In December, a new malware variant specifically designed to attack industrial safety systems was identified as being responsible for causing an operational outage at a critical infrastructure facility in the Middle East. The malware, dubbed TRITON, or TRISIS, targets Triconex safety instrumented system (SIS) controllers. It replaces the logic of SIS controllers, an action which can prevent the safety system from functioning correctly and result in physical consequences. TRITON represents the growing escalation of cyber threats being developed to target industrial control systems (ICS). In addition to TRITON, previous variants of industrial malware have focused on gaining access to programmable logic controllers (PLCs), not SIS controllers specifically. Since PLCs are used to operate manufacturing processes, water and wastewater treatment facilities, energy distribution and more, ICS malware places facilities, personnel and the environment at risk. For example, malware could reprogram these devices to shut valves, modify formulations for pharmaceutical, food and beverage products, display false readings, etc. To date, five ICS-specific malware variants have been discovered.
- Stuxnet (2010): This was first malware to specifically target supervisory control and data acquisition (SCADA) systems and programmable logic controllers (PLCs). It was responsible for causing substantial damage to Iran’s nuclear program.
- Havex (2013): A remote access Trojan (RAT) was used as part of a widespread espionage campaign targeting ICS environments across numerous industries. It scanned infected systems to locate SCADA or ICS devices on the network and sent data back to the attackers. Havex was an intelligence-collection tool used for espionage and not for the disruption or destruction of industrial systems.
- BlackEnergy 2 (2014): This was modified from an existing malware variant called BlackEnergy to target human-machine interface (HMI) software from a handful of vendors, including General Electric, Advantech/Broadwin and Siemens. It was used in the cyber attack that took down the Ukrainian power grid in December 2015.
- Crash Override/Industroyer (2016): This is the first known malware designed to attack electric grid systems and was used in the December 2016 hack on a transmission substation in the Ukraine. It is new and far more advanced than the general-purpose tools used to attack Ukraine’s power grid in 2015. What makes Crash Override so sophisticated is its ability to use the same protocols that individual electric grid systems rely on to communicate with one another, sometimes called control-plane protocols. Stuxnet and Triton also access these native protocols.
- Triton (2017): Since most ICS environments suffer from lack of visibility, it is difficult for organizations to identify malicious activities once an adversary gains access to the operational network. Fortunately, new technologies can detect and respond to threats like the TRITON malware in real time.
- Detecting remote connections, network scanning, unauthorized system access and attempts to read controller information
- Monitoring communications between industrial systems on the network and to external systems
- Identifying any changes to controller logic, configuration and state