FireEye Finds New Clues in TRITON/TRISIS Attack

  /     /     /  
Publicated : 22/11/2024   Category : security


FireEye Finds New Clues in TRITON/TRISIS Attack


Attackers behind the epic industrial-plant hack reverse-engineered the safety-monitoring systems proprietary protocol, researchers found.



Researchers from FireEye have found proof that the hackers who breached and inadvertently shut down a safety monitoring system in a Middle East industrial plant reverse-engineered the protocol software.
Instead of just being a theory that they reverse-engineered something or used legitimate resources to augment their development on it, now we have evidence that supports that, says Steve Miller, a researcher with FireEye who made the discovery after studying the malwares Python scripts.
The so-called
TRITON/TRISIS attack
 targeted Schneider Electrics emergency shutdown system – Triconex Tricon – with custom malware. Two of the plants safety-instrumented systems (SIS) controllers entered a failed safe mode that shut down the industrial process and ultimately led to last years discovery of the malware.
Schneider Electric later discovered a zero-day privilege-escalation vulnerability in its Triconex Tricon safety-controller firmware that it says helped the attackers wrest control of the emergency shutdown system. They also found a remote access Trojan (RAT) in the TRITON/TRISIS malware that they say represents the first-ever RAT to infect SIS equipment.
SISes monitor critical systems to ensure they are operating within acceptable safety thresholds; when they are not, the SIS automatically shuts them down. Schneiders proprietary TriStation UDP network communications protocol is used by the TriStation application to configure the Triconex SIS controllers.
While recently studying the TRITON/TRISIS malware frameworks implementation of the legitimate protocol, FireEye researchers noticed that the malwares TriStation version drew some of its capabilities from the legitimate Triconex software. There also were some sloppy elements of the attackers version of TriStation, including some typos, Miller notes.
They didnt know enough about the specific function of the protocol code, he says.
Just how the attackers got their hands on the TriStation software remains unclear, Miller says. We found these items on VirusTotal, he says of the code his team studied. FireEye initially had theorized that the attackers had purchased a Triconex controller and software for their own use and reverse-engineering. If they did, though, the software didnt give them the intel to know which firmware version the targeted plant was running.
Dragos researcher Reid Wightman, whose team also has been studying the attack, applauds FireEye’s findings and says they raise some interesting questions. The attackers, he says, likely had to have the hardware to test and create the TRISIS/TRITON malware and appear to have reverse-engineered the TriStation 1131 software in order to glean intel on the TriStation protocol. But his team doesnt believe the attackers obtained TriStations Python library from a vendor.
Due to some oddities in the implementation of the protocol in the TRISIS malware, we have some doubts that the software came from an ICS vendor, Wightman says. We would expect a commercially developed library for the protocol to be more fully implemented, while the TRISIS implementation is really doing the bare minimum – only pulling out the fields that are absolutely required to do a logic update and pull off the exploit.
The attackers likely wrote the Python code themselves, after reverse-engineering the TriStation 1131 software, which is available for purchase online, Wightman says.
Sharing Intel
Andrew Kling, Schneider Electrics director of cybersecurity and software practices, says TRITON/TRISIS was a sophisticated targeted attack that only a well-resourced attacker could pull off.
This was a highly complex, detailed, and targeted attack that could only have been executed by someone with incredible resources at their disposal, Kling says. It remains a call to action for industry and reinforces the need for industrywide collaboration, transparency, and culture change to ensure our most critical infrastructure and volatile operations are secure from attack.
Thats why its key for researchers to share their analyses of this attack, as well as others, according to Kling. He says his company continues to call vendors, users, third-party providers, integrators, standards bodies, industry groups, and government agencies to develop a new approach to ensure legacy and new technologies are able to withstand increasingly sophisticated attacks.
Sharing intel on the TRITON/TRISIS attack is what FireEye wants, too. [
Our new research
] is just one dataset and aperture into this, Miller says. FireEye wants to work with other researchers and compare findings, he adds.
Miller also says he was surprised to see how relatively simple it was to develop software mimicking TriStation. Im not an ICS expert, he says, but he and his team were able to discern how TriStation works using Triton relatively quickly. We picked this up a month-and-a-half ago. If it was easy for us using public knowledge, one might wonder what a professional, state-sponsored attacker can do.  
Even so, the attackers behind TRITON/TRISIS somehow stumbled, causing their malware to inadvertently shut down the emergency shutdown systems and ultimately expose the malware. What appeared to be an attempt to wreak some sort of cyber-physical damage failed, according to experts who studied the attack. 
They had problems. Its plausible that was because they were still testing [the malware], Miller says.
Related Content:
TRITON Attacker Disrupts ICS Operations, While Botching Attempt to Cause Physical Damage
Industrial Safety Systems in the Bullseye
Lessons From The Ukraine Electric Grid Hack
6 Ways Third Parties Can Trip Up Your Security
 
 
Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for 
more information

Last News

▸ New threat discovered: Mobile phone ownership compromised. ◂
Discovered: 23/12/2024
Category: security

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
FireEye Finds New Clues in TRITON/TRISIS Attack