CyberWire Daily - ICS honeypots attract sophisticated snoops. [Research Saturday]

Episode Date: September 22, 2018

Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to... sniff out the virtual honey and start snuffling around. Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned. The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here: https://www.cybereason.com/blog/industrial-control-system-specialized-hackers   Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. data products platform comes in. With Domo, you can channel AI and data into innovative uses that deliver measurable impact. Secure AI agents connect, prepare, and automate your data workflows, helping you gain insights, receive alerts, and act with ease through guided apps tailored to your role. Data is hard. Domo is easy. Learn more at ai.domo.com. That's ai.domo.com. Hello, everyone, and welcome to the CyberWire's Research Saturday. I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down threats and vulnerabilities and solving some of the hard problems of
Starting point is 00:01:10 protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us. And now, a message from our sponsor, Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security.
Starting point is 00:01:57 Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible, eliminating lateral movement, connecting users only to specific apps, not the entire network, continuously verifying every request based on identity and context,
Starting point is 00:02:16 simplifying security management with AI-powered automation, and detecting threats using AI to analyze over 500 billion daily transactions. Hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more at zscaler.com slash security. So one of the things that we're really curious about is modeling out what isn't necessarily reported often by the security industry writ large.
Starting point is 00:02:54 That's Ross Rustese. He's a senior director of intelligence services at Cyber Reason. Today, we're discussing research he co-authored with Israel Barak. It's titled ICS Threat Broadens. Nation-state hackers are no longer the only game in town. We know there's a lot of tactics and techniques floating around out there. We know that certain types of activity tends to garner more press and more ink coverage than others. And so we decided to do deep dives into very specific circumstances to see if there was a wide variance between what's the top tier of what you read about from a threat profiling perspective, and what these institutions in these specific sectors are really facing. And so we've been doing honeypots one about every three to four months now for about the past year to kind of find that delta and see what interesting things are going on to report it because everybody's focused on the cool new vulnerabilities and interesting new pieces of malware that are out there.
Starting point is 00:03:58 So before we dig in, can you describe to us what exactly is a honeypot? Yeah, so a honeypot is essentially a fake computer set up to be exploited. Most honeypots are really simple setups. It's an SSH server. It's something that is fairly low profile, fairly low functioning, but they're set up in such a way that they have weak protection, so that way they get exploited, and a security researcher can see how they're set up in such a way that they have weak protections. So that way, they get exploited and a security researcher can see how they're exploited or what the hacker is
Starting point is 00:04:31 trying to do by exploiting it. What we've done is put the honeypot on steroids and done a full honey network. We've got a completely virtualized environment that has fake traffic flowing through it. And it looks like a small, medium-sized company or a division within a much larger company, which gives us a lot more telemetry and rich detail on what the hacker does. Because once they get on a computer, they actually see a live network. And so they've tried to exploit it further. And we get more information both on what second stage tools they're going to use and also what they're actually after in that particular network. And so the modeling aspect
Starting point is 00:05:11 of it is a higher cost on the front end for us, but it's been paying dividends on the back end in terms of getting rich telemetry from these hackers. Yeah, let's dive in. I mean, it's an interesting thing that you all are working on here. Take us through, what did you set up? This most recent one, we set up a fake network that looks like a very large electric power supply company. And we use some doppelganger domain names. We set up the IP addresses to be very close to the range of a known industrial supply center. And as a result, we got a lot of activity. Within 24 hours of going live, of spinning up this fake network, we were seeing lots of activity going against it.
