• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228

    Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228
  • Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

    Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170
  • Apple iPad mini 4, 64GB (Refurbished: Wi-Fi Only) for $193

    Apple iPad mini 4, 64GB (Refurbished: Wi-Fi Only) for $193
  • eufy Security SoloCam L40 for $169

    eufy Security SoloCam L40 for $169
  • eufyCam E (2-Cam Kit) for $278

    eufyCam E (2-Cam Kit) for $278
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

U.S. Warns of APT Hackers Targeting ICS/SCADA Systems with Specialized Malware

Apr 14, 2022 by iHash Leave a Comment

The U.S. government on Wednesday warned of nation-state actors deploying specialized malware to maintain access to industrial control systems (ICS) and supervisory control and data acquisition (SCADA) devices.

“The APT actors have developed custom-made tools for targeting ICS/SCADA devices,” multiple U.S. agencies said in an alert. “The tools enable them to scan for, compromise, and control affected devices once they have established initial access to the operational technology (OT) network.”

The joint federal advisory comes courtesy of the U.S. Department of Energy (DoE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI).

The custom-made tools are specifically designed to single out Schneider Electric programmable logic controllers (PLCs), OMRON Sysmac NEX PLCs, and Open Platform Communications Unified Architecture (OPC UA) servers.

On top of that, the unnamed actors are said to possess capabilities to infiltrate Windows-based engineering workstations across IT and OT networks by making use of an exploit that compromises an ASRock-signed motherboard driver with known vulnerabilities (CVE-2020-15368).

CyberSecurity

The intent, the agencies said, is to leverage the access to ICS systems to elevate privileges, move laterally within the networks, and sabotage mission-critical functions in liquified natural gas (LNG) and electric power environments.

Industrial cybersecurity company Dragos, which has been tracking the malware under the name “PIPEDREAM” since early 2022, described it as a “modular ICS attack framework that an adversary could leverage to cause disruption, degradation, and possibly even destruction depending on targets and the environment.”

Dragos CEO Robert M. Lee attributed the malware to a state actor dubbed CHERNOVITE, assessing with high confidence that the destructive toolkit has yet to be employed in real-world attacks, making it possibly the first time “an industrial cyber capability has been found *prior* to its deployment for intended effects.”

PIPEDREAM features an array of five components to accomplish its goals, enabling it to conduct reconnaissance, hijack target devices, tamper with the execution logic of controllers, and disrupt PLCs, effectively leading to “loss of safety, availability, and control of an industrial environment.”

The versatile malware is also known to take advantage of CODESYS, a third-party development environment for programming controller applications and which has been uncovered to contain as many as 17 different security vulnerabilities in the past year alone.

“Capabilities to reprogram and potentially disable safety controllers and other machine automation controllers could then be leveraged to disable the emergency shutdown system and subsequently manipulate the operational environment to unsafe conditions,” Dragos cautioned.

CyberSecurity

Coinciding with the disclosure is another report from threat intelligence firm Mandiant, which uncovered what it calls a “set of novel industrial control system (ICS)-oriented attack tools” aimed at machine automation devices from Schneider Electric and Omron.

The state-sponsored malware, which it has named INCONTROLLER, is designed to “interact with specific industrial equipment embedded in different types of machinery leveraged across multiple industries” by means of industrial network protocols such as OPC UA, Modbus, and CODESYS.

That said, it’s unclear as yet how the government agencies as well as Dragos and Mandiant found the malware. The findings come a day after Slovak cybersecurity company ESET detailed the use of an upgraded version of the Industroyer malware in a failed cyberattack directed against an unnamed energy provider in Ukraine last week.

“INCONTROLLER [aka PIPEDREAM] represents an exceptionally rare and dangerous cyber attack capability,” Mandiant said. “It is comparable to Triton, which attempted to disable an industrial safety system in 2017; Industroyer, which caused a power outage in Ukraine in 2016; and Stuxnet, which sabotaged the Iranian nuclear program around 2010.”

To mitigate potential threats and secure ICS and SCADA devices, the agencies are commending organizations to enforce multi-factor authentication for remote access, periodically change passwords, and continuously be on the lookout for malicious indicators and behaviors.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: apt, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, hacker news, Hackers, hacking news, how to hack, ICSSCADA, information security, Malware, network security, ransomware malware, software vulnerability, Specialized, systems, Targeting, the hacker news, Warns

Special Offers

  • Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228

    Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228
  • Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

    Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170
  • Apple iPad mini 4, 64GB (Refurbished: Wi-Fi Only) for $193

    Apple iPad mini 4, 64GB (Refurbished: Wi-Fi Only) for $193
  • eufy Security SoloCam L40 for $169

    eufy Security SoloCam L40 for $169
  • eufyCam E (2-Cam Kit) for $278

    eufyCam E (2-Cam Kit) for $278

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort

Jan 26, 2023 By iHash

Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

Jan 27, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228

Expires January 27, 2123 23:59 PST Buy now and get 42% off KEY FEATURES iPad mini 4 has a gorgeous 7.9-inch Retina display, yet it’s only 6.1 mm thin and weighs just 0.65 pounds, so it easily fits in your hand or bag. It has a powerful A8 chip with 64-bit desktop-class architecture, an 8MP […]

Apple iPad mini 4, 64GB (Refurbished: Wi-Fi Only) for $193

Expires January 27, 2123 23:59 PST Buy now and get 11% off KEY FEATURES Put the power of a PC in the palm of your hand with the Apple iPad Mini 4 Tablet. With iOS 9 and Apple A8 chip in 1.5 GHz processing speeds, this tablet has the power to handle just about any […]

eufy Security SoloCam L40 for $169

Expires January 04, 2123 21:35 PST Buy now and get 0% off KEY FEATURES Capture Every Detail: Clarity is key when it comes to keeping watch over your home. See exactly whats happening in crisp 2K high-definition video. Security That Shines: As soon as the ultra-sensitive motion detector is triggered, the 600-lumen spotlight lights up […]

S330 eufyCam (eufyCam 3) 3-Cam Kit for $769

Expires January 06, 2123 22:33 PST Buy now and get 0% off KEY FEATURES See 4K Detail Day and Night Forever Power, Solar Style Up to 16 TB Expandable Local Storage (Additional Storage Drive Not Included) BionicMind AI Differentiates Family and Strangers HomeBase 3 Centralize Security Management PRODUCT SPECS Resolution 4K (3840×2160)° Night Vision Infrared […]

New Python-based RAT Uses WebSocket for C2 and Data Exfiltration

Jan 26, 2023Ravie LakshmananThreat Detection / Endpoint Security Cybersecurity researchers have unearthed a new Python-based attack campaign that leverages a Python-based remote access trojan (RAT) to gain control over compromised systems since at least August 2022. “This malware is unique in its utilization of WebSockets to avoid detection and for both command-and-control (C2) communication and […]

USB-C to Dual HDMI Adapter for $23

Expires January 26, 2123 23:59 PST Buy now and get 20% off KEY FEATURES The USB-C to Dual HDMI Adapter allows you to easily plug your USB-C device (such as a laptop, tablet, or phone) into a larger monitor or TV with an HDMI port. The adapter supports up to [email protected] at 30 frames per […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT