The malware, described as a modular ICS attack framework and a collection of custom-made tools, can be used by threat actors to target ICS and SCADA devices, including programmable logic controllers (PLCs) from
Advisories and blog posts describing the toolset have been released by industrial cybersecurity firm
Incontroller/Pipedream can be used by a threat actor that has access to the targeted organization's operational technology (OT) network to look for ICS and SCADA devices and take control of these systems. The toolset also includes a tool that can be used to target Windows devices by exploiting a vulnerability in an
The malware relies on widely used technologies to achieve its goals, allowing the attackers to move laterally, elevate their privileges, or cause disruptions to critical functions or devices - all this without requiring advanced hacking skills.
The company believes the malware has not been deployed in the wild - its operator likely plans on using it in future operations. Based on
Learn More About Industrial Threats at SecurityWeek's
"While our evidence connecting Incontroller to
The company tracks Incontroller components as TagRun, CodeCall, and OmShell. These components could allow hackers to crash PLCs, send unauthorized commands to PLCs in an effort to alter the physical behavior of field devices, and disable safety systems in an effort to cause physical destruction, according to
In an advisory published on Wednesday,
"While we are not aware, at the date of this publication, of any confirmed or potential targets leveraging Incontroller, the framework poses a critical risk to organizations using the targeted devices. The framework has capabilities related to disruption, sabotage, and potentially physical destruction," Schneider warned.
The malicious framework can target several models of Schneider's PLCs, as it has the ability to communicate with all versions of Modbus and CODESYS devices, including ones managed with EcoStruxure Machine Expert and SoMachine software.
Schneider said an attacker could leverage the framework to scan the network for potential targets, make devices unreachable, connect to PLCs in order to brute-force their passwords, upload and download files, launch DoS attacks, and perform read/write operations to the OPC-UA server.
The company has advised organizations to ensure that the software and firmware running on their devices is up to date, set strong passwords and replace default accounts, disable unused protocols, and check controllers to ensure that the application running on them has not been tampered with.
Omron and the
The Incontroller/Pipedream alert comes just days after ESET and
Industroyer2, used in an attack aimed at high-voltage electrical substations, is also designed to interact with ICS in an effort to cause disruption. Industroyer2 was accompanied by several wipers designed to erase traces and make recovery more difficult.
Media Contact
Company
Contact Person: Media Relations
Email: ajaysinghtanwar03@gmail.com
Phone: 8745857610
Country:
Website: https://www.se.com/in/en/
Source: www.abnewswire.com
.
(C) 2022 M2 COMMUNICATIONS, source