Forscout IOT OT Full Report
Forscout IOT OT Full Report
Forscout IOT OT Full Report
Table of Contents
1. Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
7.2.3 Impact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
9. Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
VEDERE LABS 2
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
1. Executive Summary
In this report, Vedere Labs demonstrates R4IoT: a data exfiltration and denials of service, major gangs
proof of concept for next-generation ransomware such as Conti and ALPHV have been focusing on
that exploits IoT devices for initial access, targets IT exploiting network infrastructure devices and increasing
devices to deploy ransomware and cryptominers, the sophistication of their ransomware payloads.
and leverages poor OT security practices to cause
f The intent of a study like R4IoT is to prepare
physical disruption to business operations.
businesses and cybersecurity at large to deal
f The need for a study like R4IoT emerged from the with an inevitable increase in sophistication
observation of an increase of the number and diversity and scope of traditional ransomware by:
of IoT, IoMT and OT devices connected to standard
f providing a step-by-step demonstration of how
corporate IT networks. Such devices increase the risk
posture in nearly every business that has to now deal IoT and OT exploits can be combined with a
with the growth of IoT in corporate networks, IT/OT “traditional” ransomware campaign, and
convergence and the rise of supply chain vulnerabilities.
f providing a playbook for mitigating this emerging
f R4IoT is the results of Vedere Labs’ continuous analysis type of attack by relying on complete visibility and
of how ransomware gangs have been evolving in past enhanced control of all the assets in a network.
years. Besides adding new layers of extortion, such as
f A video showing R4IoT in action can be found here.
2. Introduction
In 2021, the cybersecurity community saw many f Also in May, JBS Foods was attacked by another
instances of devastating cyberattacks that led ransomware gang, REvil, and forced to shut down
organizations to lose huge amounts of money or to its facilities in several countries before paying
temporarily halt their operations. Among them: $11 million to recover access to its systems.
f In February, Oldsmar water treatment plant employees f In July, Iran Railways had to shut down its train
noticed that sodium hydroxide levels were rapidly operations due to a hacking group infiltrating an
rising on their computer screens. Someone accessed IT system and spreading malware. Iran has not been
the treatment system using the remote connectivity forthcoming about the details of this attack, leading
tool TeamViewer, but employees thwarted the attacker security researchers to form their own hypotheses.
from moving laterally into other IT infrastructure.
f Also in July, malicious actors combined a supply chain
f In May, Colonial Pipeline was hit by a ransomware attack vector with a ransomware payload in the Kaseya
attack that caused a gas crisis. The attackers, known VSA incident. REvil, the same group that previously
as Darkside, gained access through a VPN that did attacked JBS, was able to use the Kaseya remote
not require multifactor authentication. Although management tool (VSA) to infect managed service
Darkside took control of Colonial Pipeline’s IT systems, providers and their customers with ransomware. In total,
once Colonial Pipeline knew its IT operations were more than 1500 organizations were hit simultaneously.
affected, the company chose to proactively take its OT
systems offline to prevent the attack from spreading.
VEDERE LABS 3
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
While the Oldsmar and Iran Railways incidents show a public statement on cybersecurity and convened
what individuals or small groups of attackers can a meeting of 30 countries to increase their efforts to
achieve against critical infrastructure operators, the combat cybercrime and ransomware specifically.
Colonial Pipeline, JBS Foods and Kaseya incidents are
part of a growing and alarming trend: large ransomware Successful response to ransomware depends not only on
gangs, often operating a Ransomware-as-a-Service legal and political action but also on equipping organizations
(RaaS) model, crippling the operations of several to be able to defend themselves. In this report, we
types of organizations, often at the same time. demonstrate two things: first, that the evolution of the
ransomware threat landscape is far from over because
Ransomware was without a doubt the biggest threat of 2021 attackers still have a large attack surface to explore, and
for most organizations. This was already a known problem second, that there are ways to mitigate both the likelihood
in previous years, but attackers have been evolving quickly and the impact of attacks on organizations, thus decreasing
and have moved from purely encrypting data until circa the overall risk to which these organizations are exposed.
2019 to exfiltrating data before encryption in 2020 to large
extortion campaigns with several phases in 2021. The trend We explore the current state of ransomware attacks
continued in early-2022 with the emergence of new and very (Section 4) and business networks (Section 6) to discuss
sophisticated ransomware families such as ALPHV and more how ransomware could evolve in the coming years because
attacks by RaaS groups such as Conti, which have even taken of two ongoing trends: (i) the proliferation of IoT devices in
a political position after the Russian invasion of Ukraine. enterprise organizations, and (ii) the convergence of IT and
OT networks. We created a proof-of-concept ransomware
This evolution in attacker methods means that ransomware (Section 7) that exploits the first trend by using exposed
gangs can now cripple the operations of virtually any vulnerable devices, such as an IP camera or a Network
organization. For that reason, the response to ransomware Attached Storage (NAS) as initial access point, and the second
has been gaining momentum. In January 2021, Emotet, trend to hold OT devices hostage, thus adding another
a cybercrime group that develops a malware loader layer of extortion to an attack campaign. Finally, we discuss
frequently used by ransomware gangs, was disrupted in how cybersecurity controls aligned to mature frameworks
a global action coordinated by Europol, while another can be used to detect and stop this attack or, even better,
global action arrested members of REvil in January 2022. prevent it from happening in the first place (Section 8).
In October 2021, United States President Joe Biden issued
VEDERE LABS 4
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
Although R4IoT is unique in its kind, in the past five automation devices. Those works were theoretical
years, other researchers have discussed around the analyses extrapolating from real-world incidents
possibility of ransomware extending to IoT and OT and without actual implementation, but both terms have
they have produced small-scale demonstrations of gained some popularity (e.g., AT&T, Gartner, Sophos).
how such interplay between ransomware and IoT or OT
f In 2020, Brierley et al. published PaperW8, a proof-
devices could work. We list such previous works below.
of-concept ransomware that works on multiple Linux-
f In 2016, Andrew Tierney at PenTestPartners based IoT. The goal of their PoC is to infect devices,
demonstrated a proof of concept to lock a user out display ransom notes on those devices and threaten
of a thermostat until a ransom was paid. This PoC to permanently brick them. The same team published
worked by changing the firmware of the device so the in 2021 another PoC that focused on data-stealing
user could not access its settings, and the attacker ransomware, where the data stolen comes from IoT
could set the temperature to any desired value. devices, such as audio, video and sensor feeds.
f In 2017, Stephen Cobb at ESET coined the term f In 2021, David Nicol analyzed the trend of
“jackware” for ransomware that affects IoT devices ransomware attacks affecting IT systems of
through hijacking. That paper discussed some possible energy delivery organizations and discussed
scenarios for jackware, mostly focusing on the automotive characteristics of OT systems that would make
industry. In 2019, the same researcher coined the term them susceptible to ransomware attacks, such as
“siegeware” for ransomware that affects building embedded web servers and rogue devices.
VEDERE LABS 5
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
4.2 It’s Not About Encryption, f Unleashing distributed denial of service (DDoS) attacks
against their victims during the ransom negotiation
It’s About Extortion period. This method (“triple extortion” or ransom
denial of service) has been gaining popularity,
There is still a big misconception that ransomware means
and companies that routinely monitor DDoS attacks
malware for data encryption. It started like that, but
reported record levels of attacks in 2021.
ransomware is about getting a ransom – extorting victims
via cyberattacks. The goal of ransomware attacks is to f Publicly shaming or harassing their victims by
force organizations to face a dilemma: pay the ransom contacting customers, partners and media
and hope that attackers restore access to systems and outlets to announce the hack and make the
go away, or don’t pay and try to mitigate the effects negotiation public (“quadruple extortion”).
of the attack with internal resources. There are many
ways to force this dilemma currently. Besides encrypting According to Sophos, in 2021 there was a decrease
data, ransomware gangs routinely take other actions to in successful data encryption from 73% to 54% of
gain leverage and force their victims to pay, such as: attacks; nevertheless, there was an increase from
3% to 7% in the number of incidents where data
f Exfiltrating massive amounts of sensitive data was not encrypted but the victim still had to pay a
and threatening to release it publicly. This is ransom because of other extortion techniques.
currently done by almost every ransomware and
has become known as “double extortion.”
Initial Access: Threat actors gain unauthorized access Vulnerabilities in perimeter devices/services, such as VPN
to systems either by exploiting local or remote software and cloud-based applications, have become particularly
vulnerabilities (e.g., buffer overflows or command popular for initial access. Local vulnerabilities are usually
injection) or by leveraging credential-based attacks (e.g., exploited by phishing users into running malicious code,
brute forcing, password spraying, credential stuffing). which is still the most common form of compromise.
