0% found this document useful (0 votes)
18 views8 pages

Two Decades of SCADA Exploitation

Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970’s, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early 2000’s industrial networks were opened to the public internet. The reasons were manifold. Increased interconnectivity led to more productivity, simplicity and ease of use. It decreased

Uploaded by

renatoalmeida.nt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views8 pages

Two Decades of SCADA Exploitation

Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970’s, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early 2000’s industrial networks were opened to the public internet. The reasons were manifold. Increased interconnectivity led to more productivity, simplicity and ease of use. It decreased

Uploaded by

renatoalmeida.nt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Two Decades of SCADA Exploitation:

A Brief History
Simon Duque Antón, Daniel Fraunholz, Christoph Lipps,
Frederic Pohl, Marc Zimmermann and Hans D. Schotten
Intelligent Networks Research Group
German Research Center for Artificial Intelligence
DE-67663 Kaiserslautern
Email: {firstname}.{lastname}@dfki.de
arXiv:1905.08902v1 [cs.CR] 21 May 2019

Abstract—Since the early 1960, industrial process control has an industrial company is unique and very hard to get around
been applied by electric systems. In the mid 1970’s, the term in [9]. As recent events, many of which are explained in
SCADA emerged, describing the automated control and data section V, show, both assertions do not hold true anymore,
acquisition. Since most industrial and automation networks were
physically isolated, security was not an issue. This changed, if they ever did. Many recent examples show that industrial
when in the early 2000’s industrial networks were opened networks can and will be breached. It needs to be highlighted,
to the public internet. The reasons were manifold. Increased that, as in consumer electronics, the user plays a crucial
interconnectivity led to more productivity, simplicity and ease role in securing a system. Many of the newer botnets, such
of use. It decreased the configuration overhead and downtimes as Hajime or Mirai, try to gain access by using default
for system adjustments. However, it also led to an abundance of
new attack vectors. In recent time, there has been a remarkable credentials, with a tremendous success. This behaviour has
amount of attacks on industrial companies and infrastructures. been analysed, among others, in our previous works [10], [11].
In this paper, known attacks on industrial systems are analysed. Many industrial systems use credentials for means of config-
This is done by investigating the exploits that are available on uration. For reasons of ease of use, however, the passwords
public sources. The different types of attacks and their points of are often weak and shared among many users. Attackers that
entry are reviewed in this paper. Trends in exploitation as well
as targeted attack campaigns against industrial enterprises are try standard configurations to gain access will succeed if the
introduced. system credentials have not been altered. This kind of threat
is also common in the exploits examined in section IV. It is
I. I NTRODUCTION very hard for intrusion detection systems to discover abuse
that is performed with valid credentials. Changing default
In the 1970’s, the third industrial revolution took place [1].
credentials is therefore a vital step in order to enable security in
During this phase, computers were introduced into industry
a system. The remainder of this work is structured as follows.
in order to automate tasks that, until then, had to be done
In section II, surveys and analyses of attacks are listed. After
by hand or by application-tailored solutions. Since then, the
that, a statistical analysis of the Common Vulnerabilities and
computer technology has taken huge steps. Reconfigurable
Exposures (CVE) list is performed in section III. This is
Programmable Logic Controllers (PLCs) took the place of
followed by an in-depth analysis of available Supervisory
hard-wired relay logic circuits [2]. Domain-specific, propri-
Control And Data Acquisition (SCADA)-system based exploits
etary fieldbuses, like CAN [3] and Modbus [4], [5], have been
in section IV, as well as a breakdown of attack campaigns
replaced by TCP/IP-based solutions, such as ModbusTCP [5],
against industry in section V. The lessons learned are listed
[6], ProfiNET [7] and OPC UA [8], that make use of the vastly
in section VI. This work will be concluded in section VII.
available internet infrastructure and its network hardware.
Opening networks to the outside enables easier management II. R ELATED W ORK
of production capabilities. Remote maintenance, simpler ad-
Even though there are a lot of survey papers, as well
justment of machines and a constant flow of information
as taxonomies that present an overview of different kinds
are but a few of the advantages. There are, however, some
of attacks, there has not yet been a systematic analysis of
downsides. Two of the main reasons why security is inherently
all publicly available SCADA exploits to the best of our
absent in virtually every technology and protocol used, are as
knowledge. A very broad and extensive overview over current
follows: Industrial networks were physically separated from
SCADA-based attack-vectors can be found in the works of
the internet, when the technology arose [9] and each set up of
Zhu, Joseph and Sastry [12]. In addition to that, there are
This is a preprint of a publication published at the 1st IEEE Conference other works that give an overview over existing SCADA-
on Application, Information and Network Security (AINS). Please cite as: S. attacks and survey current exploits [9], [13], [14], [15]. Not
D. Duque Anton, D. Fraunholz, C. Lipps, F. Pohl, M. Zimmermann, H. D. only attacks on SCADA-systems are well documented, but also
Schotten, “Two Decades of SCADA Exploitation: A Brief History,” in: 2017
IEEE Conference on Application, Information and Network Security (AINS). countermeasures, as well as means for hardening systems, are
IEEE, IEEE Press, 2017, pp. 98-104. processed in literature [16], [17]. There are also works pre-
senting taxonomies of attacks, also in order to help operators to the distributed nature of production environment and the
assess risks and threats to their systems and implement the fact that machines have hardware interfaces.
according countermeasures [18], [19], as well as works for the
collection of data that allows for insight about the condition of A. Attacks on PLCs
a system [20], [21]. The German Federal Office for Informa- PLCs are resource for industrial applications controlling
tion Security (BSI) periodically releases security advices for Cyber-Physical (Production) Systems. Hence, they interact
industry [22]. Furthermore, there are surveys analysing specific with and operate devices in the physical world. In contrast to
domains, such as automotive and fieldbus-security [23] (some office IT systems which only handle data, they interact with
of the relevant works are in German [24], [25]) and wireless- the real world. Attacks on PLCs therefore have an impact on
security [26]. Many of the exploits we examine in this paper physical entites, be it human workers or production resources.
have already been investigated in literature. The amount of This leads to grave consequences of the successful abuse
works analysing singular attacks is vast, therefore, we only of PLCs. As common computation resources, PLCs usually
reference such works in the according sections. require an underlying operating system. In most cases, this
is a version of Windows, adapted to the specific needs for
III. S TATISTICAL A NALYSIS industrial applications. As there is an abundance of exploits
An exhaustive list of all CVEs can be found online [27]. and vulnerabilites based on flaws in the operating system,
Since it contains over 100 000 entries, manual analysis was we only consider vulnerabilities that specifically derive from
infeasible. We developed a text-processing script in order to the industrial application of the given system. Furthermore,
gain statistical information about the distribution of exploits. only threats that occur in this context are analysed. In total,
A major drawback was that the most specific information was we found about 100 exploits as metasploit [30] modules and
written in natural language, without any form. We searched Proofs of Concepts (PoC). All metasploit-modules are listed in
the document for keywords while using stemming in order the Rapid7-database [31]. The databases we searched addition-
to find any variant of the keyword. Stemming is a technique ally were exploit-db [32], 0day-today [33] and packetstorm-
employed to process natural languages [28]. The word stems security [34]. This number is smaller than the entries found
of keywords are derived, then similar word stems are searched in the CVE list in section III as there is executable code to be
in the target file. We used the python stemming-library [29]. found. As a result, anybody can exploit these vulnerabilities
The results of the statistical analysis are summarised in table I. without much difficulties, rendering them very dangerous
The entry ”Overall categorized entries”, as well as the for operators. The number of CVE discoveries and exploit
”Percentage covered by keywords”, display the number of developments per year is shown in figure 1. Unfortunately,
different attacks that have been classified, after accounting for some exploits could not be attributed to a year; this has been
entries with multiple keywords. That means 65 919 entries (or accounted for by a question mark. The list amounts to a mean
61.87%) in the CVE list can be attributed to at least one of the value of 8.8 and a median of 7 exploit developments per year.
categories. The largest group is Remote Code Execution with A peak of 31 developments per year can be found in 2011. One
28 000 occurrences, closely followed by Denial of Service possible explanation is that it was the year after Stuxnet [35]
(DoS) and Injection attacks. SCADA exploits are relatively was discovered (see table II) and there was a special interest
small, with only 373 entries. This shows that, even though in PLC-exploitation. The trend of CVE-development is also
it is not as present as office IT-based attacks, SCADA-based rising, meaning that the amount of CVEs discovered per year
exploits are becoming more of an issue for manufacturers. has been rising, starting in 2011.

