Cyber-Crash and Bleed Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure.

Slides:



Advertisements
Similar presentations
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Advertisements

7 Effective Habits when using the Internet Philip O’Kane 1.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
FIT3105 Security and Identity Management Lecture 1.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Norman SecureSurf Protect your users when surfing the Internet.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT Security for Users By Matthew Moody.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
“How to Protect Yourself”
“Enterprise Malware Detection”
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Securing Information Systems
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Javascript worms By Benjamin Mossé SecPro
Company Overview.
What they are and how to protect against them
Firmware threat Dhaval Chauhan MIS 534.
Cyber-Crash and Bleed Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure.
Network Security Fundamentals
3.6 Fundamentals of cyber security
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Instructor Materials Chapter 7 Network Security
Configuring Windows Firewall with Advanced Security
Customized Solutions to your needs
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
How to build a good reputation online
Symantec Code Signing Certificate
Your Computer Wants To Ruin Your Life
Firewalls.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Jon Peppler, Menlo Security Channels
Teaching Computing to GCSE
The Hacking Suite for Governmental Interception
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Myths About Web Application Security That You Need To Ignore.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Risk of the Internet At Home
Spear Phishing Ways to Minimize its Risks
Check Point Connectra NGX R60
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
HOW DO I KEEP MY COMPUTER SAFE?
Cyber Security Challenges
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Marcial Quinones-Cardona
G061 - Network Security.
6. Application Software Security
Securing web applications Externally
Presentation transcript:

Cyber-Crash and Bleed Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure

Evolving Risk Environment Hospitals are heavily reliant on information technology, everything is connected, more-so than perhaps any other industry Computer security has not been a high priority Attackers are able to get in, existing security doesn’t stop them, end of story.

Fact Malware is the single greatest threat to Enterprise security today Existing security isn’t stopping it Over 80% of corporate intellectual property is stored online, digitally IT Forensics http://www.itforensics.com/faqs.html

Wake Up Google cyber attacks a 'wake-up' call -Director of National Intelligence Dennis Blair CNBC 2/2/10 http://www.csmonitor.com/USA/2010/0204/Google-cyber-attacks-a-wake-up-call-for-US-intel-chief-says

IP is Leaving The Network Right Now Everybody in this room who manages an Enterprise with more than 10,000 nodes: They are STEALING right now, as you sit in that chair.

Scale The rate of malicious code and unwanted software is surpassing legitimate software (Symantec) Automated malware infrastructure Signature-based security solutions simply can’t keep up (Trend Micro) The peculiar thing about signatures is that they are strongly coupled to an individual malware sample More malware was released in 2007 than all malware combined previous (F-Secure) http://www.avertlabs.com/research/blog/index.php/2009/03/10/avert-passes-milestone-20-million-malware-samples/

Signature based systems don’t scale

Anti-virus is rapidly losing credibility Source: “Eighty percent of new malware defeats antivirus”, ZDNet Australia, July 19, 2006 Top 3 AV companies don’t detect 80% of new malware The sheer volume and complexity of computer viruses being released on the Internet today has the anti-virus industry on the defensive, experts say, underscoring the need for consumers to avoid relying on anti-virus software alone to keep their…computers safe and secure. Source: “Anti-Virus Firms Scrambling to Keep Up ”, The Washington Post, March 19, 2008 8

The Target The terrorists intend to erode trust in technology used for managing patient care They intend to create a large scale event They intend to cause some deaths

Targets of Interest Hospital LAN + WLAN CAFM (HVAC, etc) Medical Devices (Phillips, etc) CAFM (HVAC, etc) Mobile Devices (COW’s, tablets, PDA’s, etc) Patient monitors / acute care / ICU Clinical Workstation Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc)

Phase-1 Recon Terrorists build a social map of all staff for all major hospitals Focus in on Hospitals that have more than 10,000 nodes in their networks These Hospitals are so reliant on technology that an attack will cause a major disruption to health care

Attack Vectors Spear-phishing Booby-trapped documents Fake-Links to drive-by websites Trap postings on industry-focused social networks Forums, Groups (clinician list-servs, AMDIS, web forums) SQL injections into web-based portals Employee benefit portals, external labs, etc.

Boobytrapped Documents This is the current trend Single most effective focused attack today Human crafts text

Social Networking Space Web-based attack Social Networking Space Injected Java-script Used heavily for large scale infections Social network targeting is possible

Scraping the ‘Net for emails Attackers use search engines, industry databases, and intelligent guessing to map out the domains of all major hospitals.

DMOZ

Over 1,000 in California…

Sutter’s web-based portal is quite helpful

Using SEO tracker on Mercy

Google Maps on Sacramento

Google Email Search +@XYZ.com -www.XYZ.com

you know they will click it

‘Reflected’ injection Link contains a URL variable w/ embedded script or IFRAME * User clicks link, thus submitting the variable too Trusted site, like .com, .gov, .edu The site prints the contents of the variable back as regular HTML *For an archive of examples, see xssed.com

Google Web Portal Search

My First Hit on allinurl:”exchange/logon My First Hit on allinurl:”exchange/logon.asp” – I haven’t even started yet…

Trap Postings I www.somesite.com/somepage.php <script> Some text to be posted to… the site ….

