Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday December 15 2017, @04:26PM   Printer-friendly
from the ooops,-there-goes-another-one dept.

Submitted via IRC for SoyCow1984

Source: https://arstechnica.com/information-technology/2017/12/game-changing-attack-on-critical-infrastructure-site-causes-outage/

Hackers who may have been working on behalf of a nation recently caused an operational outage at a critical-infrastructure site, researchers said Thursday. The attackers did so by using a novel piece of malware to target the system that prevents health- and life-threatening accidents.

The malware was most likely designed to cause physical damage inside the unnamed site, researchers from the Mandiant division of security firm FireEye said in a report. It worked by targeting a safety instrumented system, which the targeted facility and many other critical infrastructure sites use to prevent unsafe conditions from arising. The malware has been alternately named Triton and Trisis, because it targeted the Triconex product line made by Schneider Electric.

"Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems," Mandiant researchers wrote. "The targeted systems provided emergency shutdown capability for industrial processes. We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations."

The accidental outage was likely the result of the Triconex SIS, or "safety instrumented system." The SIS shut down operations when it experienced an error that occurred as the hackers were performing reconnaissance on the facility. Although the hackers were likely seeking the ability to cause physical damage inside the facility, the November shutdown was likely not deliberate.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 1, Insightful) by Crash on Friday December 15 2017, @04:36PM (2 children)

    by Crash (1335) on Friday December 15 2017, @04:36PM (#610346)

    Maybe it's "game changing," but written by Dan Goodin? Given the number of times he has purposely left relevant information out of a "so-called report," just for scare-mongering and clicks, makes him about as trust-worthy of a source as Fox News on Trump.

    • (Score: 3, Informative) by khallow on Friday December 15 2017, @06:03PM

      by khallow (3766) Subscriber Badge on Friday December 15 2017, @06:03PM (#610379) Journal

      Maybe it's "game changing," but written by Dan Goodin?

      The author list [fireeye.com] is Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, and Christopher Glyer. Dan Goodin is not on that list. I know RTFA is a thing which we don't do here, but RTFA would indicate what Goodlin's source was.

    • (Score: 3, Informative) by frojack on Friday December 15 2017, @06:41PM

      by frojack (1554) on Friday December 15 2017, @06:41PM (#610394) Journal

      Its not game changing, or particularly new.

      Its the same as the Siemens vulnerabilities [wikipedia.org] except done directly in the internet, without having to sneak it in via a usb stick or a windows machine.

      It exposes yet another company that thought they could shortcut the security aspects of their products.

      --
      No, you are mistaken. I've always had this sig.
  • (Score: 1, Touché) by Anonymous Coward on Friday December 15 2017, @05:14PM

    by Anonymous Coward on Friday December 15 2017, @05:14PM (#610361)

    Take a drink!

  • (Score: 5, Insightful) by jmorris on Friday December 15 2017, @05:57PM (8 children)

    by jmorris (4844) on Friday December 15 2017, @05:57PM (#610376)

    The website for Triconex is content free but it is a safe bet we are talking about another Windows exploit, right? This is news why? If you run Windows on anything important you will lose, you deserve to lose and you should be fired for being a loser. If you use Windows on a system that can kill people you should be fired from a cannon into the Sun.

    • (Score: 3, Informative) by Kromagv0 on Friday December 15 2017, @06:50PM

      by Kromagv0 (1825) on Friday December 15 2017, @06:50PM (#610398) Homepage

      Looks like it indeed was a windows issue given that the main executable is trilog.exe [fireeye.com]. To me this sounds a lot like companies not following current best practices. For ICS systems a close match would be things like NERC CIP [nerc.com], the Cybersecurity Procurement Language for Energy Delivery Systems [energy.gov] document, and not using something like the CIS benchmarks [cisecurity.org] for your systems. I have a feeling that they likely weren't' even following the awful but better than nothing PCI DSS [pcisecuritystandards.org] standard. While the language in each document tends to be tailored to a specific industry it shouldn't be that difficult to make the concepts and actions applicable to yours, especially when going from SCADA systems to ICS systems.

      --
      T-Shirts and bumper stickers [zazzle.com] to offend someone
    • (Score: 0) by Anonymous Coward on Friday December 15 2017, @06:53PM

      by Anonymous Coward on Friday December 15 2017, @06:53PM (#610400)

      Just DuckDuckGo "Triconex windows" and you'll see that your assumptions are correct: it runs on Microsoft's finest.

    • (Score: 2) by PinkyGigglebrain on Friday December 15 2017, @08:29PM (1 child)

      by PinkyGigglebrain (4458) on Friday December 15 2017, @08:29PM (#610439)

      The Sun should not be used as a dumping ground for that level of filth.