IV. I N - DEPTH A NALYSIS


In this section, four different types of attacks that are
relevant for industrial applications are analysed. First, attacks
on PLC systems are considered in subsection IV-A. After that,
fieldbus-based exploits are discussed in subsection IV-B, fol-
lowed by wireless- and hardware-attacks in subsections IV-C
and IV-D. These types of attacks were chosen to be discussed
as they are the industrial-specific attack vectors and have
not be discussed at large in the context of office-IT-security.
PLCs can mostly be found in industrial environments as they
are used to control production machines. The same goes for
fieldbus systems, that, aside from some appliances in home Fig. 1. Number of Exploit and CVE Discoveries per Year
automation, are comonly employed in industrial automation.
Wireless networks are also commonly used in office and home We distinguished between four different categories of ex-
environments. There are, however, industry specific protocols ploits:
that are only applied in this context. These protocols are • Code Execution is the unauthorised execution of mali-
discussed here. Hardware attacks can have a great impact due cious code
TABLE I
S TATISTICAL A NALYSIS OF THE CVE-L IBRARY

Description Keywords Number Percentage


All CVEs - 106 540 100.00%
Remote Code Execution rce, arbitrary, execution 28 016 26.30%
Denial of Service denial, crash, instable, consume 19 638 18.43%
Injection attacks injection, sql 17 280 16.22%
Information Disclosure traverse, disclose, sensitive, bypass 14 875 13.96%
Buffer Overflows buffer, overflow 9 800 9.20%
SCADA-attacks scada, plc, industry, modbus, profinet, beckhoff, siemens 373 0.35%
Overall categorized entries - 65 919 61.87%
Entries w/ multiple keywords - 21 620 20.29%

• Data Extraction is the unauthorised disclosure of infor-


mation
• DoS describes the partial or full degradation of the
availability of a service or resource
• Privilege Escalation is the process of maliciously obtain-
ing higher privileges on a system than intended
The distribution of these categories on windows-based sys-
tems is depicted in figure 2. Of 66 windows-based exploits,
almost three quarters allow the execution of arbitrary code.
This is a tremendous threat since it allows an attacker to alter,
add and delete resources on the affected system.

