”Please, Come and Hack my SCADA System!”
Mikael Vingaard, IT-Security Consultant – EnergiNet.dk
CISSP - GICSP
l11th Annual EnergySec Security & Compliance Summit |
Sept. 14-16 | Washington D.C.
1
Introduction, WHOAMI and takeaway
EnergyNet.dk (Danish National TSO) are responsible for the
national infrastructure, which supplies Denmark with electrical
power and natural gas. We are a non-profit enterprise fully
owned by the Danish government.
$whoami
After this presentation, a non-technical overview combined
with real-life cases will highlight the possible advantages a
honey-pot network may provide to the sector.
2
What is a Honeypot?
The goal of having a Honeypot (a fake ‘vulnerable’ IT-system/
service) is to learn more about your attackers and the methods
they will use to breach your systems.
3 different deployment “modes” (Internal, DMZ and external).
The research concentrates on the last – external honeypots.
A great cost effective way to gather (close to) real time threat
intelligence, if done right.
3
Con Honeypots
Deployment must be careful planned – especial in DMZ and
external mode.
PR/ Media and potential legal questions must be considered.
“To be breached or not to be breached”- an ongoing process to
prevent your assets from becoming a liability.
A word on Geo-location.
Intelligence gathering is a process – not a destination.
4
Pro Honeypot
Cost effective, real time threat intelligence compare to some
external vendors threat feeds.
As generic (or custom made) information as you want it to be.
Depending on the different deployment scenarios, you can
establish if a specific attack is directed at your organization or
“everyone”.
Deployment methods and options have matured much the last
years.
Last but not least, FUN!
5
4 types of attackers (external only)
6
Y = Dedication to harm YOUR organization
X = Technical Knowledge & ressources .
Y
X
Technical setup – 4 types of Honeypots
Type 1: “Crash and burn”
Red Storm Rising, Ultimate level: "Life can be brutal and
short.“
Type 2: “To fake to be true”
Run - if you have any understanding of I.T/O.T systems.
lType 3: “Regular Honeypots”
I am right here…
Type 4: “Hidden Honeypots”
Breach me – if you can find me
7
Case ”Human or automated attack”
Type 1: “crash and burn”
From ”boot” to ”oh-no – Houston, we do have a problem” – shortest time
was 26 min.
192.168.1.141:22 192.168.1.5:44586 ESTABLISHED
192.168.1.141:22 101.227.241.251:57705 ESTABLISHED
192.168.1.141:22 115.239.248.238:35325 ESTABLISHED
192.168.1.141:22 1.85.44.222:44587 ESTABLISHED
…..
MOTD Banner fun:
“You are currently breaching my honeypot,
ABUSE report with PCAP evidence will be mailed
to your ISP”
8
Case ”The Internet are NOT your oyster”
Type 2: “To fake to be true”
Reply to an abuse report (honeypots on public cloud
providers).
“These connections are part of an Internet-wide research study
being conducted by computer scientists at the University of
Michigan. The research involves making benign connection
attempts to every public IP address. By measuring the entire
public address space, we are able to analyze global patterns
and trends in protocol deployment and security.
If our scans are causing problems, we would be happy to
exclude your host or network from future research scans from
the University of Michigan. Simply send us your IP address or
CIDR prefix.” 9
Case ”Smile - you are on camera”
Type 3: “Regular Honeypots”
The attacker first tries the following combination of password
and user name: username: PlcmSpIp password: PlcmSpIp
Above combination are the factory default access for many
Polycom.com's products e.g. the SoundPoint SIP (VOIP)
phones.
Immediately afterwards the attacker tries the combination of
root:TANDBERG This happens to be the default password/user
name on Tandberg/Cisco boardroom videoconferencing
systems . - Surveillance on camera/voice
10
Case ”The day before Zero”
Huawei Wimax CPE bm632w (undocumented backdoor).
Reversed binary configuration (router firmware)
< UserInfoInstance InstanceID="1" Username="admin"
Userpassword="admin" UserLevel="2">
< UserInfo NumberOfInstances="1">
< UserInfoInstance InstanceID="1" Username="wimax"
Userpassword="wimax820" Userlevel="0"/>
< /UserInfo>
Date : 30 May 2015 | Exploit Author : Koorosh Ghorbani |
Site : http://8thbit.net/
11
Honeypots, SCADA & open source
Open Source can get you a long way – even on a tight budget.
• Tools and deployment methods are available to make your
life (more) easy as Honeypot asset owner.
• Possible to Proxy/mix Honeypot with real (e.g. older /
decommissioned ) SCADA devices.
• DefCon/Blackhat observations.
12
Closing remarks
Yes, it is possible!
• 50+ reports send to various organizations, like ISP's,
CERT's, universities, corporations and governmental
agencies.
“The more you give, the more you get”
• 800+ Indication Of Compromise (IOC) detected
• 25.000+ password/ user names combination collected.
Future areas of research:
More “type 4” honeypots - automated threat feeds in various
formats: STIX/taxii and IDS signatures.
13
Questions
Deal of the day: “Ask me two good questions, and the third
question are free” :-)
Thank you for your attention
Contact details:
Mikael Vingaard | mvf@energinet.dk,
14

