SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
ITN 2009 – Torino, 15 Ottobre 2009




          Attacchi ad infrastrutture critiche:
                storie di vita vissuta
                                                                                        Raoul Chiesa

                                         Founder, Honorary President, @ Mediaservice.net
                    Director of Communication, Board of Directors Member, ISECOM
    Senior Advisor, Strategic Alliances & Cybercrime Issues at the United Nations
                                                                                   chiesa@UNICRI.it
Document Keywords
Infrastrutture Critiche Nazionali; SCADA; Automazione Industriale; Incidenti di Sicurezza; Attacchi
Informatici; Hacking; Sicurezza Nazionale; Penetration Test.

                                                                                                       1
ITN 2009 – Torino, 15 Ottobre 2009




                                        Agenda
Who is who
        - Il relatore
        - ISECOM
        - UNICRI


I crimini Hi-Tech nel XXI secolo & l’hacking

Le Infrastrutture Critiche Nazionali
          - Attacchi
          - Problematiche riscontrate
          - Incidenti
          - TETRA
          - Soluzioni
Contatti, Q&A

                                                                        2
ITN 2009 – Torino, 15 Ottobre 2009




Il relatore
Raoul Chiesa
– Director of Communications at ISECOM
       – Institute for Security and Open Methodologies
       – Originally called the Ideahamster Organization (Est. 2000)
       – Open Source Community Registered OSI
– Project Manager for H.P.P., OSSTMM Key Contributor
   • OPST, OPSA, ISECOM Authorized International Trainer
– Professor of IT Security at various Universities & Masters (Italy)
– Advisor on Cybercrime for the United Nations at UNICRI
– Board of Directors Member at ISECOM, CLUSIT, Telecom Security Task
  Force, and ISO ISMS IUG & OWASP
   Italian Chapters

                                                                       3
ITN 2009 – Torino, 15 Ottobre 2009



 ISECOM: who is who
• Institute for Security and Open Methodologies (Est.
  2002)
• Una Non-Profit Organization (registrata)
• Sedi a Barcelona (Spagna) e New York (U.S.A.)
• Open Source Community Registered OSI: utilizza un
  processo di Open and Peer Review assicurando
  Qualità e sviluppando una Chain of Trust,
  diventando così una community
  internazionalmente riconosciuta.
• Una Certification Authority “grown in the trust” e
  supportata da istituzioni accademiche (La Salle
  University network).
                                                           4
ITN 2009 – Torino, 15 Ottobre 2009



 UNICRI: who is who
• United Nations Interregional Crime &
  Justice Research Institute
• Fondato nel 1968 per assistere le
  organizzazioni governative,
  intergovernative e non-governative
  nella creazione e miglioramento di
  policy nel campo della crime
  prevention e criminal justice.
• WHQ a Torino (UN Staff College,
  ITC/ILO); uffici a Roma, Ginevra, New
  York, Luanda (Angola), Maputo
  (Mozambico).
                                                           5
ITN 2009 – Torino, 15 Ottobre 2009




Information Security
• L’evoluzione dei crimini dovrebbe essere analizzata
  da punti di vista innovativi

• Diversamente, non saremmo in grado di
  comprendere i nuovi nemici e, soprattutto, le loro
  motivazioni

• Informazione è la keyword per le minacce di oggi

• You got the information, you got the power…
                                                          6
ITN 2009 – Torino, 15 Ottobre 2009




21st Century
Le minacce odierne si stanno trasformando,
ed evolvendo:


• Hacking “for fun”
• (Low-level) Hacking for money/phishing
• (High-level) Hacking/Industrial espionage
• On-line Child pornography (business)
• Botnets
• Critical Information Infrastructures, CNI &
SCADA
• Cyberterrorism
• Copyright & Intellectual property violations
• E-Commerce frauds, scams
• On line gambling
• Privacy issues (social networks)


                                                                     7
ITN 2009 – Torino, 15 Ottobre 2009




Hacking: macro tipologie di attackers
   Low-level hackers: “script-kiddies” hunting for known security flaws
   (kind of “NEW”) Phishing, Remote low-level Social Engineering Attacks
   Insiders (user/supervisor/admin)
   Disgruntled Employees



   High-level, sophisticated hackers, Organized Crime: middle and high level attacks
   Hobbiest hackers
   Unethical “security guys”
   Unstructured attackers (SCAMs, medium & high-level hi-tech frauds,VISHING …)
   Structured attackers (“the italian job”, targeted attacks, industrial espionage)



   Espionage, Terrorism
   Foreign Espionage
   Hacktivist (unfunded groups)
   Terrorist groups (funded)
   State sponsored attacks




