SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Stuxnet - Infecting Industrial Control Systems
   Liam O Murchu                                    Sep 2010
   Operations Manager, Symantec Security Response

                                                               1
Stuxnet
                                  CheckWinCC
                                   Network Installed
                                          AV
                                     PrintDayShares
                                       .lnkSpoolerICS
                                            vuln
                                     P2P Updates
                                      Infect PLCs
                                       MS08-067
                                  1 ZeroVersions2
                                    Goal C&CEoP
                                     Zero=Projects
                                            Infect
                                    Step7Day EoP
                                      2 Def Dates
                                   Check
                                    Task Scheduler
                                      Win32k.sys
                                     1.5 Mb each




Stuxnet - Infecting Industrial Control Systems          2
Agenda

          1      60 second Intro to PLCs

          2      Programming a PLC

          3      How Stuxnet infects

          4      What Stuxnet does

          5      Demonstration


Stuxnet & PLCs                             3
PLCs
Programmable Logic Controller

• Monitors Input and Output lines
    – Sensors on input
    – switches/equipment on outputs
    – Many different vendors
• Stuxnet seeks specific Models
    – s7-300 s7-400
                   Stuxnet is Targeted
             Targeting a Specific type of PLC
           Searches for a Specific Configuration

Stuxnet & PLCs                                     4
Hardware configuration
System Data Blocks

• Each PLC must be configured before use.
• Configuration is stored in System Data Blocks (SDBs)
• Stuxnet parses these blocks
• Looks for magic bytes 2C CB 00 01 at offset 50h
• Signifies a Profibus network card attached - CP 342-5
• Looks for 7050h and 9500h
• Must have more than 33 of these values
• Injects different code based on number of occurrences


Stuxnet & PLCs                                            5
How Stuxnet Infects PLCs



Stuxnet – Inside the PLC       6
Programming a PLC
Step7, STL and MC7




• Simatic or Step 7 software
    – Used to write code in STL or other languages
• STL code is compiled to MC7 byte code
• MC7 byte code is transferred to the PLC
• Control PC can now be disconnected

Stuxnet Infecting PLCs                               7
Stuxnet: Man in the Middle attack on PLCs
“Man in the App” attack

• Step7 uses a library to access the
  PLC
    – S7otbxdx.dll


• Stuxnet replaces that dll with its
  own version


• Stuxnet’s version intercepts
  reads and writes to the PLC and
  changes the code at this point.

Stuxnet Infecting PLCs                      8
Stuxnet MC7 Byte code


• Stuxnet contains at least 70 binary blobs of data
• They are encoded and stored in the fake dll
• These are actually blocks of MC7 byte code
• This is the code that is injected onto the PLCs
• Must be converted back to STL to understand it
• Difficult task but we have now converted all the MC7 byte code
  to readable STL code
• Just unsure of real world effects of this code.


Presentation Identifier Goes Here                                  9
OB1 and OB35
Stuxnet changes these blocks

• OB1 = main() on PLCs
    – Stuxnet inserts its own code at the beginning of OB1 so it runs first.
• OB35 is a 100ms interrupt routine
    – Used to monitor inputs that would require fast action
    – Stuxnet infects OB35 too


• Stuxnet will return clean versions of these functions when they
  are read from the PLC.



Stuxnet infecting PLCs                                                         10
Demo
Show Infection of a PLC

• Inflate a balloon for 5 seconds
• Infect the PLC
• Inflate balloon again for 5 seconds




Stuxnet Demo                            11
Stuxnet’s PLC code
Complex and large amount of code
      • Demo was just 8 lines of code.
      • Stuxnet contains hundreds of lines of code
      • It is difficult to understand the real world actions without
        knowing what is connected on the inputs and outputs.

      UC FC 1865;
      POP ;
      L DW#16#DEADF007;
      ==D ;
      BEC ;
      L DW#16#0;
      L DW#16#0;


Presentation Identifier Goes Here                                      12
Stuxnet   13
Stuxnet   14
Targets
Stats for Command and Control Servers




Stuxnet - Infecting Industrial Control Systems   15
Stuxnet Infections




Stuxnet - Infecting Industrial Control Systems   16
White Paper Available
W32.Stuxnet Dossier

• Stuxnet Technical Details Available here:


• http://www.symantec.com/content/en/us/enterprise/media/se
  curity_response/whitepapers/w32_stuxnet_dossier.pdf




Stuxnet - Infecting Industrial Control Systems            17
Thank you!
     Liam O Murchu - liam_omurchu@symantec.com
     Nicolas Falliere
     Eric Chien
     Threat Intelligence Team
     All Stuxnet Reverse Engineers
     Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
     the U.S. and other countries. Other names may be trademarks of their respective owners.

