OT Cyber Attack Workshop [ Case Study 06 ]: Replay Attack on Safety Surveillance Camera
This week we will introduce the sixth workshop case study : Replay Attack on Railway Station Train Docking Safety Surveillance Camera System. We will comprehensively cover the attack tactics, techniques, and procedures (TTPs) and will include practical demonstrations on the effort of the replay attack, the whole attack scenario also includes the FCI attack and firmware attack which introduced in the previous case studies. If you are interested about other case study, please refer to below links:
Program Design Purpose: The objective of this cyber attack case study is to develop a workshop aimed at showcasing a practical demonstration of a replay attack on a station train docking safety surveillance camera within a railway OT-system. In the attack scenario, the replay attack is executed by a sophisticated cyber attacker within the OT system, exploiting a successful camera firmware attack. Specifically, the attack targets the train detection camera located in the station docking area, which serves as a crucial safety mechanism for the train surveillance system. The scenario involves a red team attacker implanting malicious firmware into the train detection camera, thereby compromising its functionality. This compromised camera is then used to capture video footage, which is subsequently replayed and sent back to the station control room. The goal of this attack is to disrupt the safety surveillance system and deceive the station operator, highlighting the vulnerabilities inherent in OT systems and the potential impact of cyber attacks on critical infrastructure.
Attacker Vector : Firmware Attack, Replay Attack
Important : The demonstrated attack case is used for education and training for different level of IT-OT cyber security ICS course, please don't apply it on any real world system.
Attack Scenario Demo Video:
Introduction
This case study aims to create a simplified emulation of the railway train detection surveillance system, which serves as a dual safety mechanism within the train station's docking assistant system. The primary objective is to illustrate the potential impact of a replay attack on the system using this platform. The project comprises two principal sections:
Railway OT System Station Docking Assistant System Introduction
Within our railway OT system, each station's entrance docking area is equipped with two distinct sensors:
Both two sensors are tasked with detecting a train's movement as it enters the station. The system workflow is depicted in the image below:
When a train approaches a station and enters the docking preparation zone:
OT Station Docking Surveillance System Replay Attack Demo
The attack demo will focus on compromising the two safety mechanisms: the train motion detection sensor and the train object detection camera.
For the motion detection sensor connected to the PLC, the red team attacker can manipulate its sensor state through a false data injection attack.
For the train object detection camera, it is hard for hacker to modify the byte data in the video stream via man in the middle attack. Instead, the attacker will implement a firmware attack on the camera to establish a "backdoor." Subsequently, the following steps will be executed to conduct the replay attack:
The attack flow is shown below:
By combining the false data injection attack on the PLC and the replay attack on the camera, the red team attacker can disrupt the station docking assistant system, rendering the station HMI and operator unable to detect incoming trains for docking.
Key Tactics, techniques, and procedures (TTP) of Replay Attack
The tactics, techniques, and procedures (TTP) of a surveillance camera replay attack involve several steps that an attacker might take to intercept, manipulate, and replay video footage from a surveillance camera in an OT (Operational Technology) system.
Reconnaissance:
Interception and Analysis:
Replay:
Background Knowledge
In this section, we will introduce the basic knowledge of Replay Attack and Real Time Streaming Protocol which is used for sending the camera video to the train image CV detection computer.
领英推荐
Replay Attack
In OT system cyber attacks, the replay attack is frequently employed to target communication channels or control chains that utilize intricate protocols or handle large data flows. This method differs from traditional attack methods such as FDI/FCI (False Data Injection/False Command Injection) or Man-in-the-Middle (MitM) attacks. Instead of directly tampering with data or commands, a replay attack involves intercepting and retransmitting previously captured data packets. This approach can be particularly effective when dealing with complex protocols or high-volume data streams, allowing attackers to exploit vulnerabilities in the communication process without directly altering the transmitted information.