                                                                                       8
ITN 2009 – Torino, 15 Ottobre 2009




Critical National Infrastructures: high-level view

Le (principali) Infrastrutture Critiche Nazionali odierne possono essere
riassunte in:

  Telecommunications
  Electrical power systems
  Gas and oil storage and transportation
  Banking and finance
  Transportation
  Water supply systems
  Emergency services (medical, police, fire and rescue)
  Continuity of government




                                                                           9
ITN 2009 – Torino, 15 Ottobre 2009




Critical National Infrastructures: zooming/1
           Sector                                    Sample Target Sub-sectors
1.Energy and Utilities      Electrical power (generation, transmission, nuclear)
                                        Natural gas
                                        Oil production and transmission systems
2.Communications and
        Information Technology                     Telecommunications (phone, fax, cable, satellites)
                                       Broadcasting systems
                                       Software
                                       Hardware
                                       Networks (Internet)
3.         Finance                     Banking
                                       Securities
                                       Investment
4.Health Care                          Hospitals
                                                   Health-care facilities
                                       Blood-supply facilities
                                       Laboratories
                                       Pharmaceuticals
5.         Food                        Food safety
                                       Agriculture and food industry
                                       Food distribution

                                                                                                        10
ITN 2009 – Torino, 15 Ottobre 2009




Critical National Infrastructures: zooming/2
            Sector                        Sample Target Sub-sectors
6. Water                    Drinking water
                            Wastewater management
7. Transportation           Air
                            Rail
                            Marine
                            Surface
8. Safety                   Chemical, biological, radiological, and nuclear safety
                            Hazardous materials
                            Search and rescue
                            Emergency services (police, fire, ambulance and others)
                            Dams
9. Government               Government facilities
                            Government services (for example meteorological services)
                            Government information networks
                            Government assets
                            Key national symbols (cultural institutions and national sites
                            and monuments)
10. Manufacturing           Chemical industry
                            Defence industrial base
                                                                                             11
ITN 2009 – Torino, 15 Ottobre 2009




China is attacking: UK




                                                              12
ITN 2009 – Torino, 15 Ottobre 2009




China is attacking: USA




                                                               13
ITN 2009 – Torino, 15 Ottobre 2009




China is attacking: Germany




  The comments follow charges made by a top German intelligence
  official that computer hacking by China was occurring on an almost
  daily basis.




                                                                       14
ITN 2009 – Torino, 15 Ottobre 2009




China is attacking: France




 France has become the fourth country to speak out against hackers in
 China following an attack on French government systems.

 Francis Delon, France's secretary general for national defence,
 claimed that the country's systems had been compromised and that
 the evidence pointed to China.




                                                                        15
ITN 2009 – Torino, 15 Ottobre 2009




I problemi riscontrati


  Key issues                               Conseguenza

  Reti piatte (no segmentazione)           Vita facile ai worm
  No FW                                    ..arriva di tutto
  No AV                                    vulns note, bloccano la rete!
  No xIDS                                  Incident handling ?!? Anomalie ? Attacchi ?
                                           Trojan “ad-hoc” ?
  No Integrity Checker                     Modifiche ai file eseguibili
  Sicurezza fisica                         Accesso fisico non autorizzato
  Security Through Obscurity               Non funziona più (GSM Association docet)
  Differenze culturali                     Paradigma C-I-A VS A-I-C




                                                                                         16
ITN 2009 – Torino, 15 Ottobre 2009




SCADA&NCIs: incidents




                                                    17
ITN 2009 – Torino, 15 Ottobre 2009




SCADA&NCIs: incidents




                                                    18
ITN 2009 – Torino, 15 Ottobre 2009




SCADA&NCIs: incidents




                                                    19
ITN 2009 – Torino, 15 Ottobre 2009




SCADA: going commercial…



     Videoclip time !




                                                       20
ITN 2009 – Torino, 15 Ottobre 2009




SCADA&NCIs: sabotage




                                                   21
ITN 2009 – Torino, 15 Ottobre 2009




SCADA&NCIs: incidents




                                                    22
ITN 2009 – Torino, 15 Ottobre 2009




SCADA: incidents




                                                    23
ITN 2009 – Torino, 15 Ottobre 2009




SCADA&NCIs: incidents




                                                    24
ITN 2009 – Torino, 15 Ottobre 2009




SCADA&NCIs: incidents




                                                    25
ITN 2009 – Torino, 15 Ottobre 2009




TETRA & 911
• Nel 2007 siamo stati chiamati per effettuare verifiche
  di sicurezza presso un Paese dell’area GCC (Middle-
  East)
• Oltre ad un assessment di sicurezza “standard”, ci è
  stato chiesto di “spegnere il 911”
• Dopo aver richiesto autorizzazioni estese, e dopo aver
  toccato con mano lo scetticismo (vendor, e Cliente),
  ci siamo messi all’opera
• Dopo 14 minuti il 911 era down: no police, no
  ambulance, no fire department.