     This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
     are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Stuxnet – Infecting Industrial Control systems                                                                                                                                               18

Mais conteúdo relacionado

Mais procurados

How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
Yury Chemerkin
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
INSIGHT FORENSIC
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
malvvv
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat Security Conference
 

Mais procurados (20)

How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Stuxnet dc9723
Stuxnet dc9723Stuxnet dc9723
Stuxnet dc9723
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 
Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2
 
Hacker bootcamp
Hacker bootcampHacker bootcamp
Hacker bootcamp
 
Malware freak show
Malware freak showMalware freak show
Malware freak show
 
RCS Demo HackingTeam
RCS Demo HackingTeam RCS Demo HackingTeam
RCS Demo HackingTeam
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Troopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUFTroopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUF
 
OSSIM Overview
OSSIM OverviewOSSIM Overview
OSSIM Overview
 
Linux Security
Linux SecurityLinux Security
Linux Security
 

Destaque

Destaque (7)

Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?
 
Cours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts ClésCours CyberSécurité - Concepts Clés
Cours CyberSécurité - Concepts Clés
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'information
 
Cyber Sécurité : Connaître son adversaire pour mieux parer les attaques
Cyber Sécurité : Connaître son adversaire pour mieux parer les attaquesCyber Sécurité : Connaître son adversaire pour mieux parer les attaques
Cyber Sécurité : Connaître son adversaire pour mieux parer les attaques
 
Principes de bon sens pour une gouvernance cyber sécurité efficiente
Principes de bon sens pour une gouvernance cyber sécurité efficientePrincipes de bon sens pour une gouvernance cyber sécurité efficiente
Principes de bon sens pour une gouvernance cyber sécurité efficiente
 
La securité informatique - Etat des Lieux - Nov. 2016
La securité informatique - Etat des Lieux - Nov. 2016La securité informatique - Etat des Lieux - Nov. 2016
La securité informatique - Etat des Lieux - Nov. 2016
 
Sécurité informatique
Sécurité informatiqueSécurité informatique
Sécurité informatique
 

Semelhante a Stuxnet

KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
Fisal Anwari
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
Michael Smith
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
Aleksandr Timorin
 

Semelhante a Stuxnet (20)

Microcontroller 8051 timer 274 P$
Microcontroller 8051 timer 274 P$Microcontroller 8051 timer 274 P$
Microcontroller 8051 timer 274 P$
 
Scada, a PLC's story
Scada, a PLC's storyScada, a PLC's story
Scada, a PLC's story
 
Slide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiSlide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by Suzaki
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLC
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
 
Automation-PLC
Automation-PLCAutomation-PLC
Automation-PLC
 
Microcontroller
MicrocontrollerMicrocontroller
Microcontroller
 
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
 
Joa Overview
Joa OverviewJoa Overview
Joa Overview
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
 
INDUSTRIAL AUTOMATION ( SHUBHAM KURDIYA)
INDUSTRIAL AUTOMATION ( SHUBHAM KURDIYA)INDUSTRIAL AUTOMATION ( SHUBHAM KURDIYA)
INDUSTRIAL AUTOMATION ( SHUBHAM KURDIYA)
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED-V2I2P57
IJSRED-V2I2P57
 
plc scada
 plc scada plc scada
plc scada
 

Mais de bueno buono good

Complete patents nikola_tesla
Complete patents nikola_teslaComplete patents nikola_tesla
Complete patents nikola_tesla
bueno buono good
 
Wikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapterWikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapter
bueno buono good
 

Mais de bueno buono good (20)

Privacy facebook 2015
Privacy facebook 2015Privacy facebook 2015
Privacy facebook 2015
 
LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014LIBERTÀ STAMPA 2014
LIBERTÀ STAMPA 2014
 
Inceneration and health
Inceneration and healthInceneration and health
Inceneration and health
 
Informe del Relator Especial sobre los derechos de los pueblos indígenas, Ja...
Informe del Relator Especial sobre los derechos de los  pueblos indígenas, Ja...Informe del Relator Especial sobre los derechos de los  pueblos indígenas, Ja...
Informe del Relator Especial sobre los derechos de los pueblos indígenas, Ja...
 
Galline libere guida
Galline libere guidaGalline libere guida
Galline libere guida
 
Water resourcers group
Water resourcers groupWater resourcers group
Water resourcers group
 
NkpPS
NkpPSNkpPS
NkpPS
 
Tesla confid
Tesla confidTesla confid
Tesla confid
 
Complete patents nikola_tesla
Complete patents nikola_teslaComplete patents nikola_tesla
Complete patents nikola_tesla
 
Global energy transmittion tesla tower 2014
Global energy transmittion tesla tower 2014Global energy transmittion tesla tower 2014
Global energy transmittion tesla tower 2014
 
Wikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapterWikileaks secret-tpp-treaty-ip-chapter
Wikileaks secret-tpp-treaty-ip-chapter
 
Ttip draft
Ttip draftTtip draft
Ttip draft
 
2013 cpi brochure_en
2013 cpi brochure_en2013 cpi brochure_en
2013 cpi brochure_en
 
Farmaci coinvolti traffici_illegali_14.08.2014
Farmaci coinvolti traffici_illegali_14.08.2014Farmaci coinvolti traffici_illegali_14.08.2014
Farmaci coinvolti traffici_illegali_14.08.2014
 
Country reports on_terrorism_2013-7
Country reports on_terrorism_2013-7Country reports on_terrorism_2013-7
Country reports on_terrorism_2013-7
 
