viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
US uncovers “Swiss Army knife” for hacking industrial control systems
Technology

US uncovers “Swiss Army knife” for hacking industrial control systems

14/04/2022

US uncovers “Swiss Army knife” for hacking industrial control systems

cravetiger | Getty Images

Malware designed to target industrial control systems like power grids, factories, water utilities, and oil refineries represents a rare species of digital badness. So when the United States government warns of a piece of code built to target not just one of those industries, but potentially all of them, critical infrastructure owners worldwide should take notice.

On Wednesday, the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the NSA, and the FBI jointly released an advisory about a new hacker toolset potentially capable of meddling with a wide range of industrial control system equipment. More than any previous industrial control system hacking toolkit, the malware contains an array of components designed to disrupt or take control of the functioning of devices, including programmable logic controllers (PLCs) that are sold by Schneider Electric and OMRON and are designed to serve as the interface between traditional computers and the actuators and sensors in industrial environments. Another component of the malware is designed to target Open Platform Communications Unified Architecture (OPC UA) servers—the computers that communicate with those controllers.

“This is the most expansive industrial control system attack tool that anyone has ever documented,” says Sergio Caltagirone, the vice president of threat intelligence at industrial-focused cybersecurity firm Dragos, which contributed research to the advisory and published its own report about the malware. Researchers at Mandiant, Palo Alto Networks, Microsoft, and Schneider Electric also contributed to the advisory. “It’s like a Swiss Army knife with a huge number of pieces to it.”

Advertisement

Dragos says the malware has the ability to hijack target devices, disrupt or prevent operators from accessing them, permanently brick them, or even use them as a foothold to give hackers access to other parts of an industrial control system network. He notes that while the toolkit, which Dragos calls “Pipedream,” appears to specifically target Schneider Electric and OMRON PLCs, it does so by exploiting underlying software in those PLCs known as Codesys, which is used far more broadly across hundreds of other types of PLCs. This means that the malware could easily be adapted to work in almost any industrial environment. “This toolset is so big that it’s basically a free-for-all,” Caltagirone says. “There’s enough in here for everyone to worry about.”

The CISA advisory refers to an unnamed “APT actor” that developed the malware toolkit, using the common acronym APT to mean advanced persistent threat, a term for state-sponsored hacker groups. It’s far from clear where the government agencies found the malware, or which country’s hackers created it—though the timing of the advisory follows warnings from the Biden administration about the Russian government making preparatory moves to carry out disruptive cyberattacks in the midst of its invasion of Ukraine.

Dragos also declined to comment on the malware’s origin. But Caltagirone says it doesn’t appear to have been actually used against a victim—or at least, it hasn’t yet triggered actual physical effects on a victim’s industrial control systems. “We have high confidence it hasn’t been deployed yet for disruptive or destructive effects,” says Caltagirone.

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

Deepfakes may not have upended the 2020 U.S. election, but their day is coming
Some polls predicting results of the U.S. 2020 presidential election …

How AI predictions fared against pollsters in the 2020 U.S. election

Orchard raises $69 million to develop machine learning for buying and selling homes
Orchard has raised $69 million to further develop simplify the …

Orchard raises $69 million to develop machine learning for buying and selling homes

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • Microsoft is seeing a big spike in Web shell use
    Microsoft is seeing a big spike in …
    12/02/2021
  • Imagination Technologies launches GPUs for smart car displays
    Imagination Technologies launches GPUs for smart car …
    08/07/2020
  • China’s Didi Chuxing says ride-hailing orders are back to pre-pandemic levels
    China’s Didi Chuxing says ride-hailing orders are …
    08/06/2020
  • The DeanBeat: Diversity is a long game
    The DeanBeat: Diversity is a long game
    05/06/2020
  • Beat Saber is now an Oculus studio after Facebook acquisition
    Amazon quietly publishes its latest transparency report
    31/01/2020

Popular Posts

  • Omnipotent BMCs from QCT remain vulnerable to critical Pantsdown threat
    Omnipotent BMCs from QCT remain vulnerable to …
    26/05/2022 0
  • Russia wages “relentless and destructive” cyberattacks to bolster Ukraine invasion
    Russia wages “relentless and destructive” cyberattacks to …
    27/04/2022 0
  • 10 of the Most Random Reality Shows …
    28/04/2022 0
  • 10 More Modern Conveniences That Met with …
    28/04/2022 0
  • One of the most powerful DDoSes ever targets cryptocurrency platform
    One of the most powerful DDoSes ever …
    28/04/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh