Products + All Products + Software Integrity + Semiconductor IP + Verification + Design + Silicon Engineering
Posted by Robert Vamosi on June 3, 2016
Borrowing from Stuxnet, a new family of ICS-focused malware, dubbed Irongate, interferes with industrial process running within a simulated Siemens control system environment.
Back in 2010, researchers found a sophisiticated piece of malware called Stuxnet which only attacked systems running Siemens Step 7 PLCs. Otherwise the malware sat dormant. Stuxnet primarily attacked centrifuges used in Iran’s nuclear development program.
Researchers from FireEye said they found something similar in pouring over old VirusTotal data. Irongate runs only within Siemens simulated control system environments and was designed specifically for a custom-compiled user application in a Siemens Step 7 PLC simulation environment.
“While Stuxnet is orders of magnitude technically more advanced, Irongate borrows some similar traits,” said Sean McBride, senior threat intelligence analyst with FireEye told ThreatPost.
Irongate allows man-in-the-middle attacks by recording normal activity and then playing that activity back on the display while it alters industrial control systems.
FireEye notes that a sample of IRONGATE was submitted to VirusTotal in 2012, but that very few of the AV engines picked it up.
“Our ability as an industry to understand and detect threats is improving, but it’s not sufficient as evidenced by an example such as this,” said Rob Caldwell, manager of FireEye Labs Advanced Reverse Engineering told ThreatPost. “We need to get better at understanding what the threats are to industrial control systems and how to detect them to better defend against them.”