3,000 Industrial Plants Per Year Infected with Malware

  /     /     /  
Publicated : 22/11/2024   Category : security


3,000 Industrial Plants Per Year Infected with Malware


Targeted industrial control systems-themed malware is less prevalent yet persistent, including one variant posing as Siemens PLC firmware that has been in action since 2013, researchers find.



A piece of crimeware posing as legitimate Siemens PLC software has been in circulation for four years by an unknown attack group attempting to infect industrial networks mainly in the US.
The backdoor malware is packaged to appear as a Siemens programmable logic controller installer file, and around 10 industrial sites have reported coming across the targeted attack campaign, seven of which are located in the US as well as some in Europe and China, according to new research from Dragos.
It tries to fool operators into installing what they expect to be files related to their PLCs, but in fact, its a backdoor, says Robert M. Lee, founder and CEO of Dragos, a critical infrastructure security firm that today at the SANS ICS Summit released findings from its study of malware found in ICS networks.
Lee and his colleague Ben Miller, director of the Dragos Threat Operations Center, identified and analyzed malware cases associated with ICS networks, studying 15,000 malware samples from ICS environments over a three-month period. The researchers studied malware culled from public databases such as VirusTotal, where malware gets uploaded and tested against anti-malware products, as well as from Google searches and Doman Name Service (DNS) data.
Dragos so-called Malware in Modern ICS (MIMICS) project was meant to provide a gut-check on the actual types of malware hitting ICS environments today. The researchers were able to identify mostly everyday malware: no new Stuxnet-type targeted malware attacks. Even the Siemens-themed malware, while targeting ICS networks, still uses a crimeware-type backdoor piece of malware: nothing destructive or customized like Stuxnet, Havex, or BlackEnergy2.
The researchers found mostly common and easily spreadable malware samples had hit ICS networks: Sivis was by far the most prolific, with 15,863 detections, followed by Lamer (6,830), Ramnit (3,716), Sinwal (2,909), and other common malware families including Virut (1,814) and Sality (1,225). The researchers calculate that some 3,000 industrial sites per year get infected with this type of non-targeted, everyday malware, a figure they consider conservative since not all infected sites necessarily submit their malware to VirusTotal, for instance.
People expect Stuxnet 2.0 instead of obvious things [malware infections] happening, Lee says. Our hypothesis is that it doesnt take Stuxnet 2.0 to get into [industrial] facilities. Its more impactful if you can show traditional malware used to target ICS.
The targeted attacks they found besides the Siemens PLC-poser malware were not as widespread as the non-targeted malware. There were around 10 other such ICS-themed malware cases, Lee says. One such attack, dating back to 2011, was a phishing email targeting multiple nuclear sites in the West, but mainly in the US. We cant tell who was actually affected from the data set, Lee says. But we saw it did occur.
Lee says that the presence of any of this malware on ICS systems doesnt mean a manufacturing facility was shut down, or there was a nuclear meltdown. MIMICS findings shows actual data on what type of malware and attacks are hitting ICS plants. A lot of [plant owners] want to make user cases for security, he says. The hope is that this will cut through the hype and show that there are issues. 
More unnerving, however, was how many legitimate ICS files MIMICS discovered incorrectly flagged as malware in VirusTotal and other public sites, leaving those files exposed to abuse by cybercriminals or other threat actors looking for that type of intel to wage a targeted attack on an industrial site. They discovered thousands of legit ICS software programs including human machine interface installers, data historian installers, and key generators for the software, all up for grabs by bad guys.
Lee and Miller found some 120 project files that had been flagged as malicious and submitted to those public databases, including a Nuclear Regulatory Commission report, substation layout specifics and maintenance reports, and other types of sensitive information inadvertently posted publicly.
Pulling off a targeted and destructive attack on an ICS system in an industrial plant isnt so simple. It takes a fair amount of knowledge and understanding of the physical layout of the plant, as well as some knowledge of the industrial processes there. ICS security experts such as Ralph Langner of Langner Communications have argued that in order to execute a
cyber-physical attack
that causes damage to the plant or its processes, the attacker needs knowledge of the physical and engineering aspects of the targeted site. Thats a skillset that goes beyond malware and hacking, according to Langner.
But the legitimate files the Dragos team found online could be used as part of an intel- and reconnaissance operation by malicious attackers. They could get information on where the site was, what the asset owner was, the configuration and layout of the process, what equipment they are using, what software they have, for instance, Lee says. They could get a lot of information. It wouldnt necessarily give them the physical engineering information, but it would provide a good amount of information, he says.
An attacker would need to do a large amount of research to hack a plant, but finding this type of legitimate data as well as files on VirusTotal, for example, would shorten that research process by the attacker, Lee notes.
ICS security expert Joseph Weiss this week in
a blog post
pointed out that malware indeed is resident in ICS systems, so plant operators must focus on resilience and recovery from potential cyberattacks. Ensuring that critical control systems are not available on the Internet, as well as establishing secure software updates and limiting access to trusted users are among some of the protections these sites should employ, he noted.
Related Content:
Ex-US National Security Official Clarke: Regulation Key To Protecting ICS/SCADA From Cyberattacks
Lessons From The Ukraine Electric Grid Hack
Project SHINE Illuminates Sad State Of SCADA/ICS Security On The Net
 
 

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
3,000 Industrial Plants Per Year Infected with Malware