Fig. 4. Distribution of Categories for Remote Exploits

system he already has unprivileged access to, usually in the


form of a user account with limited rights. Remote exploits
can be executed without any prior access to the system,
despite some form of network connection. In figure 3, the
distribution of the categories for local access is shown. The
overall number of local exploits is relatively small, comprising
only 12 exploits. In this scenario, the execution of code is most
common. The distribution of the categories for remote access
is shown in figure 4. It comprises of 84 exploits, most of
Fig. 2. Distribution of Categories on Windows Platforms
which are code execution as well. The most prevalent threat
for PLC-based exploitation is the execution of remote code.
This is a very severe threat because of the priorities of industry.
While in classic office-IT, the CIA (Confidentiality, Integrity,
Availability) security targets are common, each with about the
same importance, the most important security target by far
for industry is availability. Unavailable production facilities
cost a huge amount of money, making this the top priority of
machine operators. Code Execution has the potential to disable
facilities, rendering them unavailable and costing revenue.

B. Attacks on Fieldbus-Level
Due to the proprietary nature of industrial networks, a vast
landscape of fieldbus protocols has emerged. Protocols such as
Modbus [4], Profinet [7], CAN [3], Local Interconnect Network
Fig. 3. Distribution of Categories for Local Exploits (LIN) [36], Media Oriented System Transport (MOST) [37] and
FlexRay [38]. These protocols have inherent security flaws.
Furthermore, we grouped all exploits into remote and local. Since there are no means of authentication, identities are
Local exploits allow an attacker to execute an exploit on a not assigned to the participating entities [12]. That means
an attacker with access to the bus can appear as a valid problem in wireless networks are relay attacks. Using those, an
communication partner and thus extract and inject messages. attacker can capture a communication packet, transport it over
This results in a break of confidentiality and integrity. Due a different protocol, and inject it into the network on a different
to these security flaws and the lack of encryption [39], an place. This is commonly done with Bluetooth or RFID. An
attacker can monitor the systems and even deploy attacks. attacker can use this method to get a response to a challenge,
Examples for such attacks are Man in the Middle (MitM) and even though the key is not near a key reader. This method has
DoS. In systems using Modbus, malicious adversaries can read already successfully been applied to break the Passive Keyless
all messages to discover active controllers and used function Entry and Start (PKES) of different car manufacturers [50].
codes as well as inject commands themselves. Additionally, Spoofing and impersonation are other common attack concepts
they can send incorrect messages or error flags to eliminate on wireless protocols. Spoofing means the disguise of an
single controllers or even the entire system. Many industrial attacker as a valid entity to participate in a communication,
systems have a remote maintenance interface that can be impersonation describes an attacker that claims to be an entity
accessed via internet [14]. Often, this interface is secured she is not. Bluetooth is vulnerable to attacks with Rogue
poorly, or not at all [14]. This means that an attacker with Access Points (APs) [26], among others. Those are APs that
access to the same network as the interface can change system are set up by an attacker and imitate valid APs. Because
settings and read system conditions. Gateways are used in of the ad-hoc nature and the frequency hopping properties
order to connect several fieldbus networks. Oftentimes, these of Bluetooth, rogue APs are hard to detect [26]. The same
gateways are not configured securely, allowing an attacker that concept can be applied to RFID, where fake tags or readers
has access to one fieldbus network, to traverse to different can read or manipulate entries [51]. Furthermore, wireless
networks [24]. As a counter example, OPC-UA [8] needs to channels are inherently prone to jamming attacks. Since there
be mentioned. It is a very modern fieldbus-protocol that allows is no access control, an attacker can flood the channel with
definition of entities, including authentication and encryption. packets, or simply jam it with noise [52]. This prevents the
The shell model allows for encapsulation of functional units valid users from communicating with each other. There are
and the definition of interfaces. also more sophisticated approaches that exploit protocol flaws
to prevent communication or that do not jam constantly to
C. Attacks on Wireless Systems make discovery harder [52].
Driven by the fourth industrial revolution, wireless commu-
nication finds its way into industrial systems. There are some D. Physical-Layer Attacks
protocols that are commonly used in industrial applications,
such as Bluetooth Low Energy [40], ZigBee [41] and Z- Physical, or hardware attacks, are among the most dif-
Wave [42], Radio Frequency IDentifier (RFID) [43] and the ficult ones. An adversary with physical access to a device
Long Range Wide Area Network (LoRa) [44]. Wireless Local or system has more possibilities of inflicting damage and
Area Network (WLAN) [45] is also often used in industry, but abusing services than one on a remote location. Industrial
since it was originally developed for classical office-IT, it is not companies, therefore, put a strong emphasis on obstruction of
considered in this work. RFID is commonly used by industry physical access by perimeters such as, walls, gates and guards.
to tag entities and materials and account for them in storage Given access, an adversary can, with enough force, always
or production. The other protocols are commonly used for destroy a system rendering it unusable and creating a DoS.
data transmission and communication. There are several flaws There are, however, more sophisticated and subtle approaches
and fixes for WLAN, but they are out of scope for this work in tampering with devices. There are attacks on embedded
for the reasons named above. As there is no physical access devices, particularly PLCs, that falsify sensor values. This,
control to the wireless channel, an adversary can listen to the in turn, creates, inapt reactions from the devices, leading to
communication, given he is within the range of the wireless undesired behaviour. In literature, there is the ”Ghost in the
signal. Therefore, most wireless communication protocols are PLC”-attack, that alters the input-pins of a PLC, as described
encrypted. Still, some encryption schemes can be broken, by Abbasi and Hashemi [53]. Another work on falsifying input
rendering the content unprotected. If there is no, or weak, values and creating improper responses from the system is
encryption, an attacker can listen to the communication and shown by Urbina, Giraldo, Tippenhauer and Cardenas [54]. In
extract information to perform a MitM [46] attack. Further- addition to tampering with sensor-values, an attacker can read
more, he can inject messages into the network with the purpose or update the code on a PLC. Such an attack is described by
of launching DoS attacks. A famous example is Wireless Basnight, Butts, Lopez and Dube [55]. In order to stealthily
Equivalent Privacy (WEP) [47], that is broken [48] but still in deploy malware on a PLC, Garcia, Brasser, Cintuglu, Sadeghi,
use. Another example is ZigBee whose encryption key, in its Mohammed and Zonouz propose a method to read system
default configuration, can easily be recovered by an attacker. information and create a fitting rootkit [56]. Even though it
Due to poor manufacturer implementations, the secret key is is not the most relevant attack vector in practice, securing
often transmitted in plain text if a new device advertises to physical access is a vital task for industry, since adversaries
the network, for example after restarting [49]. An attacker can with direct access have many opportunities with a potentially
obtain this key and gains full access to the network. Another high impact.
V. ATTACK C AMPAIGNS • 3: The malware targets software related to ICS projects
The exploits that have been introduced in section IV have • 4: The malware targets PLCs and other native devices
been used for attack campaigns against industrial players. We and protocols
found that there were two noteworthy kinds of attacks: In addition to that, the presumed purpose, the affected ICS
• Spearphishing campaigns against employees and CVEs that were used in the exploit are listed. Slam-
• Attacks on the industrial infrastructure mer and Conficker were computer worms that also infected
Phishing and spearphishing are common practices for mali- nuclear power station [65] respectively air force stations in
cious adversaries intending to gain insight on company secrets France and Germany [66]. Stuxnet [35] is one of the most
by gaining access to the office IT infrastructure and stealing renowned industrial malwares. It was aimed at Iranian nuclear
data. A timeline of known spearphishing campaigns with an enrichment facilities, but, due to programming errors, also
industrial background is shown in figure 5. In phishing, un- infected other systems and therefore was found. It used several
suspecting victims are sent emails with malicious content, of- different 0-day exploits, depending on the operating systems it
tentimes a link to a website that is infected with malware [57]. encountered, and showed a deep understanding of Siemens S7-
Attachments with malicious content are another common form 300 PLCs. Duqu and Duqu 2.0 [67], [68] were used for spy-
of phishing [57]. The chances of an attacker to get a victim to ing on industrial project documents. Shamoon and Shamoon
follow the link can be increased by personalizing the email. 2.0 [69] were intended on sabotaging the Saudi-Arabian oil
This is called “social engineering” [57], the application of industry. Stuxnet 0.5 [70] was aimed at sabotaging Iranian
phishing to selected targets with highly adapted content is nuclear enrichment facilities, also by infecting Siemens S7-300
called “spearphishing”. PLCs. It was employed before Stuxnet, but was found later
due to a different propagation mechanism. Havex [62] was
a malware infecting the European energy industry and spying
on confidential information. BlackEnergy and Industroyer [71]
were aimed at Ukrainian power plants. Major blackouts in
December of 2015, respectively December of 2016 in the
Ukraine are said to result from BlackEnergy and Industroyer.