                                                         26
ITN 2009 – Torino, 15 Ottobre 2009




Altri case-studies (sotto NDA)
• Negli ultimi 3 anni ci siamo anche occupati di
  verificare l’effettivo livello di sicurezza esistente presso:
  – Energy Plants (Test Plant)
  – Pharmaceutical (live)
  – Finance
  – Telco
  – Air transport
  – Highways
  – Chemical
  – Industry

• ..In tutti questi casi, siamo riusciti a violare con
  successo l’infrastruttura e/o il target individuato.
                                                                      27
ITN 2009 – Torino, 15 Ottobre 2009




Possibili soluzioni ? Cultura!
• Cybercrime Trainings on SCADA & NCIs @ the United
  Nations (Torino, Italy)
  – http://www.unicri.it/wwd/cybertraining/index.php

  – http://www.unicri.it/wwd/cybertraining/info_security.php
  – http://www.unicri.it/wwd/cybertraining/hacker_profiling.php
  – http://www.unicri.it/wwd/cybertraining/SCADA.php
  – http://www.unicri.it/wwd/cybertraining/digital_forensics.php

  – http://www.unicri.it/wwd/cybertraining/ap-form_info.php



                                                                   28
ITN 2009 – Torino, 15 Ottobre 2009




Contacts, Q&A
Contacts:

• If you are interested in ISECOM projects:
Raoul Chiesa, Director of Communications at ISECOM                      raoul@ISECOM.org

• If you are interested in professional penetration testing for governments and LEAs:
Raoul Chiesa, Chief Technical Officer & Tiger Team manager            raoul@mediaservice.net

• If you are interested in UNICRI’s Cybercrime Trainings:
Raoul Chiesa, Senior Advisor & Strategic Alliances                      chiesa@UNICRI.it


                     GRAZIE DELL’ATTENZIONE!

                                  DOMANDE ?
                                                                                           29

Contenu connexe

En vedette

Alessio Pennasilico Wireless & Mobile Security2.0 Wlan 2009
Alessio Pennasilico Wireless & Mobile Security2.0   Wlan 2009Alessio Pennasilico Wireless & Mobile Security2.0   Wlan 2009
Alessio Pennasilico Wireless & Mobile Security2.0 Wlan 2009GoWireless
 
21st Century Tools for Health Leaders
21st Century Tools for Health Leaders21st Century Tools for Health Leaders
21st Century Tools for Health LeadersMargaret Stangl
 
Social Media Marketing Approaches & Outcomes
Social Media Marketing Approaches & OutcomesSocial Media Marketing Approaches & Outcomes
Social Media Marketing Approaches & OutcomesMargaret Stangl
 
Making Sense of Social Impact Investing
Making Sense of Social Impact InvestingMaking Sense of Social Impact Investing
Making Sense of Social Impact InvestingMargaret Stangl
 
Pepe Moder Cliente 2.0
Pepe Moder   Cliente 2.0Pepe Moder   Cliente 2.0
Pepe Moder Cliente 2.0GoWireless
 
Funding Your Social Enterprise: Approaches & Resources for Nonprofits
Funding Your Social Enterprise: Approaches & Resources for NonprofitsFunding Your Social Enterprise: Approaches & Resources for Nonprofits
Funding Your Social Enterprise: Approaches & Resources for NonprofitsMargaret Stangl
 
Crowdfunding Webinar 2011
Crowdfunding Webinar 2011Crowdfunding Webinar 2011
Crowdfunding Webinar 2011Margaret Stangl
 
Amplifying Social Impact in a Connected Age
Amplifying Social Impact in a Connected AgeAmplifying Social Impact in a Connected Age
Amplifying Social Impact in a Connected AgeMargaret Stangl
 
Mobilizing Communities in a Connected Age Funders Edition
Mobilizing Communities in a Connected Age Funders EditionMobilizing Communities in a Connected Age Funders Edition
Mobilizing Communities in a Connected Age Funders EditionMargaret Stangl
 
Antennas: the key to your wireless application Harald Naumann Round Solutions
Antennas: the key to your wireless application Harald Naumann Round SolutionsAntennas: the key to your wireless application Harald Naumann Round Solutions
Antennas: the key to your wireless application Harald Naumann Round SolutionsGoWireless
 

En vedette (10)

