Newsletter
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
    • CAMERA
  • COMPUTERS
    • LAPTOP
    • APPLICATIONS
    • AUDIO
  • WRITE FOR US
  • Advertise Here
No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
    • CAMERA
  • COMPUTERS
    • LAPTOP
    • APPLICATIONS
    • AUDIO
  • WRITE FOR US
  • Advertise Here
No Result
View All Result
REAL HACKER NEWS
No Result
View All Result
Home APPLICATIONS

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids

Real Hacker Staff by Real Hacker Staff
May 26, 2023
in APPLICATIONS
0
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


May 26, 2023Ravie LakshmananICS/SCADA Security

A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in industrial environments has been unearthed.

Google-owned threat intelligence firm Mandiant dubbed the malware COSMICENERGY, adding it was uploaded to a public malware scanning utility in December 2021 by a submitter in Russia. There is no evidence that it has been put to use in the wild.

“The malware is designed to cause electric power disruption by interacting with IEC 60870-5-104 (IEC-104) devices, such as remote terminal units (RTUs), that are commonly leveraged in electric transmission and distribution operations in Europe, the Middle East, and Asia,” the company said.

COSMICENERGY is the latest addition to specialized malware like Stuxnet, Havex, Triton, IRONGATE, BlackEnergy2, Industroyer, and PIPEDREAM, which are capable of sabotaging critical systems and wreaking havoc.

Mandiant said that there are circumstantial links that it may have been developed as a red teaming tool by Russian telecom firm Rostelecom-Solar to simulate power disruption and emergency response exercises that were held in October 2021.

This raises the possibility that the malware was either developed to recreate realistic attack scenarios against energy grid assets to test defenses or another party reused code associated with the cyber range.

Power Grid Malware

The second alternative is not unheard of, especially in light of the fact that threat actors are known to adapt and repurpose legitimate red team and post-exploitation tools for malicious ends.

COSMICENERGY’s features are comparable to that of Industroyer – which has been attributed to the Kremlin-backed Sandworm group – owing to its ability to exploit an industrial communication protocol called IEC-104 to issue commands to RTUs.

“Leveraging this access, an attacker can send remote commands to affect the actuation of power line switches and circuit breakers to cause power disruption,” Mandiant said.

UPCOMING WEBINAR

Zero Trust + Deception: Learn How to Outsmart Attackers!

Discover how Deception can detect advanced threats, stop lateral movement, and enhance your Zero Trust strategy. Join our insightful webinar!

Save My Seat!

This is accomplished by means of two components called PIEHOP and LIGHTWORK, which are two disruption tools written in Python and C++, respectively, to transmit the IEC-104 commands to the connected industrial equipment.

Related articles

A whopping 60,000+ Android apps loaded adware generating revenue for attackers

June 7, 2023

Vision Pro’s uncanny valley Personas are already getting an upgrade, Apple says

June 7, 2023

Another notable aspect of the industrial control system (ICS) malware is the lack of intrusion and discovery capabilities, meaning it requires the operator to perform an internal reconnaissance of the network to determine the IEC-104 device IP addresses to be targeted.

To pull off an attack, a threat actor would therefore have to infect a computer within the network, find a Microsoft SQL Server that has access to the RTUs, and obtain its credentials.

PIEHOP is then run on the machine to upload LIGHTWORK to the server, which sends disruptive remote commands to modify the state of the units (ON or OFF) over TCP. It also immediately deletes the executable after issuing the instructions.

“While COSMICENERGY’s capabilities are not significantly different from previous OT malware families’, its discovery highlights several notable developments in the OT threat landscape,” Mandiant said.

“The discovery of new OT malware presents an immediate threat to affected organizations, since these discoveries are rare and because the malware principally takes advantage of insecure by design features of OT environments that are unlikely to be remedied any time soon.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: CosmicEnergyexploitsgridsICsMalwarePowerProtocolSabotage
Share76Tweet47

Related Posts

A whopping 60,000+ Android apps loaded adware generating revenue for attackers

by Real Hacker Staff
June 7, 2023
0

Adware is a type of software designed to make money for bad actors by running ads in the foreground or...

Vision Pro’s uncanny valley Personas are already getting an upgrade, Apple says

by Real Hacker Staff
June 7, 2023
0

Apple's Vision Pro was announced during a WWDC 2023 event on Monday and we're still digesting everything relating to the...

Apple finally begins its push to bring Windows games to Mac with new tool

by Real Hacker Staff
June 7, 2023
0

The announcements at the WWDC 2023 keynote were plentiful - from Vision Pro to big refinements across iOS 17, iPadOS 17, macOS...

Microsoft to Pay $20 Million Penalty for Illegally Collecting Kids’ Data on Xbox

by Real Hacker Staff
June 7, 2023
0

Jun 07, 2023Ravie LakshmananPrivacy / Technology Microsoft has agreed to pay a penalty of $20 million to settle U.S. Federal...

The Role of the Ransomware Negotiator

by Real Hacker Staff
June 7, 2023
0

Get exclusive insights from a real ransomware negotiator who shares authentic stories from network hostage situations and how he managed...

Load More
  • Trending
  • Comments
  • Latest

XMOS Launches XVF3800 High-Performance Voice Processor for Enterprise and Consumer Voice Conferencing Platforms

March 7, 2023

eSIMs Will Transform the Way You Think About Mobile Data and Security

March 7, 2023

Ant-Man: Quantumania, Netflix Power Rangers movie, and every new movie to watch

April 23, 2023

Here’s what you need to know

April 15, 2023

Climate Change Meets Conflict Pushing Millions of Children in Ethiopia Out of School — Global Issues

0

Akros Technologies, an AI-powered asset management platform, raises funding from Z Holdings • TechCrunch

0

Holy Shit, They’re Making Hades 2 & Early Access Is In 2023

0

Confusion and anxiety in China as draconian COVID curbs eased | Coronavirus pandemic News

0
GameStop Fires Its CEO After Two Years

GameStop Fires Its CEO After Two Years

June 7, 2023
Ethiopia says it foiled al-Shabab attack near border with Somalia | Al-Shabab News

Ethiopia says it foiled al-Shabab attack near border with Somalia | Al-Shabab News

June 7, 2023

The new Minecraft 1.20 update adds Sniffers and cherry grove biomes

June 7, 2023

What are Series A VCs looking for?

June 7, 2023

Recent News

GameStop Fires Its CEO After Two Years

GameStop Fires Its CEO After Two Years

June 7, 2023
Ethiopia says it foiled al-Shabab attack near border with Somalia | Al-Shabab News

Ethiopia says it foiled al-Shabab attack near border with Somalia | Al-Shabab News

June 7, 2023

Categories

  • APPLICATIONS
  • AUDIO
  • CAMERA
  • COMPUTERS
  • GAMING
  • LAPTOP
  • REVIEWS
  • SECURITY
  • SMARTPHONES
REAL HACKER NEWS

We bring you the best news on Internet new gadgets hacking and technology from around the world

  • Contact
  • Cookie Privacy Policy
  • Terms and Conditions
  • Privacy Policy
  • Disclaimer
  • DMCA

© 2003 Real Hacker News

No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
    • CAMERA
  • COMPUTERS
    • LAPTOP
    • APPLICATIONS
    • AUDIO
  • WRITE FOR US
  • Advertise Here

© 2003 Real Hacker News