Industrial control system malware discovered: US agencies

Industrial control system malware discovered: US agencies

Several federal organizations in the United States have issued a combined alert about a malicious cyber tool, a malware, manufactured by unknown people.

Its ability to acquire ‘full system access’ to many industrial control systems makes it extremely important.

On Wednesday, the FBI, the Departments of Energy and Homeland Security, as well as the National Security Agency, issued a public alert.

One step ahead

They did not elaborate on how they learned about it. They likewise described the weapons as “extremely rare and dangerous.”

“We’re actually one step ahead of the adversary. None of us want them to understand where they screwed up,” said Robert M Lee of Dragos. He is the CEO of another government partner. He was telling AP why the government would not explain how the malware came to light.   

The Cybersecurity and Infrastructure Security Agency likewise issued the alert.

In retaliation for the heavy economic penalties imposed on Moscow in reaction to its invasion of Ukraine on February 24, the US administration has cautioned vital infrastructure companies to prepare for probable Russian cyberattacks.

Officials have claimed that Russian hackers particularly have an interest in the US energy sector. CISA warned in a statement released Wednesday that the mitigating measures outlined in the alert should be taken seriously. Russian hackers allegedly searched at least five unnamed energy businesses for vulnerabilities, according to an FBI advisory released last month.

Pipedream malware

According to Lee, the malware was “designed to be a framework to go after lots of different types of industries and be leveraged multiple times. Based on the configuration of it, the initial targets would be LNG and electricity in North America.”

Ukraine, Nato members, and other governments aiding Kyiv in its fight against Russian military aggression, according to Mandiant, are the most vulnerable to the tools.

It added that malware may be useful to disable safety controls, shut down vital gear, and also damage industrial operations. Thereby, potentially resulting in the physical devastation of machinery and the loss of human life. It compared the tools to Triton. This malware had connections to a Russian government research institute. It targeted critical safety systems and forced the emergency shutdown of a Saudi oil refinery twice in 2017. It also compared to the tools to Industroyer. Russian military hackers used this malware to cause a power outage in Ukraine the previous year. (biergardenencinitas.com)

The newly found malware, dubbed Pipedream, is also just the seventh such malicious program to assault industrial control systems, according to Lee.

Exit mobile version