Alessio Pennasilico Wireless & Mobile Security2.0 Wlan 2009
Alessio Pennasilico Wireless & Mobile Security2.0   Wlan 2009Alessio Pennasilico Wireless & Mobile Security2.0   Wlan 2009
Alessio Pennasilico Wireless & Mobile Security2.0 Wlan 2009
 
21st Century Tools for Health Leaders
21st Century Tools for Health Leaders21st Century Tools for Health Leaders
21st Century Tools for Health Leaders
 
Social Media Marketing Approaches & Outcomes
Social Media Marketing Approaches & OutcomesSocial Media Marketing Approaches & Outcomes
Social Media Marketing Approaches & Outcomes
 
Making Sense of Social Impact Investing
Making Sense of Social Impact InvestingMaking Sense of Social Impact Investing
Making Sense of Social Impact Investing
 
Pepe Moder Cliente 2.0
Pepe Moder   Cliente 2.0Pepe Moder   Cliente 2.0
Pepe Moder Cliente 2.0
 
Funding Your Social Enterprise: Approaches & Resources for Nonprofits
Funding Your Social Enterprise: Approaches & Resources for NonprofitsFunding Your Social Enterprise: Approaches & Resources for Nonprofits
Funding Your Social Enterprise: Approaches & Resources for Nonprofits
 
Crowdfunding Webinar 2011
Crowdfunding Webinar 2011Crowdfunding Webinar 2011
Crowdfunding Webinar 2011
 
Amplifying Social Impact in a Connected Age
Amplifying Social Impact in a Connected AgeAmplifying Social Impact in a Connected Age
Amplifying Social Impact in a Connected Age
 
Mobilizing Communities in a Connected Age Funders Edition
Mobilizing Communities in a Connected Age Funders EditionMobilizing Communities in a Connected Age Funders Edition
Mobilizing Communities in a Connected Age Funders Edition
 
Antennas: the key to your wireless application Harald Naumann Round Solutions
Antennas: the key to your wireless application Harald Naumann Round SolutionsAntennas: the key to your wireless application Harald Naumann Round Solutions
Antennas: the key to your wireless application Harald Naumann Round Solutions
 

Similaire à Chiesa_ Isecom

Raoul Chiesa Hacking A Impianti Industriali
Raoul Chiesa   Hacking A Impianti IndustrialiRaoul Chiesa   Hacking A Impianti Industriali
Raoul Chiesa Hacking A Impianti IndustrialiGoWireless
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09vafopoulos
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARIUS EUGEN OPRAN
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustryKyna Tsai
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction FIA2010
 
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010Uk wireless network hijacking 2010
Uk wireless network hijacking 2010CPPGroup Plc
 
Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Bilcare Research
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
IoT and Crime Prevention
IoT and Crime PreventionIoT and Crime Prevention
IoT and Crime PreventionIoTUK
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreichimec
 

Similaire à Chiesa_ Isecom (20)

Raoul Chiesa Hacking A Impianti Industriali
Raoul Chiesa   Hacking A Impianti IndustrialiRaoul Chiesa   Hacking A Impianti Industriali
Raoul Chiesa Hacking A Impianti Industriali
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
MARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OKMARMARA2012_CyberTerror_ElecGrid_OK
MARMARA2012_CyberTerror_ElecGrid_OK
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Uk wireless network hijacking 2010
Uk wireless network hijacking 2010Uk wireless network hijacking 2010
Uk wireless network hijacking 2010
 
Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
IoT and Crime Prevention
IoT and Crime PreventionIoT and Crime Prevention
IoT and Crime Prevention
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
iMinds 2012
iMinds 2012iMinds 2012
iMinds 2012
 
iMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram SinnreichiMinds The Conference 2012 - Aram Sinnreich
iMinds The Conference 2012 - Aram Sinnreich
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
 
IoT 2005 от ITU
IoT 2005 от ITUIoT 2005 от ITU
IoT 2005 от ITU
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 

Plus de GoWireless

Claroni _Club Italia
Claroni _Club ItaliaClaroni _Club Italia
Claroni _Club ItaliaGoWireless
 
Ermini _Powersoft
Ermini _PowersoftErmini _Powersoft
Ermini _PowersoftGoWireless
 
Colognesi _Eguides
Colognesi _EguidesColognesi _Eguides
Colognesi _EguidesGoWireless
 
Giovinazzo_ In2
Giovinazzo_ In2Giovinazzo_ In2
Giovinazzo_ In2GoWireless
 
Rossotto R&P Legal
Rossotto R&P LegalRossotto R&P Legal
Rossotto R&P LegalGoWireless
 
Alberico Centro Ricerche Rai
Alberico Centro Ricerche RaiAlberico Centro Ricerche Rai
Alberico Centro Ricerche RaiGoWireless
 
