Slide 1

Slide 1 text

Misha Belisle, Blaine Jeffries May 2023 Emulating Adversary Actions in the Operational Environment with CalderaTM for OT © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 2

Slide 2 text

§ I-Am § pduSource: § iAmDeviceIdentifier: Senior Applied Cybersecurity Engineer § vendorID: MITRE § Adversary emulation and cyber R&D § Interest in natural languages; Spanish, Russian, ASL § I-Am § pduSource: § iAmDeviceIdentifier: Operational Technology Security Engineer § vendorID: MITRE § Testbeds, Reverse Engineering § Strategy card game fanatic: MTG, Dominion, Ascension Remote System Discovery (T0846) # Ability: BACnet Who-Is © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 2

Slide 3

Slide 3 text

3 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 § What is Caldera? § What can Caldera do? § What is Caldera for OT? § What problem did we make Caldera for OT to solve? § What kinds of ICS protocols can we support? § How can you use Caldera for OT? § What’s next? § Where can I get Caldera for OT? Outline

Slide 4

Slide 4 text

Portable Flexible Accessible • Python3 app deployable to Mac/Linux server • Frontend web interface • Easily containerized • Can run on a laptop! • Server Min Requirements: 8GM RAM, 2 CPU Cores • Client: any device with a web browser • Agent support for: Windows, Linux, MacOS • A dozen+ built-in plugins • Supports custom plugin development What is CALDERA? Open-Source Adversary Emulation Platform § Automatable, repeatable emulation of realistic adversary attacks § Freely available on GitHub 4 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 5

Slide 5 text

5 A Quick Note about Caldera-isms § Agent – Software program that connects back to Caldera server § Ability – Specific ATT&CK tactic/technique implementation; execute on an agent § Adversary – Group of abilities representing the TTPs available to a threat actor § Operation – Context in which abilities can be run on agent groups, based on adversary profiles. Also has the option to manually run abilities. § Fact – Identifiable piece of information that may be required to execute an ability, e.g., an IP address, a hostname © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 6

Slide 6 text

6 Example Deployment © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 7

Slide 7 text

THINK LIKE AN ADVERSARY! Why does Caldera Exist? Adversary Emulation is Hard They require a significant time investment Results are dependent on the capabilities of involved personnel Exercises can be difficult to repeat unless extensively documented Design (e.g., TTPs, scope, adversary profile, etc.) can be challenging Exercises cost a lot to run © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 7

Slide 8

Slide 8 text

THINK LIKE AN ADVERSARY! Caldera Makes Testing Easier! Less time intensive – can run and plan exercises faster Dependent now on attacker model, not on personnel Can repeat tests at the push of a button Designs can be saved, re-used, and designed with easy interfaces Lowers the cost to run exercises © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 8

Slide 9

Slide 9 text

9 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 § Core system with modular plugin architecture Caldera Plugins EMU Converts Adversary Emulation Plans to CALDERA format COMPASS Generates Adversaries from the ATT&CK Matrix ATOMIC Converts Atomic Red Team tests to CALDERA format CALDERATM for OT Purpose: Extend core to the OT environment

Slide 10

Slide 10 text

10 Why Caldera for OT? Efficient and reliable to repeat tests Simplify modification to execute iterative attacks to circumvent detections Lower the barrier to ICS skills Enable testing and tailoring of detections for known procedures Support threat emulation scenario integrators and operators in the OT domain © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 11

Slide 11 text

Caldera for OT Plugins Impact: Rapid integration & emulation in the OT environment Caldera CORE OT-Enterprise Traditional Enterprise IT based abilities relevant to the OT domain. © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 Expand operator toolkit with ATT&CK for ICS mapped OT abilities Expose native OT protocol functionality 11

Slide 12

Slide 12 text

BACnet Who Is Read Property / Read File Device Object Instance Instance & Type & Property Demonstrating a Technique Across Diverse Protocols 12 OPC DA IOPCServerList Read Group Object or Item Object Cache or Device Research! Protocol Function Payload © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 13

Slide 13 text

13 Other Use Cases Adversary Emulation Training & Purple Teaming FAT/SAT Testing Caldera for OT Plugins provide extensible tooling for testing network security posture by coordinating the execution of real threat activity © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 14

Slide 14 text

14 Scenario Walkthrough © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 15

Slide 15 text

15 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 16

Slide 16 text

16 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 • Phishing User opens malicious email attachment that spawns a CALDERA agent in the Enterprise Zone. INITIAL ACCESS T1566 • Logon / Boot Autostart Execution Add encoded command in Windows registry to run CALDERA agent on system startup. PERSISTENCE T1547