      --
      "Beware those who would deny you Knowledge, For in their hearts they dream themselves your Master."
      • (Score: 2) by c0lo on Friday December 15 2017, @11:33PM

        by c0lo (156) Subscriber Badge on Friday December 15 2017, @11:33PM (#610546) Journal

        May we use Oracle instead?
        A little extra filth won't make much of a difference.

        --
        https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    • (Score: 2) by Grishnakh on Friday December 15 2017, @08:59PM (3 children)

      by Grishnakh (2831) on Friday December 15 2017, @08:59PM (#610458)

      You're absolutely right about Windows, but I don't quite agree with the last part.

      It's true: using Windows for critical infrastructure is incompetent and stupid. Worse, was this "critical infrastructure" system connected to the internet? That too is incompetent and stupid.

      But firing people into the Sun is uncalled for. It's extremely expensive to launch people into space, and the idiots who did this would probably die very quickly that way. I think a more fitting punishment is slowly lowering them into an acid bath. This will also be much less expensive.

      • (Score: 2) by jmorris on Friday December 15 2017, @09:07PM

        by jmorris (4844) on Friday December 15 2017, @09:07PM (#610467)

        I'm reasonable, whatever gets the point made. I'm like the left head of the three headed giant, "All right, all right, all right. We'll kill him first and then have tea and biscuits."

      • (Score: 2) by bob_super on Friday December 15 2017, @11:31PM

        by bob_super (1357) on Friday December 15 2017, @11:31PM (#610544)

        Just "invite" them to visit an abandoned mine for a few weeks with only one box of matches.
        They should feel very secure inside all that obscurity.

      • (Score: 2) by Tara Li on Wednesday December 20 2017, @09:22PM

        by Tara Li (6248) on Wednesday December 20 2017, @09:22PM (#612546)

        Launch them into space is fine - just aim for the Moon. Moon bases will need more organics for fertilizer.

  • (Score: 2) by nobu_the_bard on Friday December 15 2017, @05:59PM (1 child)

    by nobu_the_bard (6373) on Friday December 15 2017, @05:59PM (#610378)

    There's a lot of guessing involved, with only the data provided, that a nation state was involved. I think it's both expecting too little of other groups. Of course maybe that guess is based partially on information they left out.

    The article at FireEye is a bit better about covering the actual incident: https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html [fireeye.com]

    • (Score: 1) by khallow on Friday December 15 2017, @06:19PM

      by khallow (3766) Subscriber Badge on Friday December 15 2017, @06:19PM (#610385) Journal
      They have three bits of supporting information.

      FireEye has not connected this activity to any actor we currently track; however, we assess with moderate confidence that the actor is sponsored by a nation state. The targeting of critical infrastructure as well as the attacker’s persistence, lack of any clear monetary goal and the technical resources necessary to create the attack framework suggest a well-resourced nation state actor. Specifically, the following facts support this assessment:

      The attacker targeted the SIS suggesting an interest in causing a high-impact attack with physical consequences. This is an attack objective not typically seen from cyber-crime groups.

      The attacker deployed TRITON shortly after gaining access to the SIS system, indicating that they had pre-built and tested the tool which would require access to hardware and software that is not widely available. TRITON is also designed to communicate using the proprietary TriStation protocol which is not publicly documented suggesting the adversary independently reverse engineered this protocol.

      To summarize, no obvious profit motive, deploying TRITON quickly after first penetration, indicating it was built for the target type, and that in turn indicating that they had access to some expensive, exclusive gear.

  • (Score: 0) by Anonymous Coward on Friday December 15 2017, @07:28PM

    by Anonymous Coward on Friday December 15 2017, @07:28PM (#610409)

    if you use slaveware on critical systems you should be held criminally liable when it is used by other masters on your slaves.

  • (Score: 3, Interesting) by legont on Friday December 15 2017, @07:46PM

    by legont (4179) on Friday December 15 2017, @07:46PM (#610416)

    What I find interesting is that the actual outage was triggered by the security system itself which is usually the case nowadays.

    Isn't it why Linus was screaming at Google's morons the other day? https://www.theregister.co.uk/2017/11/20/security_people_are_morons_says_linus_torvalds/ [theregister.co.uk]

    --
    "Wealth is the relentless enemy of understanding" - John Kenneth Galbraith.
  • (Score: 2) by Gaaark on Friday December 15 2017, @10:21PM (1 child)

    by Gaaark (41) on Friday December 15 2017, @10:21PM (#610506) Journal

    "target the system that prevents health- and life-threatening accidents."

    911???

    --
    --- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
(1)