Del Corso Rivista Firmware
Del Corso Rivista FirmwareDel Corso Rivista Firmware
Del Corso Rivista FirmwareGoWireless
 
Cantamessa_ Polito
Cantamessa_ PolitoCantamessa_ Polito
Cantamessa_ PolitoGoWireless
 
De Sanctis _Sisvel
De Sanctis _SisvelDe Sanctis _Sisvel
De Sanctis _SisvelGoWireless
 
Banzi_Interporto Bologna
Banzi_Interporto BolognaBanzi_Interporto Bologna
Banzi_Interporto BolognaGoWireless
 
Pagano_ Mambrini _ I N T E C S
Pagano_ Mambrini _ I N T E C SPagano_ Mambrini _ I N T E C S
Pagano_ Mambrini _ I N T E C SGoWireless
 
Altigieri _Enel
Altigieri _EnelAltigieri _Enel
Altigieri _EnelGoWireless
 
Pirovano _ Critical City
Pirovano _ Critical CityPirovano _ Critical City
Pirovano _ Critical CityGoWireless
 
Verga_ Epson Meteo
Verga_ Epson MeteoVerga_ Epson Meteo
Verga_ Epson MeteoGoWireless
 
Frascari _ Expo 2015
Frascari  _ Expo 2015Frascari  _ Expo 2015
Frascari _ Expo 2015GoWireless
 
Musmeci _Telespazio
Musmeci _TelespazioMusmeci _Telespazio
Musmeci _TelespazioGoWireless
 
Vanderbeeken_EXPERIENTIA
Vanderbeeken_EXPERIENTIAVanderbeeken_EXPERIENTIA
Vanderbeeken_EXPERIENTIAGoWireless
 
Montesion _Time & Mind
Montesion _Time & MindMontesion _Time & Mind
Montesion _Time & MindGoWireless
 

Plus de GoWireless (20)

Claroni _Club Italia
Claroni _Club ItaliaClaroni _Club Italia
Claroni _Club Italia
 
Ermini _Powersoft
Ermini _PowersoftErmini _Powersoft
Ermini _Powersoft
 
Colognesi _Eguides
Colognesi _EguidesColognesi _Eguides
Colognesi _Eguides
 
Pierucci_Cuna
Pierucci_CunaPierucci_Cuna
Pierucci_Cuna
 
Giovinazzo_ In2
Giovinazzo_ In2Giovinazzo_ In2
Giovinazzo_ In2
 
Caporale_ASI
Caporale_ASICaporale_ASI
Caporale_ASI
 
Rossotto R&P Legal
Rossotto R&P LegalRossotto R&P Legal
Rossotto R&P Legal
 
Alberico Centro Ricerche Rai
Alberico Centro Ricerche RaiAlberico Centro Ricerche Rai
Alberico Centro Ricerche Rai
 
Del Corso Rivista Firmware
Del Corso Rivista FirmwareDel Corso Rivista Firmware
Del Corso Rivista Firmware
 
Cantamessa_ Polito
Cantamessa_ PolitoCantamessa_ Polito
Cantamessa_ Polito
 
De Sanctis _Sisvel
De Sanctis _SisvelDe Sanctis _Sisvel
De Sanctis _Sisvel
 
Banzi_Interporto Bologna
Banzi_Interporto BolognaBanzi_Interporto Bologna
Banzi_Interporto Bologna
 
Pagano_ Mambrini _ I N T E C S
Pagano_ Mambrini _ I N T E C SPagano_ Mambrini _ I N T E C S
Pagano_ Mambrini _ I N T E C S
 
Altigieri _Enel
Altigieri _EnelAltigieri _Enel
Altigieri _Enel
 
Pirovano _ Critical City
Pirovano _ Critical CityPirovano _ Critical City
Pirovano _ Critical City
 
Verga_ Epson Meteo
Verga_ Epson MeteoVerga_ Epson Meteo
Verga_ Epson Meteo
 
Frascari _ Expo 2015
Frascari  _ Expo 2015Frascari  _ Expo 2015
Frascari _ Expo 2015
 
Musmeci _Telespazio
Musmeci _TelespazioMusmeci _Telespazio
Musmeci _Telespazio
 
Vanderbeeken_EXPERIENTIA
Vanderbeeken_EXPERIENTIAVanderbeeken_EXPERIENTIA
Vanderbeeken_EXPERIENTIA
 
Montesion _Time & Mind
Montesion _Time & MindMontesion _Time & Mind
Montesion _Time & Mind
 

Dernier

A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.mcshagufta46
 
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...AustraliaChapterIIBA
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.ukaroemirsr
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access
 