Trap Postings II www.somesite.com/somepage.php <IFRAME src= style=“display:none”></IFRAME> Some text to be posted to… the site ….

SQL attack, inserts IFRAME or script tags SQL Injection www.somesite.com/somepage.php SQL attack, inserts IFRAME or script tags

A three step infection Exploit Server Redirect Browser Exploit Injected Java-script Exploit Server Redirect 1010101010 Browser Exploit Payload Server Dropper

Cyber Weapons Market Terrorist’s don’t need to have expert hackers, they can just buy exploits for money Fully weaponized and ready to use Mostly developed out of the Eastern Bloc

Eleonore (exploit pack)

Tornado (exploit pack)

Napoleon / Siberia (exploit pack)

Mobile Devices (COW’s, tablets, PDA’s, etc) Hospital LAN Medical Devices (Phillips, etc) Mobile Devices (COW’s, tablets, PDA’s, etc) Patient monitors / acute care / ICU Clinical Workstation Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc) BYPASSES ANTIVIRUS

Command and Control Once installed, the malware phones home… TIMESTAMP SOURCE COMPUTER USERNAME VICTIM IP ADMIN? OS VERSION HD SERIAL NUMBER

Phase-2 Access The terrorist group is focused on access No actions are taken that would reveal the injected code Long term (weeks)

Four different rootkits Hospital LAN Four different rootkits Medical Devices (Phillips, etc) Mobile Devices (COW’s, tablets, PDA’s, etc) LATERAL MOVEMENT Clinical Workstation Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc)

Steal Credentials Outlook Email Password Generic stored passwords

Mobile Devices (COW’s, tablets, PDA’s, etc) Hospital LAN Database Passwords Medical Devices (Phillips, etc) Mobile Devices (COW’s, tablets, PDA’s, etc) Patient monitors / acute care / ICU Clinical Workstation Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc)

Day 1 Subtle modifications to the database

Firewalls are ineffective Hospital LAN Firewalls are ineffective Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc) Webserver on the Internet

Custom remote-control application

Full SQL access EMR

Modify dosages for in-patient care Hospital LAN Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc) Modify dosages for in-patient care

Some unsavory ideas… False doctor orders are inserted Medications are changed outright Some medications are discontinued Dosages are altered Allergies deleted

Day 3

At first, they don’t realize this was an attack Hospitals forced to restore database backups, losing three days or more of data At first, they don’t realize this was an attack The database is blamed

Day 4 After systems are restored from backup, terrorists stop using Hospitals also start to realize this was a widespread event….

Day 5

Emergency Management Plan Hospitals start restoring backups Incident Response Teams discover the command-and-control traffic & database backdoor Files are sent to AV vendor

Hospitals think they have stopped a major attack… Hospital LAN X X X Hospitals think they have stopped a major attack… Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc) Webserver on the Internet

The ‘Hospital Worm’

Meanwhile… Terrorists switch to secondary They only enable the secondary once the hospital has responded to the database corruption Even if the Internet is disabled entirely, the secondary has a hard coded activation time as backup trigger

Firewalls & IDS are ineffective Hospital LAN Medical Devices (Phillips, etc) Firewalls & IDS are ineffective Mobile Devices (COW’s, tablets, PDA’s, etc) Chart Software on the COW is injected Patient monitors / acute care / ICU Electronic Health Record (EHR) + other clinical systems (radiology, pharmacy, lab, etc) Commands injected via MSN Messenger

In-process Injection No modifications to the Database Nurse C.O.W. No modifications to the Database Data is modified in transit here User Interface Restored DB Libraries Database Access Layer

Day 7 Confidence in the medical computers erodes… Hospitals start to implement paper system… Electronic Charts are not to be trusted….

Days 8-15 = Not Enough Staff Non essential procedures are cancelled Large Hospitals are completely understaffed, nurse to patient ratios are taxed when computers are shut down

Day 15 Implant triggers automatically Monitors in both adult and neonatal ICU are injected to show false data – critical patients die because alarms are not working Several major vendors targeted, especially those systems based on Windows embedded

ICU Monitor Injection Windows CE™ Rootkit Driver USB Driver Application Software

Day 16 = Chaos ER services are redirected to non-affected hospitals The Internet is blocked causing disruption with external labs and partner services Family members of patients fill the hospitals, taxing the dwindling resources Patients are being transferred to non-affected hospitals (largely those that still use paper)

Day 20 Implant triggers automatically Firmware in medical devices are altered to cause severe harm Flow rates, faulty timers, incorrect dosages Infusion pumps, in particular, are targeted

“No one knew when it would end “No one knew when it would end. We couldn’t trust or operate the medical devices. The staff could only provide basic care. The affected hospitals were more or less shut down – they were shunned as if cursed.”

Will This Be You?

Notes on research The emergency scenario was partially modeled on Hurricane Katrina & Emergency Management Plans The network attacks are all modeled on real malware that can be found today The ICU monitor attack is based on real-world Windows CE rootkit capability The medical device attack is modeled on real-world JTAG hacking on ARM-processor based devices + firmware All newspaper clippings were fabricated for illustrative purposes, but drawn from actual historical news events regarding medical equipment failures causing deaths

About HBGary Sacramento based, founded in 2004 Works closely with DoD & intelligence community regarding cyber threats Two products, both focused on detecting & responding to advanced threats in the Enterprise www.hbgary.com