Serial->Ethernet converter
● Two-ports; supports both
MODBUS/TCP and DNP3
● Device is Siemens
RuggedCom RS910
● Firmware is v3.8.0
● Device connected directly
to Internet (NO FIREWALL)
● Supports: TELNET, TFTP,
RSH, SSH, SNMP,
HTTP/HTTPS, MODBUS/TCP
and DNP3
16
Device Configuration
● Disabled TELNET, TFTP, RSH,
SNMP and MODBUS/TCP
● SSH and HTTP/HTTPS
limited to ONE connection
● DNP3 cannot be disabled
● Device may be connected
via network (SSH), web
(HTTP/HTTPS), or serial
(console)
17
Project RUGGEDTRAX
Statistical Results
• Devices acquired from eBay were not properly “cleaned”, but were
“lobotomized” ; contained “residual data” from previous owner:
– Configuration information
– IP address and pertinent networking information
– Contact information
• Device placed online 13-Oct-2014 (Monday) @ 1917 hrs CDT
• First attack begins 13-Oct-2014 @ 2104 hrs CDT (< 2 hrs after incept)
• Device appears on SHODAN 15-Oct-2014 (Wednesday) @ 1229 hrs CDT
• Project concluded 27-Dec-2014 @ 1021 hrs CDT
• Total count of access attempts: 140,430 (from 651 IPs)
• Top country counted: China @ 125,299 (or 89.23%) (from 269 IPs)
18
Flaws and Potential Errors
• Countries identified do not implicate any specific nationality;
• IP addresses are based on country assignment -- nothing else;
• IP addresses may be:
– Falsified
– Spoofed
– Proxied, or
– Black-holed
• Unknown if human or “robot” attacking the device, although
it is highly probable that it is predominately automated
19
Project RUGGEDTRAX
Top 4 Countries
20
China 92.17% (60,318)
United States 1.44%
(945)
Germany 1.74% (1136)
France 4.65%
(3044)
Countries found
represent Top 50
entries of access
attempts of approx.
65,443 attempts,
of 140,430 attempts,
or approx. 46.60%
47 entries
1 entry per
country
Conclusion
● New legislation is needed to curb this behavior;
● Industry practices need to be modified;
● Diagnostic practices and configuration management schemes
need to improve dramatically;
● Sites may technically be in compliance with regulations --
only because the asset owners may have no idea that they
really are exposed; and,
● The community must get past this terrible practice of
compliance-based security and focus instead on an attitude
of safety, vigilance, and performance awareness.
21
Useful Information
• Project SHINE Findings Report [1 Oct 2014]:
– http://01m.us/l/ltjify8p2a1r
• Project RUGGEDTRAX Preliminary Report [21 Oct 2014]:
– http://01m.us/l/gltlhotyw69j
• Quantitatively Assessing and Visualising Industrial System
Attack Surfaces, Eireann Leverett [Jun 2011]:
– http://01m.us/l/hsjlqz
• 10th SANS ICS Security Summit Presentation [24 Feb 2015]:
– http://01m.us/l/72ikss
22
Questions?
Bob Radvanovsky, (630) 673-7740
rsradvan@infracritical.com
Jake Brodsky, (443) 285-3514
jbrodsky@infracritical.com

More Related Content

What's hot (20)

Marketing mix
Marketing mixMarketing mix
Marketing mix
 
Source & Message Factors.pptx
Source & Message Factors.pptxSource & Message Factors.pptx
Source & Message Factors.pptx
 
Brand ppt
Brand pptBrand ppt
Brand ppt
 
green marketing
green marketinggreen marketing
green marketing
 
Product Line and Product Mix decisions
Product Line and Product Mix decisionsProduct Line and Product Mix decisions
Product Line and Product Mix decisions
 
Ethics in advertising
Ethics in advertisingEthics in advertising
Ethics in advertising
 
Types of brand
Types of brandTypes of brand
Types of brand
 
Online Advertising
Online AdvertisingOnline Advertising
Online Advertising
 
Business Model Fingerprint Recognition
Business Model   Fingerprint RecognitionBusiness Model   Fingerprint Recognition
Business Model Fingerprint Recognition
 