VEDERE LABS 6
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
f Lateral Movement: Once inside a compromised organization to recover their data is usually lower than
network, ransomware threat actors have three types the initially demanded payment, which happens after a
of tools at their disposal: common exploit/pentesting negotiation period that can take dozens of turns.
frameworks (such as CobaltStrike and Mimikatz),
bespoke hacking tools (which are increasingly less Those steps are often not all performed by the same group.
popular) and internal Windows tools (such as RDP, WMIC, Two very common trends today are ransomware as a service
net, ping and PowerShell). The use of internal tools is (RaaS) and initial access brokers (IABs). In the RaaS model,
known as “Living-Off-The-Land” and is currently the most one group develops the ransomware encryptor and then
common (because they are usually already available distributes it to affiliates, who use it after they have gained
and harder to detect as malicious). RDP, for instance, access to an organization and who then share the received
was used in 90% of attacks in 2021, in 28% of attacks payments with the original developers. IABs are groups
it was used both internally and externally (i.e., for initial that sell initial access to networks, typically in the form of
access), and in 41% it was used only internally (i.e., for valid credentials (obtained via phishing or data leaks) or
lateral movement). These tools are used to scan the compromised machines via malware, such as Hancitor,
network (net, ping), obtain credentials (Mimikatz), disable IcedID, Qbot and Trickbot. Yet other parts of the criminal
security tools such as antivirus and firewalls, move underground may enter the picture, such as bulletproof
from one machine to another (RDP, WMIC) and connect hosting services, which provide hosting for malware
to a C2 server (CobaltStrike) to receive instructions. distribution, as well as command and control servers.
f Impact: Once several machines have been infected, the The steps taken by attackers can be more granularly
attackers can exfiltrate collected data to the C2 or other categorized into common Tactics, Techniques, and
servers and encrypt the files directly on local machines or Procedures (TTPs), for which there is a common
over the network (using SMB shares). The attackers then framework called MITRE ATT&CK. When looking
leave a text file notifying victims of the attack and giving at five of the most common ransomware groups of
instructions for ransom payment. The amount paid by an 2021 (Conti, DarkSide, Egregor, Maze and Ryuk),
the following TTPs were the most popular.
TACTIC TECHNIQUE
Initial Access T1078 Valid Accounts
In March 2022, Vedere Labs released a threat briefing that discussion points immediately stood out to us: how IoT
analyzed leaked chats and documents of Conti. In these devices are a major initial attack surface. They specifically
chats and documents, the group explains some of its TTPs in mention how specialized hardware such as printers, routers
more details, such as how VPN and RDP are recommended and PLCs are often left unpatched and are not treated
as ideal backdoors, and how Active Directory Domain by defenders as a major risk. They also discuss in their
Controllers are primary targets for persistence. One of the chats how to acquire devices to test specific exploits.
VEDERE LABS 7
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
VEDERE LABS 8
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
The predictions about initial access and impact above apply to methods and controller payloads to have big impact in many
organizations in any industry since the growth in the use of IoT environments. They could rely on firmware or logic downloads
and OT is not restricted to a specific sector. However, we would on the controller to drop a payload that disables engineering
also like to add some considerations about future initial access interfaces (so no further updates are possible) and starts a
and impact for OT environments. countdown on a logic bomb. This could be very simple like just
strobe toggling all the inputs/outputs when it goes off (which
It is simple to lock out and extort victims for Purdue Level 2 and requires no process comprehension).
above because those are regular Windows/Linux machines,
but doing the same for PLCs is more complex. There has Notifying the extorted victim that it has some time before the
been prior academic work targeting specific PLCs by changing logic bombs go off in all its controllers puts pressure on paying
their configurations, however the implementation differs a the ransom. This is scalable since the attacker must only figure
lot between models/vendors and requires attackers to know out ways to get code execution on the controllers for each major
what specific devices their victims run. Ransomware as a DCS once and then port the payload for each of them.
