ISA Interchange

Welcome to the official blog of the International Society of Automation (ISA).

This blog covers numerous topics on industrial automation such as operations & management, continuous & batch processing, connectivity, manufacturing & machine control, and Industry 4.0.

The material and information contained on this website is for general information purposes only. ISA blog posts may be authored by ISA staff and guest authors from the automation community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

How the Stuxnet Computer Worm Spreads in an Industrial Process Plant

 

This article is an excerpt from the white paper, "How Stuxnet Spreads," by Eric Byers, Andrew Gintner and John Langill. For information about the full article, see the link at the bottom of this post.

 

The Stuxnet worm is a sophisticated piece of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC and PCS 7 control systems. The worm used both known and previously unknown vulnerabilities to install, infect and propagate, and was powerful enough to evade state-of-the-practice security technologies and procedures. Since its discovery, there has been extensive analysis of Stuxnet’s internal workings.

What has not been discussed is how the worm might have migrated from the outside world to supposedly isolated and secure industrial control systems (ICS). Understanding the routes that a directed worm takes as it targets an ICS is critical if these vulnerable pathways are to be closed for future worms. To help address this knowledge gap, this White Paper describes a hypothetical industrial site that follows the high security architecture and best practices defined in vendor documents.

 

It then shows the ways that the Stuxnet worm could make its way through the defenses of the site to take control of the process and cause physical damage. It is important to note that the analysis presented in this paper is based on a security model that, though it is accepted in industry as a best practice, is often not implemented in practice. System architectures in the real world are typically much less secure than the one presented in this paper. The paper closes with a discussion of what can be learned from the analysis of pathways in order to prevent infection from future ICS worms. Key findings include the following:

  • A modern ICS or SCADA system is highly complex and interconnected, resulting in multiple potential pathways from the outside world to the process controllers.
  • Assuming an air-gap between ICS and corporate networks is unrealistic, as information exchanges are essential for process and business operations to function effectively.
  • All mechanisms for transfer of electronic information (in any form) to or from an ICS must to be evaluated for security risk.
  • Focusing security efforts on a few obvious pathways (such as USB storage drives or the Enterprise/ICS firewall) is a flawed defense.
  • Industry must accept that the complete prevention of ICS infection is probably impossible and that instead of complete prevention, industry must create a security architecture that can respond to the full life cycle of a cyber breach.
  • Industry must address the containment of attacks when prevention fails and aggressively segment control networks to limit the consequences of compromise. In particular, securing last-line-of-defense critical systems, such as safety integrated systems (SIS), is essential.
  • Combining control and safety functionality in highly integrated ICS equipment exposes systems to common-cause security failures. For critical systems, diversity is important.
  • Providing security by simply blocking or allowing entire classes of protocols between manufacturing areas is no longer sufficient. Stuxnet highlights the need for the deep packet inspection (DPI) of key SCADA and ICS protocols.
  • The Remote Procedure Call (RPC) protocol is an ideal vector for SCADA and ICS attacks because it is used for so many legitimate purposes in modern control systems.
  • Industry should start to include security assessments and testing as part of the system development and periodic maintenance processes in all ICS.
  • There is a need to improve the culture of industrial security among both management and technical teams.

If the critical infrastructures of the world are to be safe and secure, then the owners and operators need to recognize that their control systems are now the target of sophisticated attacks. Improved defense-in-depth postures for industrial control systems are needed urgently. Waiting for the next worm may be too late.

This white paper was authored by:

  • Eric Byres, PE and ISA Fellow, CTO Byres Security, Inc.
  • Andrew Ginter, CISSP, CTO Abterra Technologies
  • John Langill, CEH, CPT, CCNA, CSO SCADAhacker.com

 

ISA offers standards-based industrial cybersecurity training, certificate programs, conformity assessment programs, and technical resources. Please visit the following ISA links for more information:

 


Related Posts

ISA Landmark Turnaround Fuels Future Growth

In our 2023 annual report and in our recent State of the Society speech at the 2024 ISA Automation Summit...
Prabhu Soundarrajan Oct 8, 2024 7:00:00 AM

High Integrity Pressure Protection Systems (HIPPS)

High integrity pressure protection systems (HIPPS) are used in the process industries to reduce the risk ...
Ankeet Anil Kaji Oct 4, 2024 7:00:00 AM

Highlighting Cybersecurity Awareness Month with ISA's Cybersecurity Library

The start of Cybersecurity Awareness Month in October offers a timely reason to refocus on securing criti...
Kara Phelps Oct 1, 2024 7:00:00 AM