June 17, 2019 By David Bisson 2 min read

In addition to oil and gas companies, the XENOTIME threat group has begun targeting electric utility organizations located in the U.S. and elsewhere.

In February 2019, Dragos observed XENOTIME probing the networks of electric utility organizations, trying to gather information and enumerate network resources associated with organizations based in the U.S. and the Asia-Pacific region. In so doing, the threat group expanded its range of targets from oil and gas organizations to another critical infrastructure sector.

While Dragos did not observe any of these attack attempts result in a successful intrusion, the digital security firm said that the group’s expansion of malicious activity to the electric utility sector is cause for concern. Specifically, Dragos researchers noted that the threat group could be using these attacks to try to fulfill some of the prerequisites for executing a prolonged disruptive or destructive event on electric utility operations.

XENOTIME: A Growing Threat to Industrial Control Systems

XENOTIME has been a problem for critical infrastructure companies for some time now. Back in December 2017, FireEye discovered that the group had used TRITON/TRISIS malware in an attempt to disrupt the industrial processes at a critical infrastructure organization in the Middle East.

Over the next year, Dragos identified several compromises of industrial control system (ICS) vendors and manufacturers in which XENOTIME was the culprit. In April 1029, FireEye confirmed that it was analyzing an additional intrusion in which XENOTIME deployed TRITON malware at a different critical infrastructure utility.

How to Defend ICS Assets Against Digital Threats

Defending ICS assets against digital threats starts with the creation and implementation of a robust testing program that consists of system and device configuration checks, network traffic analysis, offline vulnerability research and penetration tests on an ongoing basis.

Critical infrastructure organizations should also use device inventories, automated scanning, advanced behavioral analytics and other tools to harden their industrial internet of things (IoT) systems.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today