More Related Content

PPTX
Where Are All The ICS Attacks?
PPTX
Master Serial Killer - DEF CON 22 - ICS Village
PDF
Unidirectional Network Architectures
PDF
Defcon 23 - Chris Sistrunk - nsm 101 for ics
PDF
ICS Network Security Monitoring (NSM)
PPTX
Protecting Your DNP3 Networks
PPTX
ICS Security 101 by Sandeep Singh
PDF
Defcon through the_eyes_of_the_attacker_2018_slides
Where Are All The ICS Attacks?
Master Serial Killer - DEF CON 22 - ICS Village
Unidirectional Network Architectures
Defcon 23 - Chris Sistrunk - nsm 101 for ics
ICS Network Security Monitoring (NSM)
Protecting Your DNP3 Networks
ICS Security 101 by Sandeep Singh
Defcon through the_eyes_of_the_attacker_2018_slides

What's hot (20)

PPTX
BSidesAugusta 2015 - How to get into ICS security
PDF
Monitoring ICS Communications
PDF
Improving SCADA Security
PDF
RSAC 2016: How to Get into ICS Security
PDF
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
PPTX
Vulnerability Inheritance in ICS (English)
PDF
Man in the middle attacks on IEC 60870-5-104
PDF
S4xJapan Closing Keynote
PDF
VIPER Labs - VOIP Security - SANS Summit
PDF
ACS-2010
PPTX
Incubation of ICS Malware (English)
PPT
FireWall
PDF
Securing Critical Iot Infrastructure, IoT Israel 2014
PPTX
network security, group policy and firewalls
PPT
Day4
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PDF
A Stuxnet for Mainframes
PDF
Compromising Industrial Facilities From 40 Miles Away
PPTX
Network_Intrusion_Detection_System_Team1
PPTX
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
BSidesAugusta 2015 - How to get into ICS security
Monitoring ICS Communications
Improving SCADA Security
RSAC 2016: How to Get into ICS Security
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Vulnerability Inheritance in ICS (English)
Man in the middle attacks on IEC 60870-5-104
S4xJapan Closing Keynote
VIPER Labs - VOIP Security - SANS Summit
ACS-2010
Incubation of ICS Malware (English)
FireWall
Securing Critical Iot Infrastructure, IoT Israel 2014
network security, group policy and firewalls
Day4
Sourcefire Webinar - NEW GENERATION IPS
A Stuxnet for Mainframes
Compromising Industrial Facilities From 40 Miles Away
Network_Intrusion_Detection_System_Team1
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...

Viewers also liked (20)

PDF
Wireless Sensor Networks: Nothing is Out of Reach
PDF
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
PDF
Air Gapped SCADA & ICS Threat
PPTX
Defending Your Base of Operations: How Industrial Control Systems are Being T...
PDF
Advanced Threat Detection in ICS – SCADA Environments
PDF
HoneyPot for Network Security - building and testing against exploits.
PDF
Honeypot 101 (slide share)
PPTX
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
PPT
Honeypot
PPTX
PPTX
CIP Version 5 Immersion Workshop
PDF
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
PDF
Slide Griffin - Practical Attacks and Mitigations
PPTX
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
PPTX
Explore the Implicit Requirements of the NERC CIP RSAWs
PPT
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
PPTX
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
PDF
Cyber Security Threats to Industrial Control Systems
PPTX
BSidesAugusta ICS SCADA Defense
PDF
Honeycon2016-honeypot updates for public
Wireless Sensor Networks: Nothing is Out of Reach
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Air Gapped SCADA & ICS Threat
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Advanced Threat Detection in ICS – SCADA Environments
HoneyPot for Network Security - building and testing against exploits.
Honeypot 101 (slide share)
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
Honeypot
CIP Version 5 Immersion Workshop
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Slide Griffin - Practical Attacks and Mitigations
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Explore the Implicit Requirements of the NERC CIP RSAWs
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
Cyber Security Threats to Industrial Control Systems
BSidesAugusta ICS SCADA Defense
Honeycon2016-honeypot updates for public

