Brute Force I/O

From attackics
Jump to navigation Jump to search
Brute Force I/O
Technique
ID T0806
Tactic Impair Process Control
Data Sources Alarm history, Sequential event recorder, Data historian, Netflow/Enclave netflow, Network protocol analysis, Packet capture
Asset Control Server, Field Controller/RTU/PLC/IED

Description

Adversaries may brute force I/O addresses on a device and attempt to exhaustively perform an action. By enumerating the full range of I/O addresses, an adversary may manipulate a process function without having to target specific I/O interfaces. More than one process function manipulation and enumeration pass may occur on the targeted I/O range in a brute force attempt.


Procedure Examples

  • The Industroyer IEC 104 module has 3 modes available to perform its attack. These modes are range, shift, and sequence. The range mode operates in 2 stages. The first stage of range mode gathers Information Object Addresses (IOA) and sends "select and execute" packets to switch the state. The second stage of range mode has an infinite loop where it will switch the state of all of the previously discovered IOAs. Shift mode is similar to range mode, but instead of staying within the same range, it will add a shift value to the default range values.1

Mitigations

  • Network Allowlists - Utilize network allowlists to restrict unnecessary connections to network devices (e.g., comm servers, serial to ethernet converters) and services, especially in cases when devices have limits on the number of simultaneous sessions they support.
  • Network Segmentation - Segment operational assets and their management devices based on their functional role within the process. Enabling more strict isolation to more critical control and operational information within the control environment.2345
  • Filter Network Traffic - Allow/denylists can be used to block access when excessive I/O connections are detected from a system or device during a specified time period.