Intro In Digital Marketing
Intro In Digital MarketingIntro In Digital Marketing
Intro In Digital Marketing
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Branding
BrandingBranding
Branding
 
e-mail marketing
e-mail marketinge-mail marketing
e-mail marketing
 
Brand management Full notes
Brand management Full notesBrand management Full notes
Brand management Full notes
 
Objectives of advertisements
Objectives of advertisementsObjectives of advertisements
Objectives of advertisements
 
Advertising objective
Advertising objectiveAdvertising objective
Advertising objective
 
IMC Participants & Partners by Amitabh Mishra
IMC Participants & Partners by Amitabh MishraIMC Participants & Partners by Amitabh Mishra
IMC Participants & Partners by Amitabh Mishra
 
Communication mix
Communication mixCommunication mix
Communication mix
 
Segmentation / Targeting / Positioning
Segmentation / Targeting / PositioningSegmentation / Targeting / Positioning
Segmentation / Targeting / Positioning
 
Ethics in Advertising
Ethics in AdvertisingEthics in Advertising
Ethics in Advertising
 

Similar to 10th SANS ICS Security Summit Project SHINE Presentation

CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackersShawn Wells
 
Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?BalaBit
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security IntelligenceSplunk
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...Priyanka Aash
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...TI Safe
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Amazon Web Services
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldAgile Testing Alliance
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Robert Greer
 
Check Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriCheck Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriAnthony Scudieri
 
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE - ATT&CKcon
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using BlockchainIRJET Journal
 

Similar to 10th SANS ICS Security Summit Project SHINE Presentation (20)

CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?Les Assises 2015 - Why people are the most important aspect of IT security?
Les Assises 2015 - Why people are the most important aspect of IT security?
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real World
 
Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)Check point security stock pitch greer, scudieri (1) (1)
Check point security stock pitch greer, scudieri (1) (1)
 
Check Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, ScudieriCheck Point Software Stock Pitch Greer, Scudieri
Check Point Software Stock Pitch Greer, Scudieri
 
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
 

More from Bob Radvanovsky

Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Bob Radvanovsky
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Bob Radvanovsky
 
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...Bob Radvanovsky
 
CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'Bob Radvanovsky
 
U.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran MissionU.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran MissionBob Radvanovsky
 
CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)Bob Radvanovsky
 
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)Bob Radvanovsky
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Bob Radvanovsky
 

More from Bob Radvanovsky (11)

Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)
 
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
THE EFFECT OF NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION CRITICAL INFRAS...
 
CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'CIA Former Chief using Stuxnet a 'good idea'
CIA Former Chief using Stuxnet a 'good idea'
 
U.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran MissionU.S. Knew of CIA Covert Iran Mission
U.S. Knew of CIA Covert Iran Mission
 
CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)CIA Knew About Stuxnet over a Decade Ago (Google search results)
CIA Knew About Stuxnet over a Decade Ago (Google search results)
 
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
CIA Knew About Stuxnet over a Decade Ago (current page, Part 2)
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)
 