Doc 10502 290_en
Doc 10502 290_enDoc 10502 290_en
Doc 10502 290_en
 
Sipri yearbook 2013
Sipri yearbook 2013Sipri yearbook 2013
Sipri yearbook 2013
 
Bohemian grove-members-list 2010
Bohemian grove-members-list 2010Bohemian grove-members-list 2010
Bohemian grove-members-list 2010
 
Bohemian grove-and-other-retreats1
Bohemian grove-and-other-retreats1Bohemian grove-and-other-retreats1
Bohemian grove-and-other-retreats1
 
Cremation of care traduzione italiano
Cremation of care traduzione italianoCremation of care traduzione italiano
Cremation of care traduzione italiano
 

Último

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Último (20)

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 

Stuxnet

  • 1. Stuxnet - Infecting Industrial Control Systems Liam O Murchu Sep 2010 Operations Manager, Symantec Security Response 1
  • 2. Stuxnet CheckWinCC Network Installed AV PrintDayShares .lnkSpoolerICS vuln P2P Updates Infect PLCs MS08-067 1 ZeroVersions2 Goal C&CEoP Zero=Projects Infect Step7Day EoP 2 Def Dates Check Task Scheduler Win32k.sys 1.5 Mb each Stuxnet - Infecting Industrial Control Systems 2
  • 3. Agenda 1 60 second Intro to PLCs 2 Programming a PLC 3 How Stuxnet infects 4 What Stuxnet does 5 Demonstration Stuxnet & PLCs 3
  • 4. PLCs Programmable Logic Controller • Monitors Input and Output lines – Sensors on input – switches/equipment on outputs – Many different vendors • Stuxnet seeks specific Models – s7-300 s7-400 Stuxnet is Targeted Targeting a Specific type of PLC Searches for a Specific Configuration Stuxnet & PLCs 4
  • 5. Hardware configuration System Data Blocks • Each PLC must be configured before use. • Configuration is stored in System Data Blocks (SDBs) • Stuxnet parses these blocks • Looks for magic bytes 2C CB 00 01 at offset 50h • Signifies a Profibus network card attached - CP 342-5 • Looks for 7050h and 9500h • Must have more than 33 of these values • Injects different code based on number of occurrences Stuxnet & PLCs 5
  • 6. How Stuxnet Infects PLCs Stuxnet – Inside the PLC 6
  • 7. Programming a PLC Step7, STL and MC7 • Simatic or Step 7 software – Used to write code in STL or other languages • STL code is compiled to MC7 byte code • MC7 byte code is transferred to the PLC • Control PC can now be disconnected Stuxnet Infecting PLCs 7
  • 8. Stuxnet: Man in the Middle attack on PLCs “Man in the App” attack • Step7 uses a library to access the PLC – S7otbxdx.dll • Stuxnet replaces that dll with its own version • Stuxnet’s version intercepts reads and writes to the PLC and changes the code at this point. Stuxnet Infecting PLCs 8
  • 9. Stuxnet MC7 Byte code • Stuxnet contains at least 70 binary blobs of data • They are encoded and stored in the fake dll • These are actually blocks of MC7 byte code • This is the code that is injected onto the PLCs • Must be converted back to STL to understand it • Difficult task but we have now converted all the MC7 byte code to readable STL code • Just unsure of real world effects of this code. Presentation Identifier Goes Here 9
  • 10. OB1 and OB35 Stuxnet changes these blocks • OB1 = main() on PLCs – Stuxnet inserts its own code at the beginning of OB1 so it runs first. • OB35 is a 100ms interrupt routine – Used to monitor inputs that would require fast action – Stuxnet infects OB35 too • Stuxnet will return clean versions of these functions when they are read from the PLC. Stuxnet infecting PLCs 10
  • 11. Demo Show Infection of a PLC • Inflate a balloon for 5 seconds • Infect the PLC • Inflate balloon again for 5 seconds Stuxnet Demo 11
  • 12. Stuxnet’s PLC code Complex and large amount of code • Demo was just 8 lines of code. • Stuxnet contains hundreds of lines of code • It is difficult to understand the real world actions without knowing what is connected on the inputs and outputs. UC FC 1865; POP ; L DW#16#DEADF007; ==D ; BEC ; L DW#16#0; L DW#16#0; Presentation Identifier Goes Here 12
  • 13. Stuxnet 13
  • 14. Stuxnet 14
  • 15. Targets Stats for Command and Control Servers Stuxnet - Infecting Industrial Control Systems 15
  • 16. Stuxnet Infections Stuxnet - Infecting Industrial Control Systems 16
  • 17. White Paper Available W32.Stuxnet Dossier • Stuxnet Technical Details Available here: • http://www.symantec.com/content/en/us/enterprise/media/se curity_response/whitepapers/w32_stuxnet_dossier.pdf Stuxnet - Infecting Industrial Control Systems 17
  • 18. Thank you! Liam O Murchu - liam_omurchu@symantec.com Nicolas Falliere Eric Chien Threat Intelligence Team All Stuxnet Reverse Engineers Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Stuxnet – Infecting Industrial Control systems 18