Similar to Please, Come and Hack my SCADA System! (20)

PDF
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
PPT
Honeypot Project
PDF
amrapali builders @@hacking printers.pdf
PDF
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
PDF
Pay attention to that man behind the curtain: Current state of Hacking Back
PPTX
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
PPTX
Hacking and Hackers
PDF
Deception Driven Defense - Infragard 2016
PDF
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
PDF
Exp w22 exp-w22
PPTX
Making your Asterisk System Secure
PDF
Getting users to care about security
PDF
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
PDF
15 years through Infosec
PPT
Sit presentation
PPTX
Ethical Hacking
PPT
Chapter 3 Computer Crimes
PPT
Security Opportunities A Silicon Valley VC Perspective
PDF
The more you know the better you do
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
Honeypot Project
amrapali builders @@hacking printers.pdf
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
Pay attention to that man behind the curtain: Current state of Hacking Back
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
Hacking and Hackers
Deception Driven Defense - Infragard 2016
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Exp w22 exp-w22
Making your Asterisk System Secure
Getting users to care about security
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
15 years through Infosec
Sit presentation
Ethical Hacking
Chapter 3 Computer Crimes
Security Opportunities A Silicon Valley VC Perspective
The more you know the better you do

More from EnergySec (19)

PPTX
Jack Whitsitt - Yours, Anecdotally
PDF
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
PPTX
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
PDF
Industrial Technology Trajectory: Running With Scissors
PPTX
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
PDF
Where Cyber Security Meets Operational Value
PPT
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
PPT
Industry Reliability and Security Standards Working Together
PPT
What the Department of Defense and Energy Sector Can Learn from Each Other
PPTX
Third Party Security Testing for Advanced Metering Infrastructure Program
PPTX
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
PPTX
Sea Changes, Strategic Implications, Board Cyber Perspectives
PPTX
Red Teaming and Energy Grid Security
PPT
Open Platform for ICS Cybersecurity Research and Education
PPTX
CIP-014-1: Next Steps from an Auditor’s Perspective
PPTX
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
PPTX
Lessons Learned for a Behavior-Based IDS in the Energy Sector
PPT
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
PPTX
Event Correlation Applications for Utilities
Jack Whitsitt - Yours, Anecdotally
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Industrial Technology Trajectory: Running With Scissors
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
Where Cyber Security Meets Operational Value
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
Industry Reliability and Security Standards Working Together
What the Department of Defense and Energy Sector Can Learn from Each Other
Third Party Security Testing for Advanced Metering Infrastructure Program
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Sea Changes, Strategic Implications, Board Cyber Perspectives
Red Teaming and Energy Grid Security
Open Platform for ICS Cybersecurity Research and Education
CIP-014-1: Next Steps from an Auditor’s Perspective
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Lessons Learned for a Behavior-Based IDS in the Energy Sector
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
Event Correlation Applications for Utilities

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Geologic Time for studying geology for geologist
PPTX
The various Industrial Revolutions .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Modernising the Digital Integration Hub
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
STKI Israel Market Study 2025 version august
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Microsoft Excel 365/2024 Beginner's training
Enhancing emotion recognition model for a student engagement use case through...
UiPath Agentic Automation session 1: RPA to Agents
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Taming the Chaos: How to Turn Unstructured Data into Decisions
Geologic Time for studying geology for geologist
The various Industrial Revolutions .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sbt 2.0: go big (Scala Days 2025 edition)
Modernising the Digital Integration Hub
The influence of sentiment analysis in enhancing early warning system model f...
OpenACC and Open Hackathons Monthly Highlights July 2025
STKI Israel Market Study 2025 version august
Hindi spoken digit analysis for native and non-native speakers
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Abstractive summarization using multilingual text-to-text transfer transforme...
A proposed approach for plagiarism detection in Myanmar Unicode text
NewMind AI Weekly Chronicles – August ’25 Week III
Developing a website for English-speaking practice to English as a foreign la...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Microsoft Excel 365/2024 Beginner's training

Please, Come and Hack my SCADA System!