service needs to exploit economies of scale with minimal need
for finetuning by affiliates. To build a threat that extorts OT It’s a one-time attacker investment for few major parties (e.g.,
environments at scale, attackers need to figure out a way to be ABB 800xA, Siemens PCS7, Emerson DeltaV and GE Mark VIe)
able to ‘lock’ many different environments. that are used all over the world. Many of their controllers run
on well-known RTOSes like QNX (Emerson, GE) and VxWorks
One option is to use network-level denials of service like we (800xA) or have otherwise well-understood internals (PCS7).
explore on the rest of this report (see Section 7.2.3). Another That way attackers don’t have to port their malware to
option is to focus on homogenous, high-impact environments thousands of PLCs but can take a ‘big game hunting’ approach
like distributed control systems (DCS). Here the attacker has a where they list companies known to use specific DCSs and
guarantee that all the controllers in a victim are of a particular target them directly with the guarantee that all controllers their
vendor, so they only need to develop a limited amount of access controllers will be affected.
VEDERE LABS 9
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
VEDERE LABS 10
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
1. IoT, IoMT and OT devices combined represent 44% 6. Healthcare is the most affected vertical, with more than
of the total devices in enterprise networks. This 100 thousand devices impacted by Project Memoria.
means that ransomware threat actors focusing Among the most common OT/IoT devices are PLCs,
only on IT equipment are missing almost half of building automation controllers and infusion pumps. As
the available attack surface on organizations. we have described in previous research, healthcare
organizations are great targets for attackers, partly
2. Surveillance equipment, such as IP cameras
because of the diversity of their device ecosystems.
and NVRs, represent 40% of these devices.
This means that attackers focusing on IP 7. Our data shows more than half a million devices
cameras are sure to find popular targets. using the default VLAN1, meaning that segmentation
is frequently not implemented. Network segmentation
3. Two vendors – Axis and Hikvision – account for 77% of the
is a fundamental measure to limit the attack surface
IP cameras in these networks. Axis cameras alone account
in any network. Segmentation is often achieved by a
for 39% of the ones observed. Models from both vendors
combination of different techniques at Layer 2 and Layer
have multiple known code execution vulnerabilities.
3, including deploying VLANs, subnetting, ACLs and
This means that weaponizing IP camera exploits
firewalling. There are several important reasons why
as a reusable point of entry to many organizations
user devices should not be left on the default VLAN –
(exactly what initial access brokers do) is feasible.
VLAN1 contains control plane traffic which a malicious
4. Based on the data in Figure 3, of the 4.15 million device can tamper with to cause disastrous consequences,
devices running Windows OS in our dataset, more than such as deletion of a VLAN database, performing VLAN
60% have an open WMI port (135/TCP), while roughly hopping attacks and changing the root bridge, among
35% have a RDP port (3389/TCP) open. This means others. While examining the VLANs with most IoT/OT
that “living off the land” using common Windows devices, we noticed several VLANs containing a mix
tools is feasible in enterprise organizations. of IT and IoT/OT (i.e., IP cameras, building automation
5. There are more than half a million devices running equipment and point-of-care diagnostic systems sit
TCP/IP stacks vulnerable to Project Memoria, together with Windows workstations). Secure network
spread out across organizations in almost every segmentation should consider the context and purpose
industry vertical. This means that exploiting of devices rather than segmenting based on location,
these devices with similar and simple denial of floor or department. Mixing IP cameras and diagnostic
service attacks grants to attackers the possibility systems – or other business-critical devices – in the
of disrupting many types of organizations. same VLAN means that there is a path for an attack to
spread from an insecure camera to a critical device.
VEDERE LABS 11
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
VEDERE LABS 12
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
Figure 5 shows the devices and networks in our f 192.168.1.0/24 and 192.168.3.0/24 – Operational Network
lab, which is a simplified model of an enterprise that holds several IoT and OT devices. These devices
organization with the following subnets: can be accessed only from the Corporate Network.
f 192.168.85.0/24 – External Network (not shown in the Our hypothetical organization consists of
Figure) – a local network that simulates the external the following devices and machines:
network. We have chosen to use this network instead
of the real Internet for security considerations. 1. Axis M2025-LE camera, vulnerable to CVE-2018-
10660, CVE-2018-10661, CVE-2020-10662 and
f 192.168.4.0/24 – Corporate Network with Windows Zyxel NAS 326 vulnerable to CVE-2020-9054. These
workstations. This is an internal network that is are the only devices directly exposed to inbound
connected to other internal networks (see below). connections from the External Network.
