Cyber-Crash and Bleed Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure.

Slides:



Advertisements
Similar presentations
Incident Handling & Log Analysis in a Web Driven World Manindra Kishore.
Advertisements

What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Information Technology Disaster Recovery Awareness Program.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Lunker: The Advanced Phishing Framework
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Norman SecureSurf Protect your users when surfing the Internet.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
November 2009 Network Disaster Recovery October 2014.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
IT Security for Users By Matthew Moody.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Computer Emergency Notification System (CENS)
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
ASP. What is ASP? ASP stands for Active Server Pages ASP is a Microsoft Technology ASP is a program that runs inside IIS IIS stands for Internet Information.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
“How to Protect Yourself”
XSS 101 Jason Clark 12/20.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Securing Information Systems
Javascript worms By Benjamin Mossé SecPro
What they are and how to protect against them
Cyber-Crash and Bleed Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure.
Firmware threat Dhaval Chauhan MIS 534.
Chapter 7: Identifying Advanced Attacks
IT Security  .
Instructor Materials Chapter 7 Network Security
RCS v7 Infection Vectors
Backdoor Attacks.
Configuring Windows Firewall with Advanced Security
Outline Introduction Standards Project General Idea
Symantec Code Signing Certificate
Your Computer Wants To Ruin Your Life
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Jon Peppler, Menlo Security Channels
The Hacking Suite for Governmental Interception
Call AVG Antivirus Support | Fix Your PC
Spear Phishing Ways to Minimize its Risks
Anatomy of a Large Scale Attack
How to keep the bad guys out and your data safe
Active Man in the Middle Attacks
LO1 - Know about aspects of cyber security
WJEC GCSE Computer Science
6. Application Software Security
Securing web applications Externally
The Hacking Suite For Governmental Interception
Presentation transcript:

Cyber-Crash and Bleed Anatomy of a Cyber Terrorist Attack on the Nation’s Hospital Infrastructure

The Target The terrorists intend to erode trust in technology used for managing patient care They intend to create a large scale event They intend to cause some deaths

Targets of Interest Hospital LAN Phillips Devices CAFM COW ICU monitors Internet Workstation EMR, Document Management System

Phase-1 Recon Terrorists build a social map of all staff for all major hospitals Focus in on Hospitals that have more than 10,000 nodes in their networks These Hospitals are so reliant on technology that an attack will cause a major disruption to health care

Attack Vectors Spear-phishing Booby-trapped documents Fake-Links to drive-by websites Trap postings on industry-focused social networks Forums, Groups SQL injections into web-based portals Employee benefit portals, external labs, etc.

Boobytrapped Documents This is the current trend Single most effective focused attack today Human crafts text

Social Networking Space Web-based attack Social Networking Space Injected Java-script Used heavily for large scale infections Social network targeting is possible

Scraping the ‘Net for emails Attackers use search engines, industry databases, and intelligent guessing to map out the domains of all major hospitals.

DMOZ

Over 1,000 in California…

Sutter’s web-based portal is quite helpful

Using SEO tracker on Mercy

Google Maps on Sacramento

Google Email Search +@XYZ.com -www.XYZ.com

you know they will click it

‘Reflected’ injection Link contains a URL variable w/ embedded script or IFRAME * User clicks link, thus submitting the variable too Trusted site, like .com, .gov, .edu The site prints the contents of the variable back as regular HTML *For an archive of examples, see xssed.com

Google Web Portal Search

My First Hit on allinurl:”exchange/logon My First Hit on allinurl:”exchange/logon.asp” – I haven’t even started yet…

Trap Postings I www.somesite.com/somepage.php <script> Some text to be posted to… the site ….

Trap Postings II www.somesite.com/somepage.php <IFRAME src= style=“display:none”></IFRAME> Some text to be posted to… the site ….

