TRITON Attack Targeted Critical Infrastructure, Security Firm Says

Online attackers infiltrated a critical-infrastructure network, compromising systems and deploying malware designed to manipulate a system that could have shut down industrial processes, security firm FireEye warned in an advisory published on Dec. 14.

FireEye did not identify the attacker or attribute the attack, which is dubbed TRITON, to any specific group, nor did it name the victim, but stated that evidence points to “a nation-state preparing for an attack.” The malware could have stopped the critical-infrastructure’s systems from properly responding, leading to real-world damages, the company warned.

“The targeting of critical infrastructure to disrupt, degrade, or destroy systems is consistent with numerous attack and reconnaissance activities carried out globally by Russian, Iranian, North Korean, U.S., and Israeli nation state actors,” FireEye researchers stated in their analysis. “Intrusions of this nature do not necessarily indicate an immediate intent to disrupt targeted systems, and may be preparation for a contingency.”

TRITON malware

Nation-states have become increasingly active in cyber operations. In 2010, the United States and Israeli hobbled Iran’s nuclear processing capability with the Stuxnet attack that caused damage to the critical centrifuges used in uranium processing. In 2016, attackers—thought to be Russian—caused a power outage in Ukraine, turning off the lights to nearly a quarter million people.

FireEye did not identify any nation-state as the likely aggressor, but said the company was moderately confident that the attacker is a government-sponsored group. “The targeting of critical infrastructure as well as the attacker’s persistence, lack of any clear monetary goal and the technical resources necessary to create the attack framework suggest a well-resourced nation state actor,” the company said.

Other security firms believe the target of the attack to be a Saudi Arabian firm, and the attackers to be Iranian. In 2012, the Shamoon attack—widely credited to Iran—infected systems at petroleum giant Saudi Aramco, and this attack seems to be a continuation of the online conflict, cyber-security expert Phil Neray of CyberX said in a statement.

Does IoT security concern you?

  • Yes (89%)
  • No (11%)

Loading ...

“We have information that points to Saudi Arabia as the likely target of this attack, which would indicate Iran as the likely attacker,” he said. “This would definitely be an escalation of that threat because now we’re talking about critical infrastructure—but it’s also a logical next step for the adversary.”

The TRITON malware can communicate with a proprietary industrial controller network known as the Triconex Safety Instrumented System (SIS). The attacker behind the malware camouflaged it as a program for the company’s application suite. Once the system was compromised, the attacker did not immediately try to damage the network, but instead appeared to try to develop new capabilities, including the ability to do physical damage using the malware, FireEye stated.
“We base this on the fact that the attacker initially obtained a reliable foothold on the DCS [distributed control system] and could have developed the capability to manipulate the process or shutdown the plant, but instead proceeded to compromise the SIS system,” the researchers stated. “Compromising both the DCS and SIS system would enable the attacker to develop and carry out an attack that causes the maximum amount of damage allowed by the physical and mechanical safeguards in place.”
Originally published on eWeek
Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

EU Takes Aim At Google Advertising Practices In Antitrust Probe

European Commission seeks information from advertisers, as it opens second EU antitrust probe of Google…

3 hours ago

Jack Ma Makes First Public Appearance After Ant’s Cancelled IPO

First public appearance in nearly three months for Alibaba co-founder Jack Ma, after criticism of…

4 hours ago

Google Begins Investigation Of AI Staffer Over Data Transfer

Google reportedly begins investigation and locks the corporate account of member of its ethical AI…

6 hours ago

StoreDot Demos Five Minute Charging Car Battery

No more electric car range anxiety? Israeli firm StoreDot touts car electric battery that can…

6 hours ago

Trump Pardons Former Google Engineer Anthony Levandowski

Engineer who stole self-driving car secrets from Google's Waymo division, receives pardon from outgoing US…

9 hours ago

Microsoft Invests In GM’s Cruise For Self-Driving Future

Software giant confirms it is part of a $2 billion investment in GM's Cruise self-driving…

1 day ago