Fig. 5. Timeline of Selected Spearphishing Campaigns


VI. L ESSONS L EARNED
Operation Aurora [58] aimed at the software industry, par-
ticularly Google. The Night Dragon, Greek Oil and New Year’s We used Shodan [72], an internet search engine that spe-
campaigns aimed at various branches of the energy industry, cialises on the Internet of Things (IoT) and industrial ap-
namely research and petroleum processing [59]. Furthermore, plications. Specifically, we grouped our search by ports and
the Nitro campaign [60] aimed at the chemical industry and only looked for ports that are the default for several industrial
was intended to obtain sensitive documents, designs and protocols. The results of this survey is shown in table III. It can
schemas for manufacturing. Black Vine [61] campaign was be seen that there still is a huge amount of industrial devices to
used for several targets. First, aerospace companies were in be found, directly connected to the internet. Since all of the en-
the focus. After that, it was aimed against healthcare institu- tries in table III are fieldbuses, their connection to the internet
tions in the U.S. The Dragonfly [62] and Black Energy [63] is risky. They were never designed for security as one of the
campaigns aimed at the energy industry as well, this time paradigms in their development was the physical separation
against Industrial Control System (ICS) manufacturing and of industrial network and internet [9]. This assumption does
power generation. In a report, an attack campaign, that is called not hold for about 1.45 million fieldbuses, that, depending on
Unnamed [64] in our timeline in figure 5, was described also their configuration, can be accessed - and probably tampered
aimed for the extraction of confidential information about ICS with - by an attacker via internet access. We introduced some
manufacturing in the energy industry. Attacks on the industrial concepts for botnets in our previous works [10], [11], and there
infrastructure often aim at sabotaging production. Highly are other projects that develop industrial honeypots, such as the
sophisticated malware is employed in these campaigns [57]. Conpot [73]-project and the IoT-pot [74]. One could assume
A selected list of all known industrial malware campaigns can that some of the entries in table III originate in honeypots.
be found in table II. In this table, the name of the malware We found that 137 of the above entries definitely stem from
is shown, as well as the year of discovery. Furthermore, the honeypots by comparing the banners found with the default
presumed target is listed, followed by a Target Score (TS) banners of Conpot. Even though it is plausible that we missed
describing the kind of attack that was employed. The TS is several honeypots, we deem it probable that a majority of
assigned a value according to the following scheme: the entries is from productive systems. Despite the fact that
• 1: The malware does not specifically target ICS, the security flaws in industrial applications have been a critical
incurred consequences are a side effect issue for quite some time, there still are devices and protocols
• 2: The malware targets Windows machines related to ICS used in insecure ways.
TABLE II
A S ELECTION OF ATTACK T OOLS AND C AMPAIGNS