This network has limited connections to the External 2. ADDC Windows server – Windows Active Directory
Network (managed by the Windows firewall): no devices Domain Controller (ADDC) machine deployed in the
from the “internet” can reach machines in the Corporate Corporate Network. This machine is not exposed
Network. Hosts in this network rely on Windows to inbound traffic from the External Network and
remote administration capabilities (such as WMI). is vulnerable to CVE-2020-1472 (Zerologon).
f 192.168.2.0/24 – IoT network with IoT devices connected 3. Victim1 and Victim2 are Windows 10 machines
to the Corporate Network. One of the devices (Axis that are part of the domain controlled by the ADDC
M2025-LE camera) is misconfigured in such a way (Corporate Network). Victim1 is used by the security
that it can be accessed from the External Network. personnel to access the video feed provided by the
This is a realistic scenario, as we see many IP cameras Axis. Finally, this machine has an RDP port enabled with
exposed directly over the internet (e.g., Shodan weak credentials. Inbound traffic from the External
queries or incidents such as the Hikvision hack). Network is not allowed for Victim1 and Victim2.
VEDERE LABS 13
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
4. Attacker’s machine (Figure 6) – a machine that the is used as a Command & Control server for R4IoT
attacker uses for Initial Access and initial Lateral executables deployed at Victim1 and Victim2.
Movement. Initially, this machine can only access Axis, 6. WAGO PLC1, WAGO PLC2, WAGO PLC3 and
as Victim1, Victim2 and ADDC rely on Windows Firewall NEC IP Phone – several OT/IoT devices within
to restrict connections to the External Network. the Operational Network(s). These devices are
5. C&C Server (Figure 6) – another attacker-controlled affected by the NUCLEUS:13 vulnerabilities
machine in the External Network. This machine (found within Project Memoria).
VEDERE LABS 14
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
f CVE-2018-10662: Attackers can access the interface to the camera to monitor the video feed. Netstat is a
that allows unrestricted dbus messages. This host-based utility that shows active connections to the
interface is reachable from /bin/ssid’s .srv files. host where it runs without firing “noisy” network scans.
f CVE-2018-10660: Shell command injection vulnerability f If a connected Windows machine is found, scan
into one of the service interfaces of dbus. it for the Windows RDP service via a single HTTP
request with curl to port 3389. If the port is open,
Attacker performs the following actions, which it is assumed that the RDP service is available.
are fully automated, on the Axis camera:
f Obtain valid RDP credentials using a dictionary
f Originally, the root ‘/’ directory is mounted in the read- attack against accounts with high privileges (a
only mode (RO). This limits the amount of non-volatile custom tool developed by Attacker is used) 1.
disk space available to Attacker to only a few megabytes.
Therefore, ‘/’ is re-mounted in the read-and-write (RW) f If successful, create an SSH tunnel between the
mode, allowing uploads of large files and keeping them attacker machine and the RDP machine (Victim1, as per
on the disk. Figure 6), making the camera act as a proxy server.
f Start a local web server (Attacker’s machine) to upload f Mount a folder from the attacker’s machine
files to the camera. These files include the busybox to the RDP machine (Victim1) for dropping the
utility, and Attacker-developed scripts and binaries. R4IoT executables and auxiliary files.
f By default, SSH connections to Axis are disabled. Once having RDP access to Victim1, Attacker manually
Therefore, Attacker enables sshd and creates a new user disables the Windows Firewall and any antivirus or defense
with root privileges (so that if something goes wrong, software. Then, they copy the R4IoT executables and
Attacker may still retain control over the camera). auxiliary files to Victim1 and run the lateral movement
executable. Figure 7 shows a screenshot from the Attacker’s
f Find active network connections from hosts of the machine: the Initial Access executable has been successfully
Corporate Network to Axis (using netstat). Attacker executed and the Attacker can start deploying R4IoT.
assumes that there will be a Windows machine connected
1
We want to land on a user account that allows us to disable endpoint security tools on the Victim1 machine and to initiate connections
towards a domain controller. We do not try to detect user privileges automatically because the Attacker will interact the Victim1 machine
and deduce that.
VEDERE LABS 15
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
To further illustrate how IoT devices can be used We used a Zyxel network-attached storage (NAS)
for initial access in ransomware operations, we device (Zyxel NAS326) that runs embedded Linux on
have explored an alternative scenario, in which, an ARM processor. The device is affected by CVE-
instead of the Axis camera, the attacker finds 2020-9054, a pre-authentication command injection
another IoT device exposed to a public network. vulnerability, which may allow a remote, unauthenticated
attacker to execute arbitrary code on the device.
We have discovered that remote commands launched Figure 8 illustrates that the “executer_su” binary is owned by
via CVE-2020-9054 are executed with the same privileges the root user. It also shows that the binary is just a wrapper
as the webserver’s user “nobody”. It is a special Linux around the “execv()” call that executes any command, and it
user that does not own any files and has no special also contains a call “setuid(0)”, which sets the effective user
privileges. However, the vulnerability description mentions ID of the calling process to the owner of the binary (root).
the “setuid utility”, which can be used for privilege
escalation. By analyzing the firmware files, we found Considering the above, we have modified the original
the “executor_su” binary that is common to various IoT exploit for CVE-2020-9054 to execute remote commands
devices and is commonly used for privilege escalation. through the “executer_su” binary, but the rest of the
(We have seen some evidence suggesting that Mukashi, attack is performed exactly as with the Axis camera.
the newer version of the Mirai malware, used the
same technique for weaponizing this vulnerability.)
VEDERE LABS 16
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
VEDERE LABS 17
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
The NTLM hash format is composed of the following: follows the format ‘ACCOUNT_NAME:RELATIVE_ID:NT_
(1) an account name string; (2) a relative ID number; HASH:LM_HASH:::’. In our case, for example, the domain
and (3) a concatenation of the NT and LM hashes. It administrator’s account has the following hash:
In addition to dumping NTLM hashes, “secretsdump.py” part of the domain forest governed by the compromised
extracts Kerberos keys from the DC. Such keys are handy DC. This allows use of the DC server to retrieve the IP
because they contain the machine names, which are addresses of these machines with DNS queries.
7.2.3 Impact
Apart from the lateral movement executable, f Cryptominer executable – a client for mining
R4IoT includes the following components: a cryptocurrency. Its purpose is to hijack the
computational resources of the victim machine
f C&C Agent executable that reports back to C&C and use them in favor of Attacker.
Server and runs local commands based on instructions
received from C&C Server. This executable is f Memoria executable that will launch DoS
automatically started on every Windows machine attacks against critical IoT/OT assets.
that the lateral movement executable can reach.
VEDERE LABS 18
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
Figure 10 shows that after the lateral movement First, Attacker may choose to exfiltrate data from a
executable is done, there are two victim machines that victim machine. For example, Figure 10 shows that
report back to C&C Server. For example, by using the launching the “attack exfil” command against one
“heartbeat” command, Attacker can retrieve the name of the C&C Agents will enumerate text files on the
of the compromised machine, the process ID of C&C victim and send them to C&C Server. There might be
Agent running on that machine and the name of the sensitive information 3 of interest to Attacker.
user with whose privileges C&C Agent was started.
2
We would like to thank Dimitry Snezhkov for providing this useful toolkit to the community. To learn more, please watch this DEFCON
presentation at https://www.youtube.com/watch?v=VJ8aqReB118 or visit the Github page of the tool at https://github.com/dsnezhkov/
racketeer.
3
For our exercise, we only retrieve text files and send them to an FTP server hosted on C&C Server. This functionality can be further extended
to perform targeted searches for data of interest, as well as to decrease the detectability of data exfiltration.
VEDERE LABS 19
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
7.2.3.2 Encryption
After the sensitive information has been retrieved, Attacker posted. Upon receiving a corresponding command, C&C
will proceed with encrypting sensitive files and posting a Agent will create hundreds of text files on a desktop of
ransom notice. Figure 12 shows some of the sensitive files every user of the machine. These text files will contain
being encrypted, and Figure 13 shows the ransom notice the same ransom notice with demands of payment.
VEDERE LABS 20
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
VEDERE LABS 21
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
4
The network scanner is based on: https://github.com/Forescout/project-memoria-detector
5
Our lab has several devices affected by Nucleus:13 (see https://www.forescout.com/research-labs/nucleus-13/).
VEDERE LABS 22
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
8 Command and Control Ingress Tool Transfer Windows share (SMB through RDP)
Exploitation of remote
10 Lateral Movement ZeroLogon (CVE-2020-1472)
services
OS Credential Dumping:
11 Credential Access Secretsdump.py
NTDS
VEDERE LABS 23
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
f Identification and Protection are possible because Table 2 uses the R4IoT TTPs (described in Section 7.3) and
there are hundreds of very similar attacks happening the NIST Cybersecurity Framework key functions to present
simultaneously currently. For instance, Conti was one mitigation steps for complex ransomware threats. We focus
of the most successful ransomware gangs in 2021 on network-based mitigation, so we have removed steps
with more than 400 successful attacks on U.S. and that depend exclusively on endpoint behavior (2, 9, 11, 15,
international organizations. That means it is possible 17) or that represent legitimate network behavior (8, 12).
to identify devices and vulnerabilities being actively
exploited so their protection can be prioritized.
TACTIC AND
# PROCEDURE IDENTIFY PROTECT DETECT RESPOND
TECHNIQUE
Identify vulnerable Detect command
CVE-2018-10660 Patch vulnerable Temporarily
Initial Access – devices injections via protocols
CVE-2018-10661 devices quarantine device in
1 Exploit public-facing such as HTTP
CVE-2018-10662 Monitor inbound and VLAN or disconnect it
application Segment the network to
CVE-2020-9054 outbound traffic from/ Detect breaches of
prevent external access from the network
to vulnerable devices segmentation policies
Implement policies
Detect deviations
for password strength
of network
and expiration
communications Temporarily
Credential Access Implement Multi-Factor baseline
Identify hosts with quarantine device in
4 – Brute Force: Bespoke Cracker Authentication
weak credentials Detect RDP VLAN or disconnect it
Password Guessing
Segment the network to brute forcing from the network
prevent communication
Detect breaches of
between IoT and
segmentation policies
IT devices
VEDERE LABS 24
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
TACTIC AND
# PROCEDURE IDENTIFY PROTECT DETECT RESPOND
TECHNIQUE
Defense Evasion –
Enforce compliance
Impair Defenses: Manually Disable Identify security tools Detect change of fire-
7 policy: firewall should Enable firewall
Disable or Modify Windows Firewall running on hosts wall state to disabled
be always turned on
System Firewall
Temporarily quaran-
Lateral Movement Patch vulnera-
ZeroLogon (CVE- Identify vulner- ble servers Detect Zerologon tine server in VLAN
10 – Exploitation of
2020-1472) able servers exploitation attempts or disconnect it from
Remote Services Enforce update policy
the network
Detect known
malicious processes
Integrate with EDR Keep an up-to-date running on endpoint
Impact – Resource
18 XMRig solution to identify list of known mali- Kill malicious process
Hijacking Detect network traffic
running processes cious processes
related to crypto-
currency mining
Detect exploitation
Patch devices Temporarily quaran-
attempts (buffer
Impact – Endpoint Identify vulner- Segment the network overflows) tine device in VLAN
20 CVE-2021-31886
Denial of Service able devices to isolate vulnerable or disconnect it from
Detect breaches of
critical devices the network
segmentation policies
VEDERE LABS 25
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
VEDERE LABS 26
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
Table 3 illustrates the segments and the segmentation represent unallowed communications. We omitted
policies we have in place. Slate cells represent potential granular rules for other types of devices
allowed communications, whereas orange cells grouping them as ‘Rest’ for the sake of simplicity.
EXTERNAL
DESTINATION ENTERPRISE BAS
NETWORKS 6
ICS MEDICAL
OT
AD Trusted IP
SOURCE Internet Office Rest admin- Rest
servers NVRs cameras
istration
Internet N/A
NETWORKS
EXTERNAL
Office
Rest
AD
ENTERPRISE
servers
OT admin-
istration
Trusted
NVRs
ICS
MEDICAL
Rest
BAS
IP
cameras
6
No such segment exists in our setup; we use the name as an abstraction.
VEDERE LABS 27
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
VEDERE LABS 28
RESEARCH REPORT | R4IoT: NEXT-GENERATION RANSOMWARE
9. Conclusion
Ransomware has been the most prevalent threat of
the past few years, and so far, it has mostly leveraged
vulnerabilities in traditional IT equipment to cripple
organizations. But new connectivity trends have
added a number and a diversity of OT and IoT devices
that have increased risk in nearly every business.
www.forescout.com/research-labs/ [email protected]
29