Starting point is 00:05:57 Almost immediately, we saw a toolkit that's known with an underground hacking forum penetrate the network and set up fake accounts to then go sell the access. And then within about 24 hours of seeing that initial breach and setup, we saw somebody come in through one of the accounts that were set up and start very methodically moving through the network, attempting to gain access to the industrial control systems that, at least from a network perspective, said they were there. Obviously, this network does not actually control anything. And so there's been some
Starting point is 00:06:33 interesting technical challenges of making it look like it's got industrial control systems operating. And that's what these hackers were going after. So within 72 hours, we had full exploitation of one box, sold access, and a group of hackers coming in and trying to move laterally as efficiently as possible towards the industrial control system. When you set this system up, were you intentionally making it relatively easy to get into? Or were you trying to have a degree of security that would be comparable to what an actual provider of electricity would have? Both. So some of the web-facing assets had very weak passwords and usernames for the remote desktop protocol service, which is one of the ones that hackers love to compromise because it allows you to be interactive and see what's going on on the desktop as you do it. And then we put in some layered defenses. So that way, it'd be hard to laterally move
Starting point is 00:07:30 directly to the ICS system. So that way, we would force them through more computers. So we'd get a better understanding of how they're moving through the environment, what their preferred methods were. So the initial compromise was really easy. Getting to the industrial control systems was significantly harder. And I think given the way networks are generally set up, that's more realistic than it probably should be. Can you walk us through a kind of step-by-step the process and the tools that they use to get to the things that they want to get at? Yeah. So in this case, it's been really interesting because the hacking group that initially compromised the system
Starting point is 00:08:09 used a bunch of well-known hacking tools that basically were anti-forensics as a way to sell the access. So they laid down a tool that modified the RDP service in such a way that two people can be logged in via RDP at the same time, and it won't boot anybody off. So that was their way of assuring access that they're about to go sell. The more interesting activity, though, was the guys who came in afterwards. And they've been living off the land almost entirely. They've been using PowerShell scripts. They've been using local admin commands,
Starting point is 00:08:48 netstat, those types of things, doing their internal recon. And we haven't actually seen them pull down a single tool, which shows that they have a higher degree of capability than your average dark market script kitty who's just looking to explore something. They know what they're going after and they're using only internal resources to get there, which means they're trying to keep a very low profile.
Starting point is 00:09:13 The other really interesting thing that we saw almost immediately was when they landed on the box, they started uninstalling the security tools. Obviously, we're an endpoint detection company. And so we're an endpoint detection company. And so we laid down our own security tool there, unhardened just to see what they would do. And within about a half hour of landing on the box, they uninstalled our probe. So we spun it back up and hardened it slightly
Starting point is 00:09:38 to see if it was just kind of matter of course that they do this or if they were really concerned about being caught. And we left one path open for them to uninstall the probe again. And within two hours, they uninstalled the probe again. And that kind of aggressive anti-monitoring capabilities isn't normally associated with your run-of-the-mill hacker. We then reinstalled the probe with full hardening on and it's still operational. reinstalled the probe with full hardening on and it's still operational. But the fact that they're going back and forth with us,
Starting point is 00:10:11 even just on your re-imaging type basic network hygiene stuff when you notice a compromise, shows a level of both sophistication and brazenness that you don't normally see in these types of hacks. Yeah, I think it shows a level of tenacity there because you would think it would be an indicator to them that perhaps someone was onto them. Yeah, exactly. And the fact that they're willing to go toe-to-toe with presumably a level one or level two SOC analyst based off the actions we were taking. We didn't want to spook them out of the network entirely, but we wanted to force their hand a bit to see how they adapted to being caught in some part of the kill
Starting point is 00:10:46 chain. They were obviously not concerned with what we were doing. And they kept on doing lateral movement while they were going back and forth with us on this one particular box, which also demonstrates that they probably have at least two people in the environment because we saw them doing activity while we were doing re-imaging and that sort of thing. And they were kind of trying to counter those actions. So what was your sense for what they were after? Are they looking to exfiltrate data? Are they looking to get control over some of the industrial controls in the system? What's your take there? So they're definitely going towards the industrial control systems in the network.