Name Year Presumed Target TS Purp. Affected ICS Exploited CVE


Slammer 2003 untargeted 1 Sabot. Nuclear Power Station CVE-2002-0649
Conficker 2009 untargeted 1 Sabot. French & German Air Force CVE-2008-4250
Stuxnet 2010 Iranian Nuclear Enrichment Facilites 4 Sabot. Siemens S7-300 CVE-2010-2568
CVE-2008-4250
CVE-2010-2729
CVE-2010-2772
Duqu / Duqu 2.0 2011/2015 Industrial Project Documents 3 Esp. - -
Shamoon / Shamoon 2.0 2012/2017 Saudi-Arabian Oil Industry 2 Sabot. - -
Regin 2012 GSM Base Stations 4 Esp. - -
Stuxnet 0.5 2013 Iranian Nuclear Enrichment Facilites 4 Sabot. Siemens S7-300 CVE-2012-3015
Havex 2013 European Energy Industry 3 Esp. - -
BlackEnergy 2016 Ukrainian Power Plant 3 Sabot. - CVE-2014-4114
CVE-2014-0751
Industroyer 2017 Ukrainian Power Plant 4 Sabot. Siemens SIPROTEC CVE-2015-5374

TABLE III ACKNOWLEDGMENTS


D EVICES F OUND P UBLICLY A DDRESSABLE BY Shodan
This work has been supported by the Federal Ministry of
Service Port Numbers Hits Hit Percentage
Education and Research of the Federal Republic of Germany
EtherNet/IP 2222 1 015 093 69.78%
DNP3 20000 232 108 15.95% (Foerderkennzeichen KIS4ITS0001, IUNO). The authors alone
OMRON 9600 51 911 3.57% are responsible for the content of the paper.
Niagara Fox 1911 46 806 3.22%
ENIP 44818 32 100 2.21%
Proconos 20547 19 761 1.36% R EFERENCES
Modbus 502 18 732 1.29%
CoDeSys 1200, 2455 17 667 1.21% [1] S. Thomson, “Is this the start of a fourth industrial revolution?”
PCWorx 1962 14 949 1.03% 2015. [Online]. Available: https://www.weforum.org/agenda/2015/09/
Siemens 102 3368 0.23% fourth-industrial-revolution/?utm content=buffer274c7&utm medium=
Fieldbus 1089-1091 924 0.06% social&utm source=twitter.com&utm campaign=buffer
Profinet 34962-34964 809 0.06% [2] B. Galloway and G. P. Hancke, “Introudction to industrial control net-
DNP 19999 300 0.02% works,” IEEE Communications Surveys Tutorials, vol. 15, no. 2, pp.
EtherCAT 34980 270 0.02% 860–880, 2013.
[3] Robert Bosch GmbH, “Can specification: Version 2.0,” 1991.
Sum - 1 454 798 100.00%
[Online]. Available: http://www.bosch-semiconductors.de/media/ubk
semiconductors/pdf 1/canliteratur/can2spec.pdf
[4] MODICON Inc., 1996. [Online]. Available: http://www.modbus.org/
docs/PI MBUS 300.pdf
VII. C ONCLUSION [5] Modbus-IDA, “Modbus messaging on tcp/ip implementation guide
v1.0b,” 2006. [Online]. Available: http://www.modbus.org/docs/
Modbus Messaging Implementation Guide V1 0b.pdf
[6] Modbus, “Modbus application protocol specification v1.1b3,” 2012.
The trend in figure 1 shows that PLC-exploitation is be- [Online]. Available: http://www.modbus.org/docs/Modbus Application
Protocol V1 1b3.pdf
coming more relevant. At the same time, our findings in [7] PROFIBUS, “Profinet specification,” 2017. [Online]. Avail-
section VI point out that many operators do not employ able: http://www.profibus.com/nc/download/specifications-standards/
their industrial networks in a physically separated way to downloads/profinet-io-specification/display/
[8] OPC Foundation, “Unified architecture,” 2017.
at least provide basic security. In this work, we showed [Online]. Available: https://opcfoundation.org/developer-tools/
that the kill chain for ICS is rather easy to use. There are specifications-unified-architecture/part-1-overview-and-concepts
tools to identify vulnerable systems, as well as databases that [9] V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in
scada networks,” Computers & Security, vol. 25, pp. 498–506, 2006.
contain information about vulnerabilities and sometimes also
[10] D. Fraunholz, D. Krohmer, S. Duque Anton, and H. D. Schotten, “Inves-
the corresponding exploits. This makes it simple also for non tigation of cyber crime conducted by abusing weak or default passwords
tech-savvy people to attack systems and cause damage. The with a medium interaction honeypot,” in International Conference On
rising importance of interconnectivity in industrial applications Cyber Security And Protection Of Digital Services(Cyber Security-17).
IEEE, 2017.
will lead to an increase in interest of attackers. As more [11] D. Fraunholz, M. Zimmermann, S. Duque Anton, J. Schneider, and H. D.
and more industrial systems become accessible, get more Schotten, “Distributed and highly-scalable wan network attack sensing
complex software and are remotely configurable, the number and sophisticated analysing framework based on honeypot technology,”