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003believeminhh
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfCharles Cotter, PhD
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Winbusinessin
 
Mihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZMihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZKanakChauhan5
 
Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Lviv Startup Club
 
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfPDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfHajeJanKamps
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...IMARC Group
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Onlinelng ths
 
Slicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup BerlinSlicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup BerlinAnton Skornyakov
 
Plano de marketing- inglês em formato ppt
Plano de marketing- inglês  em formato pptPlano de marketing- inglês  em formato ppt
Plano de marketing- inglês em formato pptElizangelaSoaresdaCo
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024Stephan Koning
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBBPMedia1
 
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGUNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGlokeshwarmaha
 

Dernier (20)

WAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdfWAM Corporate Presentation Mar 25 2024.pdf
WAM Corporate Presentation Mar 25 2024.pdf
 
A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.A flour, rice and Suji company in Jhang.
A flour, rice and Suji company in Jhang.
 
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
IIBA® Melbourne - Navigating Business Analysis - Excellence for Career Growth...
 
7movierulz.uk
7movierulz.uk7movierulz.uk
7movierulz.uk
 
Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024Borderless Access - Global Panel book-unlock 2024
Borderless Access - Global Panel book-unlock 2024
 
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
The Vietnam Believer Newsletter_MARCH 25, 2024_EN_Vol. 003
 
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdfTalent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
Talent Management research intelligence_13 paradigm shifts_20 March 2024.pdf
 
Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024Ethical stalking by Mark Williams. UpliftLive 2024
Ethical stalking by Mark Williams. UpliftLive 2024
 
Mihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZMihir Menda - Member of Supervisory Board at RMZ
Mihir Menda - Member of Supervisory Board at RMZ
 
Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)Michael Vidyakin: Introduction to PMO (UA)
Michael Vidyakin: Introduction to PMO (UA)
 
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdfPDT 89 - $1.4M - Seed - Plantee Innovations.pdf
PDT 89 - $1.4M - Seed - Plantee Innovations.pdf
 
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
Boat Trailers Market PPT: Growth, Outlook, Demand, Keyplayer Analysis and Opp...
 
To Create Your Own Wig Online To Create Your Own Wig Online
To Create Your Own Wig Online  To Create Your Own Wig OnlineTo Create Your Own Wig Online  To Create Your Own Wig Online
To Create Your Own Wig Online To Create Your Own Wig Online
 
Slicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup BerlinSlicing Work on Business Agility Meetup Berlin
Slicing Work on Business Agility Meetup Berlin
 
Plano de marketing- inglês em formato ppt
Plano de marketing- inglês  em formato pptPlano de marketing- inglês  em formato ppt
Plano de marketing- inglês em formato ppt
 
Investment Opportunity for Thailand's Automotive & EV Industries
Investment Opportunity for Thailand's Automotive & EV IndustriesInvestment Opportunity for Thailand's Automotive & EV Industries
Investment Opportunity for Thailand's Automotive & EV Industries
 
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 Building Your Personal Brand on LinkedIn - Expert Planet-  2024 Building Your Personal Brand on LinkedIn - Expert Planet-  2024
Building Your Personal Brand on LinkedIn - Expert Planet- 2024
 
Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024Borderless Access - Global B2B Panel book-unlock 2024
Borderless Access - Global B2B Panel book-unlock 2024
 
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John MeulemansBCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
BCE24 | Virtual Brand Ambassadors: Making Brands Personal - John Meulemans
 
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISINGUNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
UNLEASHING THE POWER OF PROGRAMMATIC ADVERTISING
 

