Critical Infrastructure Security, Governance, Risk and Compliance, Threat Management, Security Strategy, Plan, Budget, Endpoint/Device Security, Security Architecture
Feds, private industry warn of new malware strain targeting energy sector

Agencies are warning organizations in the energy sector that advanced persistent threat groups (APTs) have developed custom tools that allow them to compromise industrial control system (ICS) devices. Pictured: Transmission towers and power lines lead to a substation after a snow storm on Feb. 16, 2021, in Fort Worth, Texas. (Photo by Ron Jenkins/Getty Images)
Four federal agencies are warning organizations in the energy sector that multiple advanced persistent threat groups (APTs) have developed custom tools that allow them to compromise and hijack commonly used industrial control system (ICS) devices.The advisory, published jointly by the Cybersecurity and Infrastructure Security Agency, the FBI, NSA and Department of Energy, names multiple versions of Schneider Electric MODICON and MODICON Nano programmable logic controllers, OMRON programmable logic controllers and OPC Unified Architecture servers.The tools, which were developed with a modular architecture, allow the groups to initiate highly automated and highly custom attacks against targeted devices. They are typically deployed after an actor gains initial access to an IT networks and include a console that mimics the interface used for ICS devices. This makes it easier for “lower skilled cyber actors to emulate higher skilled actor capabilities.”“The APT actors can leverage the modules to scan for targeted devices, conduct reconnaissance on device details, upload malicious configuration/code to the targeted device, back up or restore device contents, and modify device parameters,” the agencies warned. The advisory does not specify which APT groups have the capability or how recently they acquired it, nor does it explicitly state whether the warning is derived from ongoing or active intelligence about a forthcoming attack, as previous joint alerts have done. U.S. officials and the private sector have been on high alert for much of the year as they brace for the possibility of cyber spillover or retaliation from the Russia-Ukraine war.Among the 13 recommendations the agencies provide are to isolate ICS and SCADA systems from the rest of the IT and OT networks, limit those systems’ access to specific management and engineering workstations as needed, change passwords to ICS/SCADA devices on a regular schedule and monitor systems to catch “unusual drivers,” particularly ASRock drivers.Many "aren't new mitigations but they help critical infrastructure defenders prevent disruptions stop threat actors from their objectives," said Rob Joyce, the NSA's director of cybersecurity.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds