June 6, 2016 By Douglas Bonderud 2 min read

Critical systems used by utility providers — industrial control systems (ICS) and SCADA — were never designed with security in mind. Attackers have picked up on this critical gap, and according to Threatpost, a new strain of ICS malware has now been detected. What’s more worrisome is that it borrows a page from Stuxnet to get the job done.

Concept or Criminal?

There may be a silver lining here: As noted by SecurityWeek, it’s possible that the ICS code is actually a proof of concept (POC) rather than a full-fledged attack. Researchers from FireEye first came across the new strain while analyzing malware droppers that leverage PyInstaller. They found two samples of the ICS malware uploaded to VirusTotal back in 2014 — although neither was flagged as malicious.

The malware, called Irongate, starts by using a dropper to check for VMware virtual machines and the Cuckoo Sandbox. If they’re found, nothing happens.

But if they’re absent, the dropper deploys an executable named scada.exe. Interestingly, the malware only works on a specific industrial process in a Siemens simulated environment, giving rise to the idea that it might just be a test or POC. In fact, code similar to the new threat was published on an engineering blog two years ago.

Stuxnet Similarities in the ICS Malware

POC or not, the ICS malware is particularly troubling because it takes a page from Stuxnet. According to Dark Reading, both target a specific Siemens control system and use custom-built dynamic link libraries to alter a single process.

They also take similar steps to avoid detection: Where Stuxnet searched for antivirus tools it could bypass, Irongate scans for sandboxes and VMs to avoid. So far, no one has stepped up to claim responsibility for the new strain. FireEye said it has released the findings to help the security community mitigate any new attacks leveraging the same process.

But what does defense of a Stuxnet-inspired SCADA attack look like? One of the most common suggestions is air gapping, or keeping ICS and SCADA systems isolated from the network at large. But Faizel Lahkani, who designed the first SCADA systems 20 years ago, told The Register that this is an impossible scenario.

He noted that most systems are theoretically air-gapped but not really disconnected. “There are ways to get around isolation, either because systems are not set up properly or because that’s a test link or someone bridged the Wi-Fi network,” he said. Ultimately, separation won’t solve the SCADA problem since every other system on the network requires some type of internet-facing connection.

Irongate is a wake-up call. It’s not feasible to combat Stuxnet-like threats by pushing SCADA systems off the network. At bare minimum, companies need total visibility of ICS and SCADA tools so they’re notified of any suspicious activity. Industrial IT needs an overhaul; defense by design trumps security through separation.

More from

Widespread exploitation of recently disclosed Ivanti vulnerabilities

6 min read - IBM X-Force has assisted several organizations in responding to successful compromises involving the Ivanti appliance vulnerabilities disclosed in January 2024. Analysis of these incidents has identified several Ivanti file modifications that align with current public reporting. Additionally, IBM researchers have observed specific attack techniques involving the theft of authentication token data not readily noted in current public sources. The blog details the results of this research to assist organizations in protecting against these threats. Key Findings: IBM research teams have…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

How I got started: Cyber AI/ML engineer

3 min read - As generative AI goes mainstream, it highlights the increasing demand for AI cybersecurity professionals like Maria Pospelova. Pospelova is currently a senior data scientist, and data science team lead at OpenText Cybersecurity. She also worked at Interest, an AI cybersecurity company acquired by MicroFocus and then by OpenText. She continues as part of that team today.Did you go to college? What did you go to school for?Pospelova: I graduated with a bachelor’s degree in computer science and a master’s degree…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today