Slide 17

Slide 17 text

17 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 • Account Discovery • Process Discovery • System Network Connections Discovery Discover local accounts, processes, and network connections. An internal webserver is identified as a potential target. DISCOVERY T1057 T1049 T1087 PERSISTENCE INITIAL ACCESS • OS Credential Dumping Dump local workstation credentials using PowerSploit Invoke-Mimikatz module. CREDENTIAL ACCESS T1003

Slide 18

Slide 18 text

18 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 • Active Scanning Scan the identified web server for potential vulnerabilities. T1595 RECONNAISSANCE CREDENTIAL ACCESS DISCOVERY PERSISTENCE INITIAL ACCESS • Exploitation of Remote Services Exploit a remote-code-execution vulnerability on the web server to spawn an agent in the DMZ. LATERAL MOVEMENT T1210

Slide 19

Slide 19 text

19 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 LATERAL MOVEMENT RECONNAISSANCE CREDENTIAL ACCESS DISCOVERY PERSISTENCE INITIAL ACCESS • Account Discovery • Process Discovery • System Network Connections Discovery Discover local accounts, processes, and network connections. Identify multiple targets in control zone with connections to DMZ web server. DISCOVERY T1057 T1049 T1087

Slide 20

Slide 20 text

20 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 LATERAL MOVEMENT RECONNAISSANCE CREDENTIAL ACCESS DISCOVERY PERSISTENCE INITIAL ACCESS DISCOVERY • Remote Services • Lateral Tool Transfer Using a valid account collected from the enterprise workstation, remotely download and execute the agent payload to gain access to a Control Zone workstation. LATERAL MOVEMENT T1570 T1021

Slide 21

Slide 21 text

21 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 LATERAL MOVEMENT RECONNAISSANCE CREDENTIAL ACCESS DISCOVERY PERSISTENCE INITIAL ACCESS DISCOVERY LATERAL MOVEMENT • Logon / Boot Autostart Execution Add encoded command in Windows registry to run CALDERA agent on system startup. PERSISTENCE T1547

Slide 22

Slide 22 text

22 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 LATERAL MOVEMENT RECONNAISSANCE CREDENTIAL ACCESS DISCOVERY PERSISTENCE INITIAL ACCESS DISCOVERY LATERAL MOVEMENT PERSISTENCE CALDERA alone is limited in abilities applicable to Purdue L2 / L1 assets. Enter CALDERA for OT!

Slide 23

Slide 23 text

23 BACnet Plugin Abilities © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408

Slide 24

Slide 24 text

24 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 How to Use Caldera OT

Slide 25

Slide 25 text

25 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 How to Use Caldera OT ./bacwi Command

Slide 26

Slide 26 text

26 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 How to Use Caldera OT … ./bacepics 200121 Command

Slide 27

Slide 27 text

27 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 How to Use Caldera OT ./bacrp 200121 1 1 85 -1 Command

Slide 28

Slide 28 text

28 How to Use Caldera OT © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 ./bacwp 200121 1 1 85 1 -1 1 100 Command

Slide 29

Slide 29 text

29 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 How to Use Caldera OT ./bacrp 200121 1 1 85 -1 Command

Slide 30

Slide 30 text

30 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 LATERAL MOVEMENT RECONNAISSANCE CREDENTIAL ACCESS DISCOVERY PERSISTENCE INITIAL ACCESS DISCOVERY LATERAL MOVEMENT PERSISTENCE • Rem. System Discovery BACnet Who Is T0846 DISCOVERY COLLECTION • Automated Collection • Point & Tag Identification BACnet EPICS Report BACnet Read Property T0802 T0861 IMPACT • Manipulation of Control BACnet Write Property T0831

Slide 31

Slide 31 text

31 Hands-on Demo!: § Portable “building in a box” § Interact with Caldera for OT plugins © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 Try it yourself! (visit us at Booth #8!) The Mission: § Challenge 1: PACS § Challenge 2: HVAC Floor 1 (PACS) Objective: > Gain Entry Floor 2 (HVAC) Objective: > Disrupt Ventilation

Slide 32

Slide 32 text

32 Future Releases: § Expand ICS protocol coverage and capabilities § Caldera for OT blog posts and learning materials © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408 Future Direction (and how you can contribute!) Community Engagement: § Actively seeking feedback and collaboration opportunities § Contribute to the open-source on GitHub! Explore Caldera: https://github.com/mitre/caldera Coming Soon: https://github.com/mitre/caldera-ot Reach us at: OT@mitre.org

Slide 33

Slide 33 text

mbelisle@mitre.org bjeffries@mitre.org CalderaTM for OT Contact Information OT@mitre.org https://github.com/mitre/caldera-ot https://github.com/mitre/caldera © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE: 23-1408