TRITON Attack Targeted Critical Infrastructure, Security Firm Says

Online attackers infiltrated a critical-infrastructure network, compromising systems and deploying malware designed to manipulate a system that could have shut down industrial processes, security firm FireEye warned in an advisory published on Dec. 14.

FireEye did not identify the attacker or attribute the attack, which is dubbed TRITON, to any specific group, nor did it name the victim, but stated that evidence points to “a nation-state preparing for an attack.” The malware could have stopped the critical-infrastructure’s systems from properly responding, leading to real-world damages, the company warned.

“The targeting of critical infrastructure to disrupt, degrade, or destroy systems is consistent with numerous attack and reconnaissance activities carried out globally by Russian, Iranian, North Korean, U.S., and Israeli nation state actors,” FireEye researchers stated in their analysis. “Intrusions of this nature do not necessarily indicate an immediate intent to disrupt targeted systems, and may be preparation for a contingency.”

smart home meter wi-fi energy green network wireless © Horoscope Shutterstock

TRITON malware

Nation-states have become increasingly active in cyber operations. In 2010, the United States and Israeli hobbled Iran’s nuclear processing capability with the Stuxnet attack that caused damage to the critical centrifuges used in uranium processing. In 2016, attackers—thought to be Russian—caused a power outage in Ukraine, turning off the lights to nearly a quarter million people.

FireEye did not identify any nation-state as the likely aggressor, but said the company was moderately confident that the attacker is a government-sponsored group. “The targeting of critical infrastructure as well as the attacker’s persistence, lack of any clear monetary goal and the technical resources necessary to create the attack framework suggest a well-resourced nation state actor,” the company said.

Other security firms believe the target of the attack to be a Saudi Arabian firm, and the attackers to be Iranian. In 2012, the Shamoon attack—widely credited to Iran—infected systems at petroleum giant Saudi Aramco, and this attack seems to be a continuation of the online conflict, cyber-security expert Phil Neray of CyberX said in a statement.

Does IoT security concern you?

  • Yes (89%)
  • No (11%)

Loading ... Loading ...

“We have information that points to Saudi Arabia as the likely target of this attack, which would indicate Iran as the likely attacker,” he said. “This would definitely be an escalation of that threat because now we’re talking about critical infrastructure—but it’s also a logical next step for the adversary.”

The TRITON malware can communicate with a proprietary industrial controller network known as the Triconex Safety Instrumented System (SIS). The attacker behind the malware camouflaged it as a program for the company’s application suite. Once the system was compromised, the attacker did not immediately try to damage the network, but instead appeared to try to develop new capabilities, including the ability to do physical damage using the malware, FireEye stated.
“We base this on the fact that the attacker initially obtained a reliable foothold on the DCS [distributed control system] and could have developed the capability to manipulate the process or shutdown the plant, but instead proceeded to compromise the SIS system,” the researchers stated. “Compromising both the DCS and SIS system would enable the attacker to develop and carry out an attack that causes the maximum amount of damage allowed by the physical and mechanical safeguards in place.”
Originally published on eWeek
Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Apple ‘Developing’ Two Vision Pro Headset Successors

Apple reportedly working on lighter, cheaper Vision Pro, another model that links directly to Mac…

16 hours ago

OpenAI Releases GPT-4.1 With Improved Coding

OpenAI says GPT-4.1 model family can understand prompts with up to 1 million tokens, features…

16 hours ago

Blue Origin Sends All-Female Crew Into Space

Blue Origin jaunt sends Jeff Bezos fiancée Lauren Sanchez into space along with Katy Perry…

17 hours ago

Meta Begins Using EU Users’ Data To Train AI

Meta to use public posts from EU users on Facebook, Instagram to train AI models…

17 hours ago

Apple Leads Smartphone Market In First Quarter

Apple tops smartphone sales worldwide in first quarter after iPhone 16e launch, in spite of…

18 hours ago

Intel Sells Majority Stake In Altera To Silver Lake

Intel sells 51 percent of programmable chip unit Altera to Silver Lake Partners in deal…

18 hours ago