TRITON Attack Targeted Critical Infrastructure, Security Firm Says

Robert Lemos covers cyber security for TechWeekEurope and eWeek

FireEye warns that a nation-state appears to be infiltrating critical-infrastructure sites and developing ways to cause physical damage

Online attackers infiltrated a critical-infrastructure network, compromising systems and deploying malware designed to manipulate a system that could have shut down industrial processes, security firm FireEye warned in an advisory published on Dec. 14.

FireEye did not identify the attacker or attribute the attack, which is dubbed TRITON, to any specific group, nor did it name the victim, but stated that evidence points to “a nation-state preparing for an attack.” The malware could have stopped the critical-infrastructure’s systems from properly responding, leading to real-world damages, the company warned.

“The targeting of critical infrastructure to disrupt, degrade, or destroy systems is consistent with numerous attack and reconnaissance activities carried out globally by Russian, Iranian, North Korean, U.S., and Israeli nation state actors,” FireEye researchers stated in their analysis. “Intrusions of this nature do not necessarily indicate an immediate intent to disrupt targeted systems, and may be preparation for a contingency.”

smart home meter wi-fi energy green network wireless © Horoscope Shutterstock

TRITON malware

Nation-states have become increasingly active in cyber operations. In 2010, the United States and Israeli hobbled Iran’s nuclear processing capability with the Stuxnet attack that caused damage to the critical centrifuges used in uranium processing. In 2016, attackers—thought to be Russian—caused a power outage in Ukraine, turning off the lights to nearly a quarter million people.

FireEye did not identify any nation-state as the likely aggressor, but said the company was moderately confident that the attacker is a government-sponsored group. “The targeting of critical infrastructure as well as the attacker’s persistence, lack of any clear monetary goal and the technical resources necessary to create the attack framework suggest a well-resourced nation state actor,” the company said.

Other security firms believe the target of the attack to be a Saudi Arabian firm, and the attackers to be Iranian. In 2012, the Shamoon attack—widely credited to Iran—infected systems at petroleum giant Saudi Aramco, and this attack seems to be a continuation of the online conflict, cyber-security expert Phil Neray of CyberX said in a statement.

Does IoT security concern you?

  • Yes (89%)
  • No (11%)

Loading ... Loading ...

“We have information that points to Saudi Arabia as the likely target of this attack, which would indicate Iran as the likely attacker,” he said. “This would definitely be an escalation of that threat because now we’re talking about critical infrastructure—but it’s also a logical next step for the adversary.”

 The TRITON malware can communicate with a proprietary industrial controller network known as the Triconex Safety Instrumented System (SIS). The attacker behind the malware camouflaged it as a program for the company’s application suite. Once the system was compromised, the attacker did not immediately try to damage the network, but instead appeared to try to develop new capabilities, including the ability to do physical damage using the malware, FireEye stated.
 
“We base this on the fact that the attacker initially obtained a reliable foothold on the DCS [distributed control system] and could have developed the capability to manipulate the process or shutdown the plant, but instead proceeded to compromise the SIS system,” the researchers stated. “Compromising both the DCS and SIS system would enable the attacker to develop and carry out an attack that causes the maximum amount of damage allowed by the physical and mechanical safeguards in place.”
Originally published on eWeek

Read also :