in 7th International Conference on Cloud Computing, Data Science
of possibilities for exploitation and intrusion also increases. & Engineering (Confluence-2017), Amity School of Engineering and
Many industrial operators maintain their production units for Technology. IEEE, 1 2017, p. 33.
decades with little or no possibilities for software updates. [12] B. Zhu, A. Joseph, and S. Sastry, “A taxonomy of cyber attacks on scada
systems,” 2011 International Conference on Internet of Things and 4th
This leads to a tremendous danger, as more exploits occur International Conference on Cyber, Physical and Social Computing, pp.
every year. 380–388, 2011.
[13] P. S. Motta Pires and Oliveira, Luiz Affonso H. G., “Security aspects Available: https://www.symantec.com/content/en/us/enterprise/media/
of scada and corporate network interconnection: An overview,” 2006 security response/whitepapers/w32 stuxnet dossier.pdf
International Conference on Dependability of Computer Systems, pp. [36] LIN Consortium, “Lin specification package revision 2.2a,” 2010.
127–134, 2006. [Online]. Available: https://www.cs-group.de/wp-content/uploads/2016/
[14] J. Caswell, “A survey of industrial control systems security,” 2011. 11/LIN Specification Package 2.2A.pdf
[Online]. Available: https://www.cse.wustl.edu/∼jain/cse571-11/ftp/ics/ [37] MOST Cooperation, “Most specification rev. 3.0 e2,” 2010.
[15] B. Meixell and E. Forner, “Out of control: Demonstrating scada [Online]. Available: http://www.mostcooperation.com/publications/
exploitation,” Las Vegas, July 2013. [Online]. Available: https: specifications-organizational-procedures/request-download/
//www.blackhat.com/us-13/ mostspecification-3v0e2pdf/
[16] R. Chandia, J. Gonzalez, T. Kilpatrick, M. Papa, and S. Shenoi, [38] FlexRay Consortium, “Flexray communications system pro-
“Security strategies for scada networks,” International Conference tocol specification version 3.0.1,” 2010. [Online]. Avail-
on Critical Infrastructure Protection, vol. 253, pp. 117–131, able: https://svn.ipd.kit.edu/nlrp/public/FlexRay/FlexRay%E2%84%
2007. [Online]. Available: https://www.researchgate.net/publication/ A2%20Protocol%20Specification%20Version%203.0.1.pdf
221654717 Security Strategies for SCADA Networks [39] A. Porros, “Nuking and defending scada networks,” 2010. [On-
[17] A. Hildick-Smith, “Security for critical infrastructure scada line]. Available: https://www.noconname.org/files/presentaciones/2010/
systems,” 2005. [Online]. Available: https://www.sans.org/reading-room/ NocONName 2010-Nuking and defending SCADA networks.pdf
whitepapers/warfare/security-critical-infrastructure-scada-systems-1644 [40] Bluetooth SIG, “Specification of the bluetooth system,” 2010.
[18] International Organization for Standardization, “Iso/iec 27001,” 2013. [Online]. Available: https://www.google.de/url?sa=t&rct=j&q=&esrc=
[Online]. Available: https://www.iso.org/standard/54534.html s&source=web&cd=1&ved=0ahUKEwiY76 but3UAhWDWBoKHXn
[19] M. Langfinger, S. Duque Anton, C. Lipps, A. Weinand, and H. D. Schot- ARUQFggpMAA&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fwww.bluetooth.org%
ten, “Angriffe la carte - systematische bewertung von angriffsvektoren 2Fdocman%2Fhandlers%2Fdownloaddoc.ashx%3Fdoc id%
auf industrielle (funk-)netzwerke,” in 17. VDI Automatisierungskongress 3D229737&usg=AFQjCNFY1IFeFAAWwimnoaWMsIRZQvPDSw&
(AUTOMATION-2016), VDI. VDI, 6 2016. cad=rja
[20] S. Duque Anton, D. Fraunholz, and H. D. Schotten, “Angriffserken- [41] ZigBee Alliance, “Zigbee specification,” 2004. [Online]. Available:
nung fuer industrielle netze innerhalb des projektes iuno,” in ITG- http://www3.nd.edu/∼mhaenggi/ee67011/zigbee.pdf
Fachtagung Mobilkommunikation - Technologien und Anwendungen [42] ABR, NOBRIOT, JFR, and NTJ, “Z-wave networking basics,”
(ITG-17), P. Roer, H. D. Schotten, R. Toenjes, and C. Westerkamp, 2016. [Online]. Available: http://zwavepublic.com/sites/default/files/
Eds., Informationstechnische Gesellschaft im VDE (ITG). VDE Verlag APL13031-2%20-%20Z-Wave%20Networking%20Basics.pdf
GmbH, 2017, pp. 68–73. [43] etsi, “Etsi rfid,” 2017. [Online]. Available: http://www.etsi.org/
[21] S. Duque Anton, D. Fraunholz, J. Zemitis, F. Pohl, and H. D. Schotten, technologies-clusters/technologies/radio/rfid
“Highly scalable and flexible model for effective aggregation of context- [44] N. Sornin, M. Luis, T. Eirich, T. Kramp, and O. Hersent, “Lorawan
