Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology

07/18/2023
by   Richard Derbyshire, et al.
0

For decades, operational technology (OT) has enjoyed the luxury of being suitably inaccessible so as to experience directly targeted cyber attacks from only the most advanced and well-resourced adversaries. However, security via obscurity cannot last forever, and indeed a shift is happening whereby less advanced adversaries are showing an appetite for targeting OT. With this shift in adversary demographics, there will likely also be a shift in attack goals, from clandestine process degradation and espionage to overt cyber extortion (Cy-X). The consensus from OT cyber security practitioners suggests that, even if encryption-based Cy-X techniques were launched against OT assets, typical recovery practices designed for engineering processes would provide adequate resilience. In response, this paper introduces Dead Man's PLC (DM-PLC), a pragmatic step towards viable OT Cy-X that acknowledges and weaponises the resilience processes typically encountered. Using only existing functionality, DM-PLC considers an entire environment as the entity under ransom, whereby all assets constantly poll one another to ensure the attack remains untampered, treating any deviations as a detonation trigger akin to a Dead Man's switch. A proof of concept of DM-PLC is implemented and evaluated on an academically peer reviewed and industry validated OT testbed to demonstrate its malicious efficacy.

READ FULL TEXT
research
03/28/2023

Quantitative Measurement of Cyber Resilience: Modeling and Experimentation

Cyber resilience is the ability of a system to resist and recover from a...
research
01/26/2022

Cyber Resilience: by Design or by Intervention?

The term "cyber resilience by design" is growing in popularity. Here, by...
research
02/18/2021

To Improve Cyber Resilience, Measure It

We are not very good at measuring – rigorously and quantitatively – the ...
research
05/11/2021

Survey and Taxonomy of Adversarial Reconnaissance Techniques

Adversaries are often able to penetrate networks and compromise systems ...
research
05/15/2022

Mod2Dash: A Framework for Model-Driven Dashboards Generation

The construction of an interactive dashboard involves deciding on what i...
research
06/26/2020

CyRes – Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract)

Existing approaches to cyber security and regulation in the automotive s...
research
02/17/2023

Cyber-attack TTP analysis for EPES systems

The electrical grid constitutes of legacy systems that were built with n...

Please sign up or login with your details

Forgot password? Click here to reset