IANS-2008
IANS-2008IANS-2008
IANS-2008
 
ACS-2010
ACS-2010ACS-2010
ACS-2010
 
ABA-ISC-2009
ABA-ISC-2009ABA-ISC-2009
ABA-ISC-2009
 

Recently uploaded

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

10th SANS ICS Security Summit Project SHINE Presentation

  • 1. Project SHINE [UPDATED] Findings Report Results Bob Radvanovsky, CIFI, CISM, CIPS rsradvan@infracritical.com Jake Brodsky, PE jbrodsky@infracritical.com 1 10th SANS ICS Security Summit, Orlando, FL, February 23-24, 2015 Project SHINE (SHodan INtelligence Extraction) Tuesday, February 24, 2015
  • 2. SHodan INtelligence Extraction • Project SHINE was dependent upon SHODAN search engine; • SHODAN incepted circa 2008; • SHINE development started mid-2008, ended 31-Jan-2014; • Question raised: Are industrial control systems directly exposed to the Internet? • No one appeared to know the magnitude of the issue, or how widespread the issue was; and, • In doing so, this was how Project “SHINE” got started... 2
  • 3. Project SHINE Mission Objectives ● To selectively perform searches from definable, searchable term criteria sets using open intelligence sources; ● To correlate data into meaningful, abstractive and relevant data that could be utilized to demonstrate further trending and/or correlation analysis based on the data given; ● To seek a baseline of how many control systems’ devices exist on the Internet (as of the conclusion of Project SHINE on 31- Jan-2014, we were unable to establish a baseline); and, ● To raise public awareness via governments & media outlets. 3
  • 4. Data Artifacts ● The crux of this project was choosing suitable, meaningful search terms that identified control systems devices; ● The project was looking for not just control systems, but also any infrastructure supporting it, such as HVAC systems, serial converters, etc.; ● There were matches not related to actual infrastructure; ● Some units were not counted as some manufacturers’ names changed as firms were bought and sold; and, ● Other devices may have been spuriously counted as similar software may have been used by multiple manufacturers. 4
  • 5. Types of Devices Discovered 5 • Traditional SCADA/ICS  RTU Systems  PLC Systems  IEDs/Sensory Equipment  SCADA/HMI Servers  Building Automation  Medical Devices (DAS) • Non-Traditional SCADA/ICS  Intelligent Traffic Control  Automotive Control  Traffic/Lighting Control  HVAC/Environment Control  Power Regulators/UPS  Security/Access Control  Serial Port Servers  Data Radios  Mining Equipment  Traffic Cameras
  • 6. Manufacturer Results 6 927 total number of search terms 886 unique number of search terms; traditional and non-traditional 578 unique number of search terms; non-traditional removed 207 total number of manufacturers 182 unique number of traditional manufacturers 41 total search term difference; traditional and non-traditional 349 total search term difference; non-traditional removed 25 total manufacturer difference
  • 7. Top 11 Manufacturers 7 Manufacturer Count % Out of 100% ENERGYICT 106235 18.10% SIEMENS 84328 14.37% MOXA 78309 13.34% LANTRONIX 56239 9.58% NIAGARA 54437 9.27% GOAHEAD-WEB 42473 7.24% VXWORKS 34759 5.92% INTOTO 34686 5.91% ALLIED-TELESYS 34573 5.89% DIGI INTERNATIONAL 30557 5.21% EMBEDTHIS-WEB 30381 5.17% The devices found estimated at 586,997, approx. 26.84% of total 2,186,971 devices
  • 8. Top 16 HVAC/BACNet Manufacturers 8 The devices found estimated at 13,475, approx. 0.62% of total 2,186,971 devices Manufacturer Count % Out of 100% HEATMISER 6487 48.13% HONEYWELL 3588 26.63% YORK 921 6.83% BACNET INTERNATIONAL 560 4.16% TRANE 506 3.76% JOHNSON CONTROLS 460 3.41% CARRIER 234 1.74% TEMPERATURE GUARD 180 1.34% LG ELECTRONICS 145 1.08% LIEBERT 126 0.94% CENTRALINE 81 0.60% STULZ 77 0.57% CONTROL4 38 0.28% BOSCH AUTOMATION 37 0.27% LENNOX 24 0.18% CUMMINGS 11 0.08%
  • 9. Top 6 Serial->Ethernet Manufacturers 9 The devices found estimated at 204,416, approx. 9.35% of total 2,186,971 devices Manufacturer Count % Out of 100% MOXA 78309 38.31% LANTRONIX 56239 27.51% ALLIED TELESYS 34573 16.91% DIGI INTERNATIONAL 30557 14.95% ATOP SYSTEMS 3846 1.88% MULTITECH SYSTEMS 892 0.44%
