Threat Management, Malware, Threat Management, Network Security, Ransomware
HHS: APT targeting biomanufacturing with stealthy Tardigrade malware

Teva Pharmaceuticals workers pack drugs in a clean room at the company's manufacturing plant March 10, 2008, in Jerusalem. Teva is regarded as the world's largest generic drug maker. (Photo by Uriel Sinai/Getty Images)
A new sophisticated, stealthy malware variant known as Tardigrade is aggressively proliferating in the biomanufacturing sector due to ongoing targeting from a suspected advanced persistent threat, according to a recent Department of Health and Human Services Cybersecurity Program alert to the health and public health sectors.The ongoing threat was brought to light by the cybersecurity nonprofit Bioeconomy Information Sharing and Analysis Center (BIO-ISAC), calling Tardigrade’s tactics using “unprecedented sophistication and stealth.”The malware is aggressively spreading throughout the biomanufacturing sector. BIO-ISAC has been analyzing the tactics to what is now called Tardigrade, including its tactics and the timeline for discovery. Researchers explained that Tardigrade is “potentially the first identified malware with this level of sophistication targeting biomanufacturing facilities.”“This is ongoing and this disclosure was accelerated in the public interest given the observed spread,” they continued. The threat was first observed in the spring of 2021 when a cyberattack struck a large biomanufacturing facility. An investigation into the incident discovered a highly capable malware loader that displayed a high level of autonomy. A second attack was detected about six months later at another facility with the same, highly advanced capabilities. Tardigrade has been classified as metamorphic, as it’s able to recompile its loader from memory and without leaving a consistent signature. The malware also resembles a popular loader known as Smoke Loader, or Dofoil and is being used to deliver ransomware. The researchers noted the ransomware is likely being used as a diversion for the actual attack purpose: intellectual property theft. Smoke Loader is a loader or trojan designed to attack the victim’s network with more effective and destructive malware. It’s part of the Smokey Bear family, which is known for continually automizing its techniques and tactics, and focused on the use of multi-purpose tools like keylogging, identity theft and backdoor access.Typically, Smoke Loader is delivered via infected email software, plug-ins, infected networks, adverts and physical infections, like USBs. The initial Tardigrade variant was Smoke Loader, followed by Dufoil and delivered via USB, files and autonomously through the network. Its primary attack delivery was through phishing attacks. Other entry points include external remote services, replication of removable media, supply chain compromise and valid accounts.
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds