Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. ICS
  4. Replication Through Removable Media

Replication Through Removable Media

Adversaries may move onto systems, such as those separated from the enterprise network, by copying malware to removable media which is inserted into the control systems environment. The adversary may rely on unknowing trusted third parties, such as suppliers or contractors with access privileges, to introduce the removable media. This technique enables initial access to target devices that never connect to untrusted networks, but are physically accessible.

Operators of the German nuclear power plant, Gundremmingen, discovered malware on a facility computer not connected to the internet.[1][2] The malware included Conficker and W32.Ramnit, which were also found on eighteen removable disk drives in the facility.[3][4][5][6][7][8] The plant has since checked for infection and cleaned up more than 1,000 computers.[9] An ESET researcher commented that internet disconnection does not guarantee system safety from infection or payload execution.[10]

ID: T0847
Sub-techniques:  No sub-techniques
Platforms: None
Version: 1.0
Created: 21 May 2020
Last Modified: 15 April 2025

Procedure Examples

IDNameDescription
S0608 Conficker

Conficker exploits Windows drive shares. Once it has infected a computer,Conficker automatically copies itself to all visible open drive shares on other computers inside the network.[11] Nuclear power plant officials suspect someone brought inConficker by accident on a USB thumb drive, either from home or computers found in the power plant's facility.[4]

S0603 Stuxnet

Stuxnet was able to self-replicate by being spread through removable drives. A willing insider or unknown third party, such as a contractor, may have brought the removable media into the target environment.[12] The earliest version of Stuxnet relied on physical installation, infecting target systems when an infected configuration file carried by a USB stick was opened.[13]

Targeted Assets

IDAsset
A0008 Application Server
A0007 Control Server
A0009 Data Gateway
A0006 Data Historian
A0017 Distributed Control System (DCS) Controller
A0013 Field I/O
A0002 Human-Machine Interface (HMI)
A0005 Intelligent Electronic Device (IED)
A0012 Jump Host
A0018 Programmable Automation Controller (PAC)
A0003 Programmable Logic Controller (PLC)
A0004 Remote Terminal Unit (RTU)
A0010 Safety Controller
A0011 Virtual Private Network (VPN) Server
A0001 Workstation

Mitigations

IDMitigationDescription
M0942 Disable or Remove Feature or Program

Consider the disabling of features such as AutoRun.

M0934 Limit Hardware Installation

Enforce system policies or physical restrictions to limit hardware such as USB devices on critical assets.

M0928 Operating System Configuration

Harden the system through operating system controls to prevent the known or unknown use of malicious removable media.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0733Detection of Replication Through Removable MediaAN1866

Monitor for newly executed processes that execute from removable media after it is mounted or when initiated by a user. If a remote access tool is used in this manner to move laterally, then additional actions are likely to occur after execution, such as opening network connections for Command and Control and system and network information Discovery.
Monitor for newly constructed files copied to or from removable media.
Monitor for newly constructed drive letters or mount points to removable media.
Monitor for files accessed on removable media, particularly those with executable content.

References

  1. Kernkraftwerk Gundremmingen 2016, April 25 Detektion von Bro-Schadsoftware an mehreren Rechnern Retrieved. 2019/10/14
  2. Trend Micro 2016, April 27 Malware Discovered in German Nuclear Power Plant Retrieved. 2019/10/14
  3. Christoph Steitz, Eric Auchard 2016, April 26 German nuclear plant infected with computer viruses, operator says Retrieved. 2019/10/14
  4. Catalin Cimpanu 2016, April 26 Malware Shuts Down German Nuclear Power Plant on Chernobyl's 30th Anniversary Retrieved. 2019/10/14
  5. Peter Dockrill 2016, April 28 Multiple Computer Viruses Have Been Discovered in This German Nuclear Plant Retrieved. 2019/10/14
  6. Lee Mathews 2016, April 27 German nuclear plant found riddled with Conficker, other viruses. Retrieved November 17, 2024.
  7. Sean Gallagher 2016, April 27 German nuclear plants fuel rod system swarming with old malware Retrieved. 2019/10/14
×

[8]ページ先頭

©2009-2026 Movatter.jp