  • 1. ”Please, Come and Hack my SCADA System!” Mikael Vingaard, IT-Security Consultant – EnergiNet.dk CISSP - GICSP l11th Annual EnergySec Security & Compliance Summit | Sept. 14-16 | Washington D.C. 1
  • 2. Introduction, WHOAMI and takeaway EnergyNet.dk (Danish National TSO) are responsible for the national infrastructure, which supplies Denmark with electrical power and natural gas. We are a non-profit enterprise fully owned by the Danish government. $whoami After this presentation, a non-technical overview combined with real-life cases will highlight the possible advantages a honey-pot network may provide to the sector. 2
  • 3. What is a Honeypot? The goal of having a Honeypot (a fake ‘vulnerable’ IT-system/ service) is to learn more about your attackers and the methods they will use to breach your systems. 3 different deployment “modes” (Internal, DMZ and external). The research concentrates on the last – external honeypots. A great cost effective way to gather (close to) real time threat intelligence, if done right. 3
  • 4. Con Honeypots Deployment must be careful planned – especial in DMZ and external mode. PR/ Media and potential legal questions must be considered. “To be breached or not to be breached”- an ongoing process to prevent your assets from becoming a liability. A word on Geo-location. Intelligence gathering is a process – not a destination. 4
  • 5. Pro Honeypot Cost effective, real time threat intelligence compare to some external vendors threat feeds. As generic (or custom made) information as you want it to be. Depending on the different deployment scenarios, you can establish if a specific attack is directed at your organization or “everyone”. Deployment methods and options have matured much the last years. Last but not least, FUN! 5
  • 6. 4 types of attackers (external only) 6 Y = Dedication to harm YOUR organization X = Technical Knowledge & ressources . Y X
  • 7. Technical setup – 4 types of Honeypots Type 1: “Crash and burn” Red Storm Rising, Ultimate level: "Life can be brutal and short.“ Type 2: “To fake to be true” Run - if you have any understanding of I.T/O.T systems. lType 3: “Regular Honeypots” I am right here… Type 4: “Hidden Honeypots” Breach me – if you can find me 7
  • 8. Case ”Human or automated attack” Type 1: “crash and burn” From ”boot” to ”oh-no – Houston, we do have a problem” – shortest time was 26 min. 192.168.1.141:22 192.168.1.5:44586 ESTABLISHED 192.168.1.141:22 101.227.241.251:57705 ESTABLISHED 192.168.1.141:22 115.239.248.238:35325 ESTABLISHED 192.168.1.141:22 1.85.44.222:44587 ESTABLISHED ….. MOTD Banner fun: “You are currently breaching my honeypot, ABUSE report with PCAP evidence will be mailed to your ISP” 8
  • 9. Case ”The Internet are NOT your oyster” Type 2: “To fake to be true” Reply to an abuse report (honeypots on public cloud providers). “These connections are part of an Internet-wide research study being conducted by computer scientists at the University of Michigan. The research involves making benign connection attempts to every public IP address. By measuring the entire public address space, we are able to analyze global patterns and trends in protocol deployment and security. If our scans are causing problems, we would be happy to exclude your host or network from future research scans from the University of Michigan. Simply send us your IP address or CIDR prefix.” 9
  • 10. Case ”Smile - you are on camera” Type 3: “Regular Honeypots” The attacker first tries the following combination of password and user name: username: PlcmSpIp password: PlcmSpIp Above combination are the factory default access for many Polycom.com's products e.g. the SoundPoint SIP (VOIP) phones. Immediately afterwards the attacker tries the combination of root:TANDBERG This happens to be the default password/user name on Tandberg/Cisco boardroom videoconferencing systems . - Surveillance on camera/voice 10
  • 11. Case ”The day before Zero” Huawei Wimax CPE bm632w (undocumented backdoor). Reversed binary configuration (router firmware) < UserInfoInstance InstanceID="1" Username="admin" Userpassword="admin" UserLevel="2"> < UserInfo NumberOfInstances="1"> < UserInfoInstance InstanceID="1" Username="wimax" Userpassword="wimax820" Userlevel="0"/> < /UserInfo> Date : 30 May 2015 | Exploit Author : Koorosh Ghorbani | Site : http://8thbit.net/ 11
  • 12. Honeypots, SCADA & open source Open Source can get you a long way – even on a tight budget. • Tools and deployment methods are available to make your life (more) easy as Honeypot asset owner. • Possible to Proxy/mix Honeypot with real (e.g. older / decommissioned ) SCADA devices. • DefCon/Blackhat observations. 12
  • 13. Closing remarks Yes, it is possible! • 50+ reports send to various organizations, like ISP's, CERT's, universities, corporations and governmental agencies. “The more you give, the more you get” • 800+ Indication Of Compromise (IOC) detected • 25.000+ password/ user names combination collected. Future areas of research: More “type 4” honeypots - automated threat feeds in various formats: STIX/taxii and IDS signatures. 13
  • 14. Questions Deal of the day: “Ask me two good questions, and the third question are free” :-) Thank you for your attention Contact details: Mikael Vingaard | [email protected], 14