Online attackers infiltrated a critical-infrastructure network, compromising systems and deploying malware designed to manipulate a system that could have shut down industrial processes, security firm FireEye warned in an advisory published on Dec. 14.
FireEye did not identify the attacker or attribute the attack, which is dubbed TRITON, to any specific group, nor did it name the victim, but stated that evidence points to “a nation-state preparing for an attack.” The malware could have stopped the critical-infrastructure’s systems from properly responding, leading to real-world damages, the company warned.
“The targeting of critical infrastructure to disrupt, degrade, or destroy systems is consistent with numerous attack and reconnaissance activities carried out globally by Russian, Iranian, North Korean, U.S., and Israeli nation state actors,” FireEye researchers stated in their analysis. “Intrusions of this nature do not necessarily indicate an immediate intent to disrupt targeted systems, and may be preparation for a contingency.”
Nation-states have become increasingly active in cyber operations. In 2010, the United States and Israeli hobbled Iran’s nuclear processing capability with the Stuxnet attack that caused damage to the critical centrifuges used in uranium processing. In 2016, attackers—thought to be Russian—caused a power outage in Ukraine, turning off the lights to nearly a quarter million people.
FireEye did not identify any nation-state as the likely aggressor, but said the company was moderately confident that the attacker is a government-sponsored group. “The targeting of critical infrastructure as well as the attacker’s persistence, lack of any clear monetary goal and the technical resources necessary to create the attack framework suggest a well-resourced nation state actor,” the company said.
Other security firms believe the target of the attack to be a Saudi Arabian firm, and the attackers to be Iranian. In 2012, the Shamoon attack—widely credited to Iran—infected systems at petroleum giant Saudi Aramco, and this attack seems to be a continuation of the online conflict, cyber-security expert Phil Neray of CyberX said in a statement.
Does IoT security concern you?
“We have information that points to Saudi Arabia as the likely target of this attack, which would indicate Iran as the likely attacker,” he said. “This would definitely be an escalation of that threat because now we’re talking about critical infrastructure—but it’s also a logical next step for the adversary.”
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…