Jump to content
Aerosol

Attackers planting banking Trojans in industrial systems

Recommended Posts

Posted

atomic_1.png?x=648&y=429&crop=1

Trend Micro researcher Kyle Wilhoit says the latest attacks on SCADA and industrial control networks are turning out to carry rather pedestrian banking Trojans, and have been on the rise since October 2014.

Talking to DarkReading, Wilhoit said rather than Stuxnet-style attacks, ne'er-do-wells are dropping banking Trojans into these networks disguised as updates to SCADA software.

So far, the DarkReading piece says, he's seen the attack software disguised as Siemens' Simatic WinCC, GE Cimplicity, and Advantech device drivers.

Rising numbers of attacks on SCADA environments in recent years have put sysadmins on edge. Apart from the nation-state-level Stuxnet, there's been a growing number of bugs identified in SCADA software.

Apart from generic bugs like Heartbleed and Poodle, which are inherited via popular libraries the vendors deploy, industrial systems also suffer from all-too-common problems like hard-coded passwords and remote-access bugs. The SCADA-specific Havex and BlackEnergy attacks also grabbed headlines in 2014.

That makes the banking Trojan more unexpected, Wilhoit said, adding: “The ultimate end goal here is probably not industrialised espionage, but to get banking credentials”.

That, of course, assumes that there are industrial controllers whose owners allow operators to use as bank login points.

Wilhoit adds that many industrial control systems use Windows as the human interface platform, and users in those environments don't seem particularly diligent at running anti-virus and other security software.

He notes that a successful crimeware attack on a Windows-based industrial controller would be catastrophic even if it didn't make a steel plant explode: if, for example, someone deployed a Cryptolocker-based attack against the control system, it would be rendered unusable.

“HMI systems are very finicky, so it doesn't take much to make these things fall over. Financial information could be stolen, but what if an [HMI] box drops inadvertently?” Wilhoit added.

He will be detailing his findings at Miami's S4 ICS/SCADA conference next week.

Source

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...