based data in generic iiot scenarios,” in 9th Central European Workshop specification,” 2015.
on Services and their Composition (ZEUS-2017), O. Kopp, J. Lenhard, [45] IEEE Computer Society, “Ieee standard for information technology -
and C. Pautasso, Eds. CEUR Workshop Proceedings, 4 2017, pp. 51– part 11: Wireless lan,” 2016. [Online]. Available: http://standards.ieee.
58. org/getieee802/download/802.11-2016.pdf
[22] Bundesamt für Sicherheit in der Informationstechnik, “Industrial control [46] M. Conti, N. Dragoni, and V. Lesyk, “A survey of man in the middle
system security: Top 10 bedrohungen und gegenmaßnahmen 2016,” attacks,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp.
2016. [Online]. Available: https://www.allianz-fuer-cybersicherheit.de/ 2027–2051, thirdquarter 2016.
ACS/DE/ /downloads/BSI-CS 005.pdf? blob=publicationFile [47] IEEE 802.11, “Wep: The wired equivalent privacy algorithm,”
[23] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, 1994. [Online]. Available: http://www.ieee802.org/11/Documents/
S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, DocumentArchives/1994 docs/1194249 scan.pdf
“Comprehensive experimental analyses of automotive attack surfaces,” [48] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling
Proceedings of the 20th USENIX Conference on Security, 2011. algorithm of rc4,” Selected Areas in Cryptography 2001, pp. 1–24, 2001.
[Online]. Available: http://dl.acm.org/citation.cfm?id=2028067.2028073 [49] T. Zillner and S. Strobl, “Zigbee exploited -
[24] M. Wolf, A. Weimerskirch, and C. Paar, “Sicherheit in automobilen the good, the bad, the ugly,” 2015. [Online].
bussystemen,” 2014. [Online]. Available: https://www.researchgate.net/ Available: https://www.blackhat.com/docs/us-15/materials/
publication/228696907 Sicherheit in automobilen Bussystemen us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.
pdf
[25] T-Systems, “White paper: It-sicherheit für das vernetzte
[50] A. Francillion, B. Danev, and S. Capkun,
fahrzeug,” 2016. [Online]. Available: https://www.
“Relay attacks on passive keyless entry and start
t-systems.com/blob/454516/5dd711e8706ac91e48c291a4d02cf6a0/
system in modern cars,” 2010. [Online]. Available:
dl-wp-it-sicherheit-vernetzte-autos.pdf
https://www.researchgate.net/profile/Srdjan Capkun/publication/
[26] J. Wright, “Five wireless threats you may not know,”
220333841 Relay Attacks on Passive Keyless Entry and Start
2007. [Online]. Available: https://www.sans.edu/cyber-research/
Systems in Modern Cars/links/541d6d520cf241a65a17df2d/
security-laboratory/article/wireless-security-1
Relay-Attacks-on-Passive-Keyless-Entry-and-Start-Systems-in-Modern-Cars.
[27] MITRE, “Download cve,” 2016. [Online]. Available: https://cve.mitre. pdf
org/data/downloads/index.html [51] S. L. Garfinkel, A. Juels, and R. Pappu, “Rfid pri-
[28] J. B. Lovins, “Development of a stemming algorithm,” Mechanical vacy: An overview of problems and proposed solutions,”
Translation and Computational Linguistics, vol. 11, no. 1 and 2, 1968. 2005. [Online]. Available: https://pdfs.semanticscholar.org/41be/
[Online]. Available: http://mt-archive.info/MT-1968-Lovins.pdf 889e9949017ef8f0b360ff4e40c600d29c7a.pdf
[29] M. Chaput, “stemming 1.0,” 2010. [Online]. Available: https: [52] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching
//pypi.python.org/pypi/stemming/1.0 and detecting jamming attacks in wireless networks,” 2005. [Online].
[30] Rapid7, “Metasploit,” 2010. [Online]. Available: https://www.metasploit. Available: https://nslab.kaist.ac.kr/courses/2006/cs710/paperlist/security/
com/ 35.pdf
[31] ——, “Vulnerability & exploit database,” 2000. [Online]. Available: [53] A. Abbasi and M. Hashemi, “Ghost in the plc: Designing an undetectable
https://www.rapid7.com/db/ programmable logic controller rootkit via pin control attack,” Black Hat
[32] Offensive Security, “Offensive security’s exploit database archive,” Europe 2016, pp. 1–35, 2016.
2009. [Online]. Available: https://www.exploit-db.com/ [54] D. Urbina, J. Giraldo, N. O. Tippenhauer, and A. Cardenas, “Attacking
[33] Inj3ct0r Team, “http://0day.today/,” 2008. [Online]. Available: http: fieldbus communications in ics: Applications to the swat testbed,”
//0day.today/ Proceedings of the Singapore Cyber-Security Conference (SG-CRC),
[34] Packet Storm Security, “Packet storm,” 1998. [Online]. Available: vol. 14, pp. 75–89, 2016.
