Security

Malware 'disguised as Siemens software drills into 10 industrial plants'

Four years of active infection, claims security biz Dragos


Malware posing as legitimate software for Siemens control gear has apparently infected industrial equipment worldwide over the past four years.

The cyber-nasty is packaged as software to be installed on Siemens programmable logic controllers (PLC), we're told. At least 10 industrial plants – seven in the US – were found running the infected software, a study by industrial cybersecurity firm Dragos claims.

According to the Maryland-based biz, this particular malware was specifically thrown at industrial control equipment. Exactly what it does, or did, is not explained, although it is described as "crimeware". Dragos CEO Robert Lee writes:

Starting in 2013, there were submissions from an ICS environment in the US for Siemens programmable logic controller control software. The various anti-virus vendors were flagging it as a false positive initially, and then eventually a basic piece of malware. Upon our inspection, we found ... variations of this file and Siemens theme 10 times over the last four years, with the most recent flagging of this malicious software being this month in 2017.

In short, there has been an active infection for the last four years of an adversary attempting to compromise industrial environments by theming their malware to look like Siemens control software. The malware is simply crimeware but has seemingly been effective.

This malware is separate to common-or-garden adware and bank-raiding Trojans that find their way onto PCs. Dragos conservatively estimates that 3,000 industrial sites a year are infected by traditional cyber-pests. These infections were largely opportunistic Trojans – such as Sivis, Ramnit, and Virut – brought in by staff using infected USB sticks.

Dragos revealed its findings during a keynote at the SANS ICS Security Summit in Orlando, Florida.

Edgard Capdevielle, chief exec at industrial control security specialists Nozomi Networks, said: "That ICS themed malware exists is not surprising, but it is concerning. The reality is that ICS networks today face all the same security challenges as every other IT network, but lack similar security options.

"Historically ICS was designed to be completely segregated and confined by physical boundaries. However, each new IP address punches another hole in the metaphorical wall that separates Information Technology (IT) and Operational Technology (OT). Having established IT connectivity, it's difficult to put the genie back in the bottle and each of these avenues is a potential point of weakness that can be compromised – by hackers burrowing in or malware (such as ransomware) detonating internally and then radiating out."

Andrew Cooke, head of cyber consulting at Airbus Defence and Space CyberSecurity, added: "Malware is prevalent in a wide range of industrial systems, often spread by an infected USB stick or by unauthorized remote access. But while the majority of malware found in these systems is low level, it can still pose a serious risk for the organizations concerned. Sophisticated attackers often use these methods to gain valuable intelligence about the way that a system is operated, configured and run." ®

Send us news
16 Comments

Software glitch saw Aussie casino give away millions in cash

Nobody cared enough to check why audits were out of whack

HPE sues China's Inspur Group over server patents

Middle Kingdom biz accused of IP theft and changing names to evade sanctions

Hugely expanded Section 702 surveillance powers set for US Senate vote

Opponents warn almost anyone could be asked to share info with Uncle Sam

Snowmobile, Amazon's truck-powered migration service, reaches the end of the road

Demand for bulk storage on wheels turned out to be wan

Uncle Sam earmarks $54M of CHIPS funding for small-biz semiconductor boffinry

Up to 24 outfits to bag taxpayer cash for projects 'developing a viable product or service' for US chip industry

Psst, hey. It's the NSA. You want some AI security advice?

You can trust us, we're the good guys

America may end up with paid-for 5G fast lanes under net neutrality anyway

Damn you, network virtualization

ASML ships another high NA EUV lithography machine to mystery client

The cutting-edge chipmaking tool for a secret customer

Kremlin's Sandworm blamed for cyberattacks on US, European water utilities

Water tank overflowed during one system malfunction, says Mandiant

Boston Dynamics' humanoid Atlas is dead, long live the ... new commercial Atlas

If the plan was to make this all-electric droid look mildly terrifying, mission accomplished

Are we in a cost of technology crisis? Our vultures think so

Won't somebody please think of the shareholders

Future Roku TVs may inject tailored ads into anything and everything when you pause

Muted the audio? That's an advert. Paused a video? That's an advert