Starting point is 00:11:29 Every time they would hop onto a new box, they would scan specifically for the boxes that were identified as running the industrial control systems. What their end game was once they gained access to those particular machines, we still don't know because they haven't gained access to those machines yet. The environment's still alive. It'll probably be spun down sometime Saturday, and we'll do our final triage of data then. But right now, that's the million-dollar question for us. Are they trying to exfil data just that way they understand how these machines are
Starting point is 00:11:59 operating for potential future use? Or are they looking to do something nefarious in the short term because they just want to see what kind of damage they can cause? We don't have a good beat on that yet. There are a couple more prodding actions that we have planned for later today. We'll get a much clearer understanding of what they're intending to do. And what is your sense of their capabilities in terms of persistence? So they've laid down some persistence in a couple different boxes that they've laterally moved to already. We already took the action of wiping clean the primary landing point that they have, and we haven't seen them try to regain access to that particular box. But we're still seeing activity in the network, which leads us to believe that they are still doing things on the other machines, and they're still using that
Starting point is 00:12:50 as their persistence backdoor mechanisms. That's all been done through scripting as well. They've done changes to run keys and spun up PowerShell scripts as a result of the way they've laid down things. So every time those machines get rebooted, a new command shell gets spun up for them. And it's not necessarily very sophisticated in terms of how they did it, but it's very effective if you don't know what you're looking for because you hadn't monitored every step that they've already taken. And so far, there's no sense that they're on to the fact that this is a honeypot. We haven't seen any indication of it. The fact that they keep on combating the moves that we're
Starting point is 00:13:34 taking to try to kick them off leads me to believe they haven't figured it out yet. I have a feeling that once they actually get to the ICS systems on the network, they'll quickly realize that the whole thing was a charade. And that's going to be an interesting data point in and of itself. Some hackers get really angry when they get caught in honeypots and try to destroy the systems. Others back out as quickly as possible. It'll be interesting to see if they cut and run
Starting point is 00:14:00 or get angry and malicious. Now, what is your sense in terms of who's behind this? We don't have enough technical details to broach the attribution conversation with any confidence. What we can say is that the access was gained through a darknet forum. So it's obviously Black Hat, somebody who has technical sophistication
Starting point is 00:14:23 because they're living off the land. Whether it's one of those guys that swings between cybercrime and nation state, or just somebody who decided he wanted to go play with a SCADA system and he's relatively technically sophisticated, we don't have enough detail to draw that line. But I would say this is not your average run of the mill script kitty. And this is not your average run-of-the-mill script kitty, and this is not the generic type of stuff that you see in most honeypots. This is very targeted. This is very educated about what they're trying to go after and how to get there. And that is interesting to us. And we're going to try to pull apart the specific attribution data once we've closed down
Starting point is 00:15:03 the environment and can do true forensics on it because it's not changing. As far as the tracking in the dark web forums go, that's something that you were actively tracking and looking for. And what did the folks who initially broke in, what were they out there advertising? So we did some poking and it appears that the dark web is not as open as it used to be. This is something we actually found in the last honeypot we did as well, because we actually seeded some access for the old honeypot in the dark web and got zero bytes. The amount of trust that it takes to do a transaction in the dark web these days is
Starting point is 00:15:42 much higher than it used to be due to the fact that the FBI has been so effective at shutting down some of the bigger dark web forums. And so what we saw with this one is a sale that took place not in public. So we know that the forum hosted the information, but immediately when it went up for sale, it appeared to go into side channels that aren't publicly available unless you're the seller or the buyer. So we don't have the data on how much it sold for or who the person was that bought
Starting point is 00:16:20 it. But we know that it was bought and sold because we saw the initial posting of access for and because the domain, the username and password that was set up by the original person who compromised it was then used for the second stage and more targeted activity. One of the things that we'd like to do is try to contact the original seller and see if we can't buy back the access for a higher price, just to see what the original price was. Right, right. What broader perspective does this give you all? I mean, if this is the activity you've seen on your honeypot, on your virtual electrical system, what do you suppose this means in terms of what people are able to do with the actual electrical systems throughout the U.S.? I think there are a couple of key takeaways for network defenders, especially in the ICS space. The first is you're not just dealing with nation state adversaries. I know that that's the primary focus of the conversation these days,
Starting point is 00:17:23 especially with the DHS release regarding the Russians. And there was a couple other DHS releases earlier this year that dealt with North Koreans and the Iranians. The fact that this access was bought and so specifically targeted on the dark web shows that there are other people interested in these types of systems that aren't necessarily your upper echelon nation-state actors. That should be a concern for anybody who's running these assets because at least with the nation-state actors, they're trained on how to operate with these systems.
