Categories: Workspace

Dangerous ‘Industroyer’ Malware Targets Industrial Control Systems

ESET has discovered a new malware variant that it describes as being “the biggest threat to critical infastructure since Stuxnet”, which is targeting insecure power grids and industrial control systems.

The malware is believed to have already been used in an attack in Kiev, Ukraine at the end of last year which resulted in large parts of the city being left without power.

Ominously dubbed ‘Industroyer’, it is capable of doing significant damage to electric power systems as it can directly control electricity substation switches and circuit breakers.

Power grid

Industrial targets

Control is achieved by exploiting industrial communication protocols used worldwide in power supply infrastructure, transportation control systems, and other critical infrastructure systems such as water and gas.

“These switches and circuit breakers are digital equivalents of analogue switches; technically they can be engineered to perform various functions,” explains ESET security researcher Anton Cherepanov.

“Thus, the potential impact may range from simply turning off power distribution, cascading failures and more serious damage to equipment. The severity may also vary from one substation to another, as well. Needless to say, disruption of such systems can directly or indirectly affect the functioning of vital services.”

The real worry with Industroyer is that the protocols it exploits were not designed with security in mind, meaning all the attackers needed to do was teach the malware to ‘speak’ the protocols without having to actually look for vulnerabilities.

It is also unique for industrial infrastructure-focused malware as it uses four payload components which work in stages to gain control of the system, as well as featuring an extra backdoor to communicate with the C&C server in case the primary backdoor is found and/or disabled.

“Thanks to its ability to persist in the system and provide valuable information for tuning-up the highly configurable payloads, attackers could adapt the malware to any environment, which makes it extremely dangerous,” Cherepanov concludes.

“Regardless of whether or not the recent attack on the Ukrainian power grid was a test, it should serve as a wake-up call for those responsible for security of critical systems around the world.”

Are you a security pro? Try our quiz!

Sam Pudwell

Sam Pudwell joined Silicon UK as a reporter in December 2016. As well as being the resident Cloud aficionado, he covers areas such as cyber security, government IT and sports technology, with the aim of going to as many events as possible.

Recent Posts

Mark Zuckerberg Lobbies Trump To Avoid Antitrust Trial – Report

Mark Zuckerberg is reportedly lobbying President Donald Trump for a settlement to avoid antitrust trial…

1 hour ago

Bitcoin Slides To $81,000 In Trump Tariff Shock

As global markets reel from Trump's tariffs, the price of Bitcoin slides as investors seek…

2 hours ago

Amazon’s First Project Kuiper Satellites Slated For 9 April Launch

Rival for Starlink and OneWeb. United Launch Alliance slated to send 27 Kuiper satellites into…

4 hours ago

Trump’s Tariffs: Implications For Tech Sector

Semiconductor imports are free of Trump's tariff war, but concerns remain over imports of smartphones…

5 hours ago

OpenAI Secures $40 Billion Funding Deal With SoftBank, Others

SoftBank has agreed a funding deal that will see OpenAI being provided with up to…

22 hours ago

Tesla Sales Plummet Amid Elon Musk Backlash

Tesla sales have plummeted to lowest level in three years, as deliveries of new EVs…

23 hours ago