https://packetstormsecurity.com [55] Z. Basnight, J. Butts, J. Lopez, and T. Dube, “Firmware modification
[35] N. Falliere, L. O. Murchu, and E. Chien, “W32.stuxnet attacks on programmable logic controllers,” International Journal of
dossier,” Symantec Corporation, techreport, 2011. [Online]. Critical Infrastructure Protection, vol. 6, no. 2, pp. 76–84, 2013.
[56] L. A. Garcia, F. Brasser, M. H. Cintuglu, A.-R. Sadeghi, O. Mohammed,
and S. A. Zonouz, “Hey, my malware knows physics! attacking plcs with
physical model aware rootkit,” NDSS Symposium 2017, 2017.
[57] P. Wood, B. Nahorney, K. Chandrasekar, S. Wallace, and K. Haley,
“Internet security threat report,” Symantec Corporation, Tech. Rep.,
2016.
[58] S. McClure, S. Gupta, C. Dooley, V. Zaytsev, X. B. Chen, K. Kaspersky,
M. Spohn, and R. Permeh, “Protecting your critical assets - lessons
learned from operation aurora,” McAfee Inc., Tech. Rep., 2010.
[Online]. Available: https://www.wired.com/images blogs/threatlevel/
2010/03/operationaurora wp 0310 fnl.pdf
[59] C. Wueest, “Targeted attacks against the energy sector,”
Symantec Corporation, Tech. Rep., 2014. [Online]. Avail-
able: http://www.symantec.com/content/en/us/enterprise/media/security
response/whitepapers/targeted attacks against the energy sector.pdf
[60] E. Chien and G. OGorman, “The nitro attacks, stealing secrets from the
chemical industry,” Symantec Corporation, Tech. Rep., 2011.
[61] J. DiMaggio, “The black vine cyberespionage group,”
Symantec Corporation, Tech. Rep., 2015. [Online]. Avail-
able: http://www.symantec.com/content/en/us/enterprise/media/security
response/whitepapers/the-black-vine-cyberespionage-group.pdf
[62] “Dragonfly: Cyberespionage attacks against energy
suppliers,” Symantec Corporation, Tech. Rep., 2014,
symantec Security Response. [Online]. Available: https:
//www.symantec.com/content/en/us/enterprise/media/security response/
whitepapers/Dragonfly Threat Against Western Energy Suppliers.pdf
[63] R. M. Lee, M. J. Assante, and T. Conway, “Analysis of the cyber
attack on the ukrainian power grid,” SANS Industrial Control Systems,
2016. [Online]. Available: https://ics.sans.org/media/E-ISAC SANS
Ukraine DUC 5.pdf
[64] “Threat landscape for industrial automation systems in the
second half of 2016,” Kaspersky Lab, Tech. Rep., 2017.
[Online]. Available: https://ics-cert.kaspersky.com/wp-content/uploads/
sites/6/2017/03/KL-ICS-CERT H2-2016 report FINAL EN.pdf
[65] B. Kesler, “The vulnerability of nuclear facilities to cyber attack,”
Strategic Insights, vol. 10, no. 1, pp. 15–25, 2011.
[66] G. Sciacco, “Larmée de lair face à la menace dun ”cyber
pearl harbor”,” Res Militaris, 2015. [Online]. Available:
http://resmilitaris.net/ressources/10205/55/res militaris article sciacco
arm e de l air face la menace d un cyber pearl harbor.pdf
[67] B. Bencsáth, G. Pék, L. Buttyán, and M. Félegyházi, “Duqu:
A stuxnet-like malware found in the wild,” CrySyS Lab, Tech.
Rep., 2011. [Online]. Available: https://www.crysys.hu/publications/
files/bencsathPBF11duqu.pdf
[68] B. Bencsáth, G. Ács-Kurucz, G. Molnár, G. Vaspri, L. Buttyán, and
R. Kamarás, “Duqu 2.0: A comparison to duqu,” CrySyS Lab, Tech.
Rep., 2015. [Online]. Available: http://www.crysys.hu/duqu2/duqu2.pdf
[69] C. Raiu, M. Amin Hasbini, S. Belov, and M. Sergey, “From shamoon to
stonedrill,” Kaspersky Lab, techreport, 2017. [Online]. Available: https:
//securelist.com/files/2017/03/Report Shamoon StoneDrill final.pdf
[70] G. McDonald, L. O. Murchu, S. Doherty, and E. Chien, “Stuxnet
0.5: The missing link,” Symantec Corporation, techreport, 2013.
[Online]. Available: http://www.symantec.com/content/en/us/enterprise/
media/security response/whitepapers/stuxnet 0 5 the missing link.pdf
[71] A. Cherepanov, “Win32/industroyer - a new threat for industrial control
systems,” ESET, Tech. Rep., 2017. [Online]. Available: https://www.
welivesecurity.com/wp-content/uploads/2017/06/Win32 Industroyer.pdf
[72] Shodan, “Shodan.” [Online]. Available: https://www.shodan.io/
[73] L. Rist, J. Vestergaard, D. Haslinger, and A. Pasquale, “Conpot.”
[Online]. Available: http://conpot.org/
[74] Y. M. Pa Pa, s. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama,
and C. Rossow, “Iotpot: Analysing the rise of iot compromises,”
9th USENIX Workshop on Offensive Technologies (WOOT 15),
2015. [Online]. Available: https://www.usenix.org/conference/woot15/
workshop-program/presentation/pa

You might also like