fected community. Furthermore, defensive measures
are proposed and IDS signatures created. As well as,
developed attack tools released publicly on GitHub.
Despite the security countermeasure existence and
fixes for the identified critical vulnerabilities being re-
leased, it cannot be determined when and if at all these
vulnerabilities would be patched or mitigated at the
industrial operator side. Therefore, cyber red team-
ing operations should be considered and executed at
a regular basis by the critical infrastructure owners to
address these issues.
Future work includes focusing on targeting the
IEC 61850 protocol stack and its implementation on
broad range of common vendor appliances.
ACKNOWLEDGMENTS
The author thanks NATO CCD CoE, CERT.LV, ICS-
CERT, and Martem. More specificly, Baiba Kašk-
ina and Raimo Peterson for supporting this work
with time and technical equipment, Priska Pietra for
analysing the PROFINET control data field, Art
¯
urs
Dan¸il¸
¯
evi
ˇ
cs for CVE-2018-10609, and Rain Ottis,
Risto Vaarandi and Olaf Maennel for valuable aca-
demic guidance and advise.
REFERENCES
Åkerberg, J. and Björkman, M. (2009a). Exploring net-
work security in profisafe. In Buth, B., Rabe, G., and
Seyfarth, T., editors, Computer Safety, Reliability, and
Security, pages 67–80, Berlin, Heidelberg. Springer
Berlin Heidelberg.
Åkerberg, J. and Björkman, M. (2009b). Exploring Security
in PROFINET IO. In 2009 33rd Annual IEEE Inter-
national Computer Software and Applications Confer-
ence, volume 1, pages 406–412.
Baud, M. and Felser, M. (2006). Profinet IO-Device Emu-
lator based on the Man-in-the-middle Attack. In 2006
IEEE Conference on Emerging Technologies and Fac-
tory Automation, pages 437–440.
Burtsev, A. G., Klishevich, D. M., and Polyanskii, A. V.
(2017). Protection of standard network protocols of
automated production control systems. Russian Engi-
neering Research, 37(3):224–232.
DHS ICS-CERT (2018). Advisory (ICSA-18-142-
01) Martem TELEM-GW6/GWM. https://ics-cert.
us-cert.gov/advisories/ICSA-18-142-01. Accessed:
04/06/2018.
Dondossola, G., Garrone, F., and Szanto, J. (2011). Cyber
risk assessment of power control systems – a metrics
weighed by attack experiments. In 2011 IEEE Power
and Energy Society General Meeting, pages 1–9.
FireEye (2018). Advanced Persistent Threat Groups.
Who’s who of cyber threat actors. https://www.
fireeye.com/current-threats/apt-groups.html. Ac-
cessed: 12/07/2018.
GReAT (2012). Shamoon the Wiper â
˘
A¸S Copycats
at Work. https://securelist.com/shamoon-the-wiper-
copycats-at-work/57854/. Accessed: 11/07/2018.
GReAT (2016). BlackEnergy APT Attacks in Ukraine
employ spearphishing with Word documents.
https://securelist.com/blackenergy-apt-attacks-
in-ukraine-employ-spearphishing-with-word-
documents/73440/. Accessed: 11/07/2018.
IEC (2006). Internationl Standard: IEC 60870-5-104.
Transmission protocols â
˘
A¸S Network access for IEC
60870-5-101 using standard transport profiles. 2nd
ed. 2006-06. https://webstore.iec.ch/preview/info_
iec60870-5-104%7Bed2.0%7Den_d.pdf. Accessed:
08/07/2018.
Knapp, E. and Langill, J. T. (2014). Industrial Network
Security. 2nd Edition. Elsevier.
Krekers, M. (2017). Assessing the Security of IEC 60870-5-
104 Implementations using Automata Learning. Mas-
ter’s thesis, University of Twente, Enschede, Nether-
lands.
Matoušek, P. (2017). Description and analysis of IEC 104
Protocol . Tecnical report, Brno University of Tech-
nology.
Maynard, P., McLaughlin, K., and Haberler, B. (2014). To-
wards Understanding Man-In-The-Middle Attacks on
IEC 60870-5-104 SCADA Networks. In Proceedings
of the 2Nd International Symposium on ICS & SCADA
Cyber Security Research 2014, ICS-CSR 2014, pages
30–42, UK. BCS.
NATO CCDCOE (2018a). Exercise Crossed Swords
Practised Cyber-Kinetic Operations in Latvia
. https://ccdcoe.org/exercise-crossed-swords-
practised-cyber-kinetic-operations-latvia.html.
Accessed: 04/06/2018.
NATO CCDCOE (2018b). Locked Shields 2018.
https://ccdcoe.org/largest-international-live-fire-
cyber-defence-exercise-world-be-launched-next-
week.html. Accessed: 14/07/2018.
Paul, A., Schuster, F., and König, H. (2013). Towards the
Protection of Industrial Control Systems – Conclu-
sions of a Vulnerability Analysis of Profinet IO. In
Rieck, K., Stewin, P., and Seifert, J.-P., editors, De-
tection of Intrusions and Malware, and Vulnerabil-
ity Assessment, pages 160–176, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Pfrang, S. and Meier, D. (2018). Detecting and preventing
replay attacks in industrial automation networks oper-
ated with profinet io. Journal of Computer Virology
and Hacking Techniques.
Pidikiti, D. S., Kalluri, R., Kumar, R. K. S., and Bind-
humadhava, B. S. (2013). SCADA communication
protocols: vulnerabilities, attacks and possible miti-
gations. CSI Transactions on ICT, 1(2):135–141.
Popp, M. and Wenzel, P. (2001). PROFInet-linking
worlds. In ETFA 2001. 8th International Conference
on Emerging Technologies and Factory Automation.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
98