Chiesa_ Isecom

  • 1. ITN 2009 – Torino, 15 Ottobre 2009 Attacchi ad infrastrutture critiche: storie di vita vissuta Raoul Chiesa Founder, Honorary President, @ Mediaservice.net Director of Communication, Board of Directors Member, ISECOM Senior Advisor, Strategic Alliances & Cybercrime Issues at the United Nations chiesa@UNICRI.it Document Keywords Infrastrutture Critiche Nazionali; SCADA; Automazione Industriale; Incidenti di Sicurezza; Attacchi Informatici; Hacking; Sicurezza Nazionale; Penetration Test. 1
  • 2. ITN 2009 – Torino, 15 Ottobre 2009 Agenda Who is who - Il relatore - ISECOM - UNICRI I crimini Hi-Tech nel XXI secolo & l’hacking Le Infrastrutture Critiche Nazionali - Attacchi - Problematiche riscontrate - Incidenti - TETRA - Soluzioni Contatti, Q&A 2
  • 3. ITN 2009 – Torino, 15 Ottobre 2009 Il relatore Raoul Chiesa – Director of Communications at ISECOM – Institute for Security and Open Methodologies – Originally called the Ideahamster Organization (Est. 2000) – Open Source Community Registered OSI – Project Manager for H.P.P., OSSTMM Key Contributor • OPST, OPSA, ISECOM Authorized International Trainer – Professor of IT Security at various Universities & Masters (Italy) – Advisor on Cybercrime for the United Nations at UNICRI – Board of Directors Member at ISECOM, CLUSIT, Telecom Security Task Force, and ISO ISMS IUG & OWASP Italian Chapters 3
  • 4. ITN 2009 – Torino, 15 Ottobre 2009 ISECOM: who is who • Institute for Security and Open Methodologies (Est. 2002) • Una Non-Profit Organization (registrata) • Sedi a Barcelona (Spagna) e New York (U.S.A.) • Open Source Community Registered OSI: utilizza un processo di Open and Peer Review assicurando Qualità e sviluppando una Chain of Trust, diventando così una community internazionalmente riconosciuta. • Una Certification Authority “grown in the trust” e supportata da istituzioni accademiche (La Salle University network). 4
  • 5. ITN 2009 – Torino, 15 Ottobre 2009 UNICRI: who is who • United Nations Interregional Crime & Justice Research Institute • Fondato nel 1968 per assistere le organizzazioni governative, intergovernative e non-governative nella creazione e miglioramento di policy nel campo della crime prevention e criminal justice. • WHQ a Torino (UN Staff College, ITC/ILO); uffici a Roma, Ginevra, New York, Luanda (Angola), Maputo (Mozambico). 5
  • 6. ITN 2009 – Torino, 15 Ottobre 2009 Information Security • L’evoluzione dei crimini dovrebbe essere analizzata da punti di vista innovativi • Diversamente, non saremmo in grado di comprendere i nuovi nemici e, soprattutto, le loro motivazioni • Informazione è la keyword per le minacce di oggi • You got the information, you got the power… 6
  • 7. ITN 2009 – Torino, 15 Ottobre 2009 21st Century Le minacce odierne si stanno trasformando, ed evolvendo: • Hacking “for fun” • (Low-level) Hacking for money/phishing • (High-level) Hacking/Industrial espionage • On-line Child pornography (business) • Botnets • Critical Information Infrastructures, CNI & SCADA • Cyberterrorism • Copyright & Intellectual property violations • E-Commerce frauds, scams • On line gambling • Privacy issues (social networks) 7
  • 8. ITN 2009 – Torino, 15 Ottobre 2009 Hacking: macro tipologie di attackers Low-level hackers: “script-kiddies” hunting for known security flaws (kind of “NEW”) Phishing, Remote low-level Social Engineering Attacks Insiders (user/supervisor/admin) Disgruntled Employees High-level, sophisticated hackers, Organized Crime: middle and high level attacks Hobbiest hackers Unethical “security guys” Unstructured attackers (SCAMs, medium & high-level hi-tech frauds,VISHING …) Structured attackers (“the italian job”, targeted attacks, industrial espionage) Espionage, Terrorism Foreign Espionage Hacktivist (unfunded groups) Terrorist groups (funded) State sponsored attacks 8
  • 9. ITN 2009 – Torino, 15 Ottobre 2009 Critical National Infrastructures: high-level view Le (principali) Infrastrutture Critiche Nazionali odierne possono essere riassunte in: Telecommunications Electrical power systems Gas and oil storage and transportation Banking and finance Transportation Water supply systems Emergency services (medical, police, fire and rescue) Continuity of government 9
  • 10. ITN 2009 – Torino, 15 Ottobre 2009 Critical National Infrastructures: zooming/1 Sector Sample Target Sub-sectors 1.Energy and Utilities Electrical power (generation, transmission, nuclear) Natural gas Oil production and transmission systems 2.Communications and Information Technology Telecommunications (phone, fax, cable, satellites) Broadcasting systems Software Hardware Networks (Internet) 3. Finance Banking Securities Investment 4.Health Care Hospitals Health-care facilities Blood-supply facilities Laboratories Pharmaceuticals 5. Food Food safety Agriculture and food industry Food distribution 10