SQL attack, inserts IFRAME or script tags SQL Injection www.somesite.com/somepage.php SQL attack, inserts IFRAME or script tags

A three step infection Exploit Server Redirect Browser Exploit Injected Java-script Exploit Server Redirect 1010101010 Browser Exploit Payload Server Dropper

Cyber Weapons Market Terrorist’s don’t need to have expert hackers, they can just buy exploits for money Fully weaponized and ready to use Mostly developed out of the Eastern Bloc

Eleonore (exploit pack)

Tornado (exploit pack)

Napoleon / Siberia (exploit pack)

Hospital LAN Phillips Devices COW ICU monitors Internet Workstation EMR, Document Management System BYPASSES ANTIVIRUS

Command and Control Once installed, the malware phones home… TIMESTAMP SOURCE COMPUTER USERNAME VICTIM IP ADMIN? OS VERSION HD SERIAL NUMBER

Phase-2 Access The terrorist group is focused on access No actions are taken that would reveal the injected code Long term (weeks)

Four different rootkits Hospital LAN Four different rootkits Phillips Devices COW LATERAL MOVEMENT Internet Workstation EMR, Document Management System

Steal Credentials Outlook Email Password Generic stored passwords

Hospital LAN Database Passwords Phillips Devices COW ICU monitors Internet Workstation EMR, Document Management System

Day 1 Subtle modifications to the database

Firewalls are ineffective Hospital LAN Firewalls are ineffective EMR, Document Management System Webserver on the Internet

Custom remote-control application

Full SQL access EMR

Hospital LAN EMR, Document Management System Modify dosages for in-patient care

Some unsavory ideas… False doctor orders are inserted Medications are changed outright Some medications are discontinued Dosages are altered Allergies deleted

Day 3

At first, they don’t realize this was an attack Hospitals forced to restore database backups, losing three days or more of data At first, they don’t realize this was an attack The database is blamed

Day 4 After systems are restored from backup, terrorists stop using Hospitals also start to realize this was a widespread event….

Day 5

Emergency Management Plan Hospitals start restoring backups Incident Response Teams discover the command-and-control traffic & database backdoor Files are sent to AV vendor

Hospitals think they have stopped a major attack… Hospital LAN X X X Hospitals think they have stopped a major attack… EMR, Document Management System Webserver on the Internet

The ‘Hospital Worm’

Meanwhile… Terrorists switch to secondary They only enable the secondary once the hospital has responded to the database corruption Even if the Internet is disabled entirely, the secondary has a hard coded activation time as backup trigger

Firewalls & IDS are ineffective Hospital LAN Phillips Devices Firewalls & IDS are ineffective COW Chart Software on the COW is injected EMR, Document Management System Commands injected via MSN Messenger

In-process Injection No modifications to the Database Nurse C.O.W. No modifications to the Database Data is modified in transit here User Interface Restored DB Libraries Database Access Layer

Day 7 Confidence in the medical computers erodes… Hospitals start to implement paper system… Electronic Charts are not to be trusted….

Days 8-15 = Not Enough Staff Non essential procedures are cancelled Large Hospitals are completely understaffed, nurse to patient ratios are taxed when computers are shut down

Day 15 Implant triggers automatically Monitors in both adult and neonatal ICU are injected to show false data – critical patients die because alarms are not working Several major vendors targeted, especially those systems based on Windows embedded

ICU Monitor Injection Windows CE™ Rootkit Driver USB Driver Application Software

Day 16 = Chaos ER services are redirected to non-affected hospitals The Internet is blocked causing disruption with external labs and partner services Family members of patients fill the hospitals, taxing the dwindling resources Patients are being transferred to non-affected hospitals (largely those that still use paper)

Day 20 Implant triggers automatically Firmware in medical devices are altered to cause severe harm Flow rates, faulty timers, incorrect dosages Infusion pumps, in particular, are targeted

“No one knew when it would end “No one knew when it would end. We couldn’t trust or operate the medical devices. The staff could only provide basic care. The affected hospitals were more or less shut down – they were shunned as if cursed.”

Will This Be You?

Notes on research The emergency scenario was partially modeled on Hurricane Katrina & Emergency Management Plans The network attacks are all modeled on real malware that can be found today The ICU monitor attack is based on real-world Windows CE rootkit capability The medical device attack is modeled on real-world JTAG hacking on ARM-processor based devices + firmware All newspaper clippings were fabricated for illustrative purposes, but drawn from actual historical news events regarding medical equipment failures causing deaths