1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Lessons Learned in Smart Grid Cyber Security
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Jump Starting ITS Deployment in Los Angeles County using Wireless Communications Lessons Learned.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Security in Cloud Computing Zac Douglass Chris Kahn.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Importance of Physical Security Common Security Mistakes 1.Security Awareness 2.Incident Response 3.Poor Password Management 4.Bad administrative.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
IS3220 Information Technology Infrastructure Security
Towards Secure and Dependable Software-Defined Networks Fernando M. V. Ramos LaSIGE/FCUL, University of Lisbon
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
The Current State of Cyber Security and How to Defend Your Data.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Clouding with Microsoft Azure
Proactive Incident Response
Koji Nakao, Dai Arisue NICT, Japan
3.6 Fundamentals of cyber security
Six Steps to Secure Access for Privileged Insiders and Vendors
Firmware threat Dhaval Chauhan MIS 534.
Cybersecurity - What’s Next? June 2017
Critical Security Controls
State Board of Elections Computers
Real-time protection for web sites and web apps against ATTACKS
© 2015 Air Force Association
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Wireless Network Security
Six Steps to Secure Access for Privileged Insiders and Vendors
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Joe, Larry, Josh, Susan, Mary, & Ken
NYBA 2017 Technology, Compliance &
Teaching Computing to GCSE
COMPTIA CAS-003 Dumps VCE
5G Security Training
Determined Human Adversaries: Mitigations
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Auburn Information Technology
CRITICAL INFRASTRUCTURE CYBERSECURITY
12 STEPS TO A GDPR AWARE NETWORK
Information Security Awareness
Cyber Security - Protecting Information
Network hardening Chapter 14.
Determined Human Adversaries: Mitigations
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
DDoS attack Turn slides
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Anatomy of a Common Cyber Attack
Presentation transcript:

1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center

2 Just what are we talking about? This is ONLY about cyber incidents on the Surface Transportation Infrastructure No aircraft No rail No ships No Hyperloop It only covers what we know. No names of vendors or agencies will be used

3 Our Playing Field

4 The Other Team

5 Our 2015 Score Board Hacking the World’s Traffic Control Systems (Group I) Open Source Collection/Recon System Scanning Profiling Green Lights Forever (Group I) +System Compromise SUN_HACKER (Group I) +System Control

6 Hacking the Workld’s Traffic Control System

7 Hacking the World’s Traffic Control System Sensational claims of accessing traffic control system via wirelessly connected sensors. Claimed vulnerable products deployed around the world. Demonstrated ability to: Intercept data between sensor and roadside receiver Inject data between sensor and roadside receiver Attack using both portable & UAV platforms Overwrite sensor software ‘Brick’ (disable via bad software update) wireless sensor

8 Hacking the World’s Traffic Control System Operational Impact: NOT A WHOLE LOT Why? The wireless link between the sensor and the roadside receiver is a weak link The sensor is susceptible to ‘remote’ tampering – but within radio range. Bad sensor data – normal part of everyday operation No evidence of inward movement – even with encouragement

9 Green Lights Forever Graduate school class project partnered with Public Agency Published in USENIX Technical Proceeding – this is a penetration test Exploited vulnerabilities with Center to Field systems Demonstrated remote control of signal controller Unable to produce “Bruce Willis” or “The Italian Job” effect – specifically confirm effectiveness of Conflict Monitor Mass media did not read the paper – the world did not end

10 Green Lights Forever Operational Impact: Center to field wireless network vulnerability (again)*** Controller was open – protection considered a network responsibility. Conflict Green did not happen, but stop time was demonstrated. Other dangerous condition could’ve been created. Instructions on controller operations available online. Posted by non-manufacturer sources. Why Information can facilitate other attacks

11

12 SUN_HACKER Dynamic Message Sign Hack Multiple States – at least 4 confirmed. There could be others Attack took place over a 72 hour period (maximum) Twitter Handle: SUN_HACKER Claimed credit on both DMS sign and on Twitter Twitter account originated from the Middle East User name is an experienced Group 1 attacker Automated Attack Tool maybe involved First publicized foreign hack into domestic transportation system

13 SUN_HACKER Operational Impact: Breached over cellular Center to Field network (again!) –Systems were visible to SHODAN –375 US signs were visible Poorly configured modem with unpatched vulnerability Default or no password used No other protection were in place Open source information provided additional attack data Why? SUN_HACKER breached other systems using the same exploit

14

15 Crowd Source Traffic Information Hack Developed by Israeli researchers but paper was never published Utilized software development environment to created virtual traffic devices in the cloud. Enabling development Synthetic GPS data generator Automated script to create virtual users and coordinate synthetic kinematic data. Current certificate based solutions does not work here

16

17

18

19 Lesson Learned We need a better way to communicate and spread the word about incidents. Cyber Security experts do not have the domain knowledge of transportation system for proper threat assessment We’re making old mistakes: Poor configuration practice for wireless network Poor practice to secure field equipment Poor practice to patch vulnerabilities