  • 11. ITN 2009 – Torino, 15 Ottobre 2009 Critical National Infrastructures: zooming/2 Sector Sample Target Sub-sectors 6. Water Drinking water Wastewater management 7. Transportation Air Rail Marine Surface 8. Safety Chemical, biological, radiological, and nuclear safety Hazardous materials Search and rescue Emergency services (police, fire, ambulance and others) Dams 9. Government Government facilities Government services (for example meteorological services) Government information networks Government assets Key national symbols (cultural institutions and national sites and monuments) 10. Manufacturing Chemical industry Defence industrial base 11
  • 12. ITN 2009 – Torino, 15 Ottobre 2009 China is attacking: UK 12
  • 13. ITN 2009 – Torino, 15 Ottobre 2009 China is attacking: USA 13
  • 14. ITN 2009 – Torino, 15 Ottobre 2009 China is attacking: Germany The comments follow charges made by a top German intelligence official that computer hacking by China was occurring on an almost daily basis. 14
  • 15. ITN 2009 – Torino, 15 Ottobre 2009 China is attacking: France France has become the fourth country to speak out against hackers in China following an attack on French government systems. Francis Delon, France's secretary general for national defence, claimed that the country's systems had been compromised and that the evidence pointed to China. 15
  • 16. ITN 2009 – Torino, 15 Ottobre 2009 I problemi riscontrati Key issues Conseguenza Reti piatte (no segmentazione) Vita facile ai worm No FW ..arriva di tutto No AV vulns note, bloccano la rete! No xIDS Incident handling ?!? Anomalie ? Attacchi ? Trojan “ad-hoc” ? No Integrity Checker Modifiche ai file eseguibili Sicurezza fisica Accesso fisico non autorizzato Security Through Obscurity Non funziona più (GSM Association docet) Differenze culturali Paradigma C-I-A VS A-I-C 16
  • 17. ITN 2009 – Torino, 15 Ottobre 2009 SCADA&NCIs: incidents 17
  • 18. ITN 2009 – Torino, 15 Ottobre 2009 SCADA&NCIs: incidents 18
  • 19. ITN 2009 – Torino, 15 Ottobre 2009 SCADA&NCIs: incidents 19
  • 20. ITN 2009 – Torino, 15 Ottobre 2009 SCADA: going commercial… Videoclip time ! 20
  • 21. ITN 2009 – Torino, 15 Ottobre 2009 SCADA&NCIs: sabotage 21
  • 22. ITN 2009 – Torino, 15 Ottobre 2009 SCADA&NCIs: incidents 22
  • 23. ITN 2009 – Torino, 15 Ottobre 2009 SCADA: incidents 23
  • 24. ITN 2009 – Torino, 15 Ottobre 2009 SCADA&NCIs: incidents 24
  • 25. ITN 2009 – Torino, 15 Ottobre 2009 SCADA&NCIs: incidents 25
  • 26. ITN 2009 – Torino, 15 Ottobre 2009 TETRA & 911 • Nel 2007 siamo stati chiamati per effettuare verifiche di sicurezza presso un Paese dell’area GCC (Middle- East) • Oltre ad un assessment di sicurezza “standard”, ci è stato chiesto di “spegnere il 911” • Dopo aver richiesto autorizzazioni estese, e dopo aver toccato con mano lo scetticismo (vendor, e Cliente), ci siamo messi all’opera • Dopo 14 minuti il 911 era down: no police, no ambulance, no fire department. 26
  • 27. ITN 2009 – Torino, 15 Ottobre 2009 Altri case-studies (sotto NDA) • Negli ultimi 3 anni ci siamo anche occupati di verificare l’effettivo livello di sicurezza esistente presso: – Energy Plants (Test Plant) – Pharmaceutical (live) – Finance – Telco – Air transport – Highways – Chemical – Industry • ..In tutti questi casi, siamo riusciti a violare con successo l’infrastruttura e/o il target individuato. 27
  • 28. ITN 2009 – Torino, 15 Ottobre 2009 Possibili soluzioni ? Cultura! • Cybercrime Trainings on SCADA & NCIs @ the United Nations (Torino, Italy) – http://www.unicri.it/wwd/cybertraining/index.php – http://www.unicri.it/wwd/cybertraining/info_security.php – http://www.unicri.it/wwd/cybertraining/hacker_profiling.php – http://www.unicri.it/wwd/cybertraining/SCADA.php – http://www.unicri.it/wwd/cybertraining/digital_forensics.php – http://www.unicri.it/wwd/cybertraining/ap-form_info.php 28
  • 29. ITN 2009 – Torino, 15 Ottobre 2009 Contacts, Q&A Contacts: • If you are interested in ISECOM projects: Raoul Chiesa, Director of Communications at ISECOM raoul@ISECOM.org • If you are interested in professional penetration testing for governments and LEAs: Raoul Chiesa, Chief Technical Officer & Tiger Team manager raoul@mediaservice.net • If you are interested in UNICRI’s Cybercrime Trainings: Raoul Chiesa, Senior Advisor & Strategic Alliances chiesa@UNICRI.it GRAZIE DELL’ATTENZIONE! DOMANDE ? 29