Starting point is 00:17:56 They have the background in it and they have a specific mission. With the guys who are just interested in playing, the ones that are hanging out on the darknet forums, there's a high chance that they're going to make a mistake. And that mistake might actually end up causing a power outage or causing real world damage. And that's always been the big concern from my perspective with all the targeting of ICS in general. These are fragile systems. They tend to be overloaded as it is. They go down fairly easily. Mistakes are more likely to bring down a power grid than an actual targeted attack.
Starting point is 00:18:31 And the more lower tier threat actors that get into these systems, the more likely that's going to be. So from a general awareness standpoint, I think this is a really good takeaway that we need to be very concerned, not just with nation state actors, but the mid and low tier actors as well. The other thing is make sure you have layered defense. Getting into a corporate network is relatively easy. Getting the ICS system should not be. We set it up in that manner to see how quickly an actor could laterally move through a business network to the
Starting point is 00:19:06 ICS systems with some level of layered defense. And so far, without taking a really strong hardening approach to the network, we've been able to keep them out of the ICS systems for three or four days at this point. If your network isn't configured that way to begin with, that really should be priority number one if you're managing an ICS system. Because at the end of the day, humans are the weak links when it comes to security. And if you have a free flow of information from the business network to the ICS They can identify the assets relatively easily. And you want to throw up as many barriers and delay their movement as much as possible to avoid allowing them access to the crown jewels of those networks. Yeah, I think that's a really interesting insight, the notion that mistakes by the curious, I suppose the maliciously curious, could cause power outages or damage to these systems. Is it surprising to you that we haven't seen more of that or incidences of that?
Starting point is 00:20:12 I would say yes. I am surprised that we have not seen more instances of lower-tier threat actors making mistakes in critical systems. If you look globally, we've seen some instances with public transportation in Eastern Europe. There's been some instances with oil and natural gas down in Brazil, if I'm remembering correctly, where hackers have screwed up and caused issues, but they haven't really bubbled up to the point of, this is inexcusable activity. I think as more and more exploits get dropped publicly, as hacking becomes more point and click, and less skill is required to do so, we're going to see more and more mistakes. And that's unfortunately just the world that we're living in as the offense continues to grow exponentially due
Starting point is 00:21:11 to the amount of data disclosures that are happening. Our thanks to Ross Rustese from Cyber Reason for joining us. The name of the research is ICS Threat Broadens. Nation-state hackers are no longer the only game in town. We'll have a link to the research in the show notes. You can also find it on the Cyber Reason website. It's in their blog section. Cyber threats are evolving every second, Thank you. suite of solutions designed to give you total control, stopping unauthorized applications,
Starting point is 00:22:11 securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default deny approach can keep your company safe and compliant. The Cyber Wire Research Saturday is proudly produced in Maryland out of the startup studios of DataTribe, where they're co-building the next generation of cybersecurity teams and technologies. Our amazing Cyber Wire team is Elliot Peltzman, Puru Prakash, Stefan Vaziri, Kelsey Bond,
Starting point is 00:22:40 Tim Nodar, Joe Kerrigan, Carol Terrio, Ben Yellen, Nick Valecki, Gina Johnson, Bennett Moe, Chris Russell, John Petrick, Jennifer Iben, Rick Howard, Peter Kilpie, Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.