A replay attack is a type of network attack in which an attacker captures a valid network transmission and then retransmit it later. The main objective is to trick the system into accepting the retransmission of the data as a legitimate one. Additionally, replay attacks are hazardous because it’s challenging to detect. Furthermore, it can be successful even if the original transmission was encrypted.
An attacker can lunch a replay attack to gain unauthorized access to systems or networks. Furthermore, a replay attack can disrupt the regular operation of a system by inundating it with repeated requests. An attacker can plan to carry out this attack by intercepting and retransmitting data packets over a network. Additionally, a successful replay attack can be performed by replaying recorded audio or video transmissions.
A simple replay diagram is shown below:
Reference : https://www.baeldung.com/cs/replay-attacks
A replay attack on a camera in an OT (Operational Technology) system involves capturing video footage from the camera, altering it or replaying it, and then sending it back to deceive the system or its operators. This type of attack can have various implications depending on the specific application of the camera within the OT system.
Real Time Streaming Protocol
To make the replay attack can be easily implemented, the video protocol we use for the camera is the RTSP (unencrypted).
The Real-Time Streaming Protocol (RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams (such as interactive media, video and audio) over a suitable transport protocol. RTSP is used in entertainment and communications systems to control streaming media servers. RealNetworks developed RTSP in 1996, designed to control the entertainment and communication systems in a streaming server RTSP utilizes User Datagram Protocol (UDP) and Real-time Transport Protocol (RTP). RTSP is the standard protocol used for streaming video data from IP cameras and supports reliable segmented streaming, enabling users to watch streams while it's still being downloaded. The protocol also provides extensive customization options to help you build your own streaming applications and add new features. The main disadvantage of RTSP is that it isn't widely used for broadcasting multimedia over the Internet.
An example of RTSP in action with the video and audio data being delivered over a separate UDP-based RTP stream is shown below :
The protocol is used for establishing and controlling media sessions between endpoints. Clients of media servers issue commands such as play, record and pause, to facilitate real-time control of the media streaming from the server to a client (video on demand) or from a client to the server.
Project Design
In this section we will introduce how we design the Railway OT system station docking assistant system and the replay attack detail steps.
Design of Railway OT System Station Docking Assistant System
The train safety surveillance camera is constructed using a Raspberry Pi 3B+ equipped with a camera module. In the physical setup, preceding the designated slow-down zone of the railway station, two thermal reflection sensors are positioned. These sensors are linked to the PLC for train detection purposes. Adjacent to these sensors, our surveillance camera is installed to further detect approaching trains. The camera captures video footage, which is then transmitted to a dedicated video processing computer. Our program utilizes computer vision (CV) algorithms to perform both motion and train object detection.
The position of the camera and the sensor is shown below:
In our digital twin real-world emulator, we replicate this configuration faithfully. When a train passes through the sensor and camera detection area:
If either of the two speed values (speed-val-1 and speed-val-2) exceeds the designated train docking speed, the station control HMI issues a signal to instruct the train to decelerate.
The detail operation scenario is shown below :
Design of Surveillance Camera Replay Attack
As illustrated in the preceding introduction to the Railway OT system station docking assistant system workflow, two safety mechanisms are in place: the train motion detection sensor and the train object detection camera. Regarding the motion detection sensor connected to the PLC, a malicious actor can alter its state through a false data injection attack. However, manipulating the byte data in the video stream of the train object detection camera via a man-in-the-middle attack proves challenging for hackers. Therefore, the attacker opts to execute a firmware attack on the camera, creating a "backdoor" to facilitate the replay attack, following these steps:
The detail attack flow is shown below:
By employing the false data injection attack on the PLC and the replay attack on the camera, the red team attacker disrupts the station docking assistant system, rendering the station HMI and operator unable to detect approaching trains for docking.
To check the demo video, please refer to this link in my YouTube channel:
Online Video link: https://youtu.be/nTv7dcfjZts?si=h-ptx8jN6Gs1Q1JK
Thanks for reading, if you have any question and suggestion, please feel free to message me. Many thanks if you can give some comments and share any of the improvement advice so we can make our work better ~