Yesterday ICS-CERT published a full-color glossy (it is an electronic document so ‘glossy’ refers to ‘slick’ in the advertising sense) pamphlet reviewing their operations in 2012. While this has the feel of a PR exercise more than anything else, there are some interesting tidbits of information to be winnowed from the document.
Spear Phishing Campaigns
We have heard about the spear phishing campaign directed against the pipeline/energy companies. That is, of course, mentioned here, but there is also a brief note about a similar campaign targeted against chemical companies (pg6);
“The chemical sector was also the victim of targeted spear-phishing attacks in 2012. AAL [Advanced Analytical Laboratory] worked directly with companies affected by this campaign, providing onsite support, analyzing drive images and malware samples and disseminating indicators back to the community. AAL provided onsite support to one of the affected companies.”
That’s it folks. Nothing about what kinds of chemical companies or how many companies were targeted. Oh well, maybe we will see more in the January 2013 Monthly Monitor, or is it now a Quarterly Monitor?
There is an interesting note about antivirus engines (pg 6);
“AAL also developed a tool to scan whole drives for malware using multiple antivirus engines. This tool greatly reduced the time needed to scan multiple drive images with commercial antivirus products.”
Unfortunately, that tool will never leave their lab; the AV companies would scream bloody murder (justifiably so). But it does bring an interesting thought to mind; if ICS-CERT finds new malware in one of their investigations, do they provide signatures to the AV companies? If so, which ones? My favorite answers would be ‘YES’ and ‘whichever ones are actively cooperating with ICS-CERT’.
There are two interesting facts from their section on training. First (pg 9);
“Provided 12 Advanced Training sessions, which are week-long events that provide intensive hands-on training and a 12-hour, red team/blue team exercise that simulates a corporate espionage scenario [emphasis added].”
While this is the apparent threat-of-the-day (and there is a certain justification for that), it is hardly a control system threat. Okay, maybe they are trying to get control system access information, but I haven’t seen anything to date about actual control system penetrations. Admittedly, ICS-CERT and the affected community might not be willing to tell us about such penetration, but preventing cyber-espionage training should be a US-CERT or FBI focus, not ICS-CERT.
The second factoid is certainly control system focused (pg 9);
“Developed a Control Systems Forensics for Law Enforcement course. This course helps law enforcement agents to understand the differences in performing forensics on ICSs versus normal corporate enterprise network forensics.”
This is a great idea. I would hope that this is being pushed at all major metropolitan police departments that have cyber-crime units, particularly those with large concentrations of critical infrastructure facilities. It would also be nice if they had a slightly more basic ICS forensics course for those companies that would be large enough to have the staff necessary to do forensics stabilization and data collection.
There are two pages that deal with ICS system evaluations that can be conducted by ICS-CERT. On the first of the two pages (pg 10) it states that:
“Asset owners can now request Cybersecurity Evaluation Tool (CSET®) evaluations and/or Architecture Reviews, which is a more in-depth comprehensive evaluation of specific control systems networks, architectures, and components.”
Now I hadn’t heard of Architecture Reviews before, so I did a quick search of the ISC-CERT web page and found an interesting pamphlet that provides a little more information. It looks interesting and interested organizations should contact o email@example.com. It would have been nice if the evaluation pamphlet had been mentioned/linked in this review
The second page about system reviews provides some more detailed information about the Control System Evaluation Tool. Even though CSET v.0 was introduced this year there is a brief description of the changes made in this 2012 Review. I wrote about the CSET 5.0 introduction, but didn’t have much information about what actual changes had been made. This Review notes (pg 11);
“ICS-CERT released CSET® 5.0, in January 2013, this version represents the most significant upgrade in the underlying technical architecture of the tool. This upgrade involves conversion to the Microsoft.NET framework environment as well as utilization of component pieces from Syncfusion [http://www.syncfusion.com/]. In addition, Section 508 of the Americans with Disabilities Act (ADA) was incorporated into the new version to allow those with disabilities a way to interact with and use the CSET®.”
It looks like ICS-CERT is actually trying to determine what the potential consequences of a successful cyber-attack (or natural disaster, a more likely affecter) on a control system at a critical infrastructure facility. The review describes a modeling tool called the Industrial Control Systems Consequence Effects and Analysis (ICS-CEA) framework (pg 12);
“The Industrial Control Systems Consequence Effects and Analysis (ICS-CEA) framework is a collaboration tool. ICS-CEA provides a critical infrastructure modeling and simulation capability. The tool also provides a means for users to model, analyze, and share information related to potential consequences of naturally occurring or man-made threats on our Nation’s critical infrastructure. The ICS-CEA system provides the NCCIC a capability for daily use of modeling, simulation, analysis, and information sharing related to potential cross-sector ‘consequence’ effects to ICS and their related CIKR sectors.”
Again, I hadn’t heard of this whiz bang idea, so I did a search of the ICS-CERT web site and found an abstract from the Spring ICSJWG Conference (I knew there was a reason that I have wanted to attend at least one of these);
“Situational Awareness (SA) is achieved through access to comprehensive and relevant information pertaining to evolving events. Historically, SA has been achieved through semi-automated or manual processes to aggregate data into actionable information. The purpose of the Industrial Control Systems' Consequence Effects and Analysis (ICS-CEA) application is to provide tools to efficiently access relevant information pertaining to Critical Infrastructure Key Recourse (CIKR) assets. This allows the Industrial Control Systems - Cyber Emergency Response Team (ICS-CERT) analysts to understand potential cross-sector impacts associated with environmental impacts and ongoing incidents or known vulnerabilities. ICS-CEA provides the ability to perform exploratory geographic-based analysis and modeling via a web-browser interface. In doing so, analysis, data, and information products are created to meet the unique requirements for SA audiences.”
Again, this is something that I would like to know more about; as would many of the readers here, I’m sure. (Hint, hint)
You can’t have a year-end review without statistics and this Year in Review is no different. There are three different pages of statistics
• ICS-CERT by the Numbers, ‘Calendar Years’, page 14;
• ICS-CERT by the Numbers, ‘Fiscal Years’, page 15; and
• Sector Support by the Numbers, page 16.
I’m not sure why they included calendar year stats and fiscal year stats, but it is interesting that they did because you see two different sets of trends. We’ve seen the FY stats before and they were used to describe the rapid escalation of ‘attacks’ on control systems. The calendar year stats, show a completely different picture, a substantial decrease (204 to 138) in ICS Incident[s] Reported between 2011 and 2012. Well, you know what they say about statistics….