The security agencies of the US government, “CISA, FBI, DOE, and NSA,” have recently released a joint security advisory that alerts about the ongoing attacks against the industrial control systems (ICS) and SCADA devices using malware by the state-sponsored hacking groups.
Here’s what the security agencies have stated:-
“The APT actors have developed custom-made tools for targeting ICS/SCADA devices. The tools enable them to scan for, compromise, and control affected devices once they have established initial access to the operational technology (OT) network.”
All the custom-made malicious tools were particularly designed by the threat actors to target the:-
In addition to this, researchers from the DOE, NSA, CISA, and FBI have discovered that the state-sponsored hackers were also exploiting the:-
It is believed that by exploiting this flaw, the attackers targeted Windows systems with motherboards from ASRock and ransomed malicious code to them, allowing them to spread laterally into OT and IT environments and disrupt them.
APT actors can escalate privileges within an OT environment, move laterally within an OT backdrop, and disrupt critical devices or functions by compromising and maintaining full system access to ICS/SCADA devices.
Moreover, what is notable is that no further information has been given by the federal agencies on the hacking tools or malware that are used by the threat actors and mentioned in the advisory.
The co-founder and CEO of industrial cybersecurity firm Dragos, Robert M. Lee stated:-
“Since the discovery of these malicious tools in early 2022, the company has been tracking them under the name PIPEDREAM (aka INCONTROLLER).”
Dragos has identified this new malware as the seventh ICS-specific malware that has ever been found to have been developed by the CHERNOVITE Activity Group (AG).
By exploiting the PIPEDREAM, the threat actors can control and manipulate several industrial software and industrial control PLCs. And among them, some of the most common are:-
Aside from these, by abusing the PIPEDREAM, an attacker can also execute attacks against widely used Industrial Internet technologies like:-
It is very important that critical infrastructure organizations, especially those in the Energy Sector, implement the detection and mitigation recommendations that are provided by the federal government agencies DOE, CISA, NSA, and the FBI.
Here below, we have mentioned all the mitigations provided:-
The security agencies of the US government, “CISA, FBI, DOE, and NSA,” have recently released a joint security advisory that alerts about the ongoing attacks against the industrial control systems (ICS) and SCADA devices using malware by the state-sponsored hacking groups.
Here’s what the security agencies have stated:-
“The APT actors have developed custom-made tools for targeting ICS/SCADA devices. The tools enable them to scan for, compromise, and control affected devices once they have established initial access to the operational technology (OT) network.”
Targets
All the custom-made malicious tools were particularly designed by the threat actors to target the:-
Infection chain
In addition to this, researchers from the DOE, NSA, CISA, and FBI have discovered that the state-sponsored hackers were also exploiting the:-
It is believed that by exploiting this flaw, the attackers targeted Windows systems with motherboards from ASRock and ransomed malicious code to them, allowing them to spread laterally into OT and IT environments and disrupt them.
APT actors can escalate privileges within an OT environment, move laterally within an OT backdrop, and disrupt critical devices or functions by compromising and maintaining full system access to ICS/SCADA devices.
ICS devices were targeted by the malware
Moreover, what is notable is that no further information has been given by the federal agencies on the hacking tools or malware that are used by the threat actors and mentioned in the advisory.
The co-founder and CEO of industrial cybersecurity firm Dragos, Robert M. Lee stated:-
“Since the discovery of these malicious tools in early 2022, the company has been tracking them under the name PIPEDREAM (aka INCONTROLLER).”
Dragos has identified this new malware as the seventh ICS-specific malware that has ever been found to have been developed by the CHERNOVITE Activity Group (AG).
By exploiting the PIPEDREAM, the threat actors can control and manipulate several industrial software and industrial control PLCs. And among them, some of the most common are:-
Aside from these, by abusing the PIPEDREAM, an attacker can also execute attacks against widely used Industrial Internet technologies like:-
Mitigations
It is very important that critical infrastructure organizations, especially those in the Energy Sector, implement the detection and mitigation recommendations that are provided by the federal government agencies DOE, CISA, NSA, and the FBI.
Here below, we have mentioned all the mitigations provided:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…
According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…
A critical security flaw in NVIDIA's Riva framework, an AI-powered speech and translation service, has…
CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative…
A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active…
A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to…