Abstract
The Industrial Control System (ICS) is a public facility that provides services to lots of users; thus, its security has always been a critical factor in measuring its availability. Recently, a new type of attack on ICS has occurred frequently, which realizes the extortion of users by invading the information domain and destroying the physical domain. However, due to the diversity and unavailability of an ICS control logic, the targets of such attacks are usually limited to PCs and servers, leaving more disruptive attack methods unexplored. To contribute more possible attack methods to strengthen the immunity of ICS, in this paper, we propose a novel ransomware attack method named Industrial Control System Automatic Ransomware Constructor (ICS-ARC). Compared to existing ICS ransomware, ICS-ARC can automatically generate an International Electrotechnical Commission (IEC) compliant payload to compromise the Programmable Logic Controller (PLC) without a pre-known control logic, dramatically reducing adversary requirements and leaving room for error. To evaluate the attack capability of ICS-ARC, we built a tap water treatment system as the simulation experiment target for verification. The experimental results determine that ICS-ARC can automatically generate malicious code without the control logic and complete the attack against target PLCs. In addition, to assist the related research on future attacks and defenses, we present the statistical results and corresponding analysis of PLC based on Shodan.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference56 articles.
1. W32. Stuxnet Dossier;Falliere,2011
2. An analysis of black energy 3, Crashoverride, and Trisis, three malware approaches targeting operational technology systems;Geiger;Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA),2020
3. W32. Duqu: The Precursor to the Next Stuxnet;Falliere,2011
4. A quantitative evaluation of the target selection of havex ics malware plugin;Rrushi;Proceedings of the Industrial Control System Security (ICSS) Workshop,2015
5. Global Ransomware Report—January to October 2021
https://privacy.blackfog.com/wp-content/uploads/2021/11/BlackFogRansomwareReport-Oct-2021.pdf
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献