  • 10. Example: MODBUS 10 Create a search entry, and look for MODBUS devices Search string would be: http://www.shodanhq.com/search?q=modbus
  • 11. Example: MODBUS 11 If searched on Google, this device is… HTTP/1.0 401 Unauthorized Date: Thu, 18 Sep 2008 16:06:08 GMT Server: Boa/0.93.15 Connection: close WWW-Authenticate: Basic realm="ModbusGW" Content-Type: text/html Returned HTTP header information from one of the sites searched by SHODAN; the detail information to that entry looks like this…
  • 12. Search Terms Found (Per Day) 12 0 50 100 150 200 250 300 350 400 450 500 14-Apr-2012 31-Jan-2014 654 days Max Search Terms Found = 469 (out of 927)
  • 13. Total Counts(Per Day) 13 14-Apr-2012 31-Jan-2014 654 days 0 2000 4000 6000 8000 10000 12000 14000 16000 Max Total Count = 13498
  • 15. Project RUGGEDTRAX Mission Objectives • To provide substantiation that directly connecting an ICS device onto the Internet could have consequences; • Obtain current ICS equipment through public sources (eBay), and deploy equipment as actual cyber assets controlling perceived critical infrastructure environments; • Ascertain any pertinent threat/attack vectors, and magnitude of any attacks against perceived critical infrastructure environments; • Record access attempts, analyze network packets for patterns; and, • Report redacted public awareness to governments & media outlets. 15
  • 16. Device Specifications ● Serial->Ethernet converter ● Two-ports; supports both MODBUS/TCP and DNP3 ● Device is Siemens RuggedCom RS910 ● Firmware is v3.8.0 ● Device connected directly to Internet (NO FIREWALL) ● Supports: TELNET, TFTP, RSH, SSH, SNMP, HTTP/HTTPS, MODBUS/TCP and DNP3 16
  • 17. Device Configuration ● Disabled TELNET, TFTP, RSH, SNMP and MODBUS/TCP ● SSH and HTTP/HTTPS limited to ONE connection ● DNP3 cannot be disabled ● Device may be connected via network (SSH), web (HTTP/HTTPS), or serial (console) 17
  • 18. Project RUGGEDTRAX Statistical Results • Devices acquired from eBay were not properly “cleaned”, but were “lobotomized” ; contained “residual data” from previous owner: – Configuration information – IP address and pertinent networking information – Contact information • Device placed online 13-Oct-2014 (Monday) @ 1917 hrs CDT • First attack begins 13-Oct-2014 @ 2104 hrs CDT (< 2 hrs after incept) • Device appears on SHODAN 15-Oct-2014 (Wednesday) @ 1229 hrs CDT • Project concluded 27-Dec-2014 @ 1021 hrs CDT • Total count of access attempts: 140,430 (from 651 IPs) • Top country counted: China @ 125,299 (or 89.23%) (from 269 IPs) 18
  • 19. Flaws and Potential Errors • Countries identified do not implicate any specific nationality; • IP addresses are based on country assignment -- nothing else; • IP addresses may be: – Falsified – Spoofed – Proxied, or – Black-holed • Unknown if human or “robot” attacking the device, although it is highly probable that it is predominately automated 19
  • 20. Project RUGGEDTRAX Top 4 Countries 20 China 92.17% (60,318) United States 1.44% (945) Germany 1.74% (1136) France 4.65% (3044) Countries found represent Top 50 entries of access attempts of approx. 65,443 attempts, of 140,430 attempts, or approx. 46.60% 47 entries 1 entry per country
  • 21. Conclusion ● New legislation is needed to curb this behavior; ● Industry practices need to be modified; ● Diagnostic practices and configuration management schemes need to improve dramatically; ● Sites may technically be in compliance with regulations -- only because the asset owners may have no idea that they really are exposed; and, ● The community must get past this terrible practice of compliance-based security and focus instead on an attitude of safety, vigilance, and performance awareness. 21
  • 22. Useful Information • Project SHINE Findings Report [1 Oct 2014]: – http://01m.us/l/ltjify8p2a1r • Project RUGGEDTRAX Preliminary Report [21 Oct 2014]: – http://01m.us/l/gltlhotyw69j • Quantitatively Assessing and Visualising Industrial System Attack Surfaces, Eireann Leverett [Jun 2011]: – http://01m.us/l/hsjlqz • 10th SANS ICS Security Summit Presentation [24 Feb 2015]: – http://01m.us/l/72ikss 22
  • 23. Questions? Bob Radvanovsky, (630) 673-7740 rsradvan@infracritical.com Jake Brodsky, (443) 285-3514 jbrodsky@infracritical.com