© Gennady Kurinov | Dreamstime.com
industrial computer

US Warns of Cyberthreat to Specific Industrial Machines

April 14, 2022
The malware specifically looks for some models of Schneider Electric and OMRON PLCs.

A new joint Cybersecurity Advisory (CSA) from the United States government, issued on Wednesday, warns that advanced persistent threat (APT) actors (read: cybercriminals) have developed a way to gain full system access to multiple industrial control systems (ICS) and supervisory control and data acquisition devices (SCADA), targeting specific models of programmable logic controllers (PLCs) manufactured by Schneider Electric and OMRON.

Industrial cybersecurity firm Dragos is among the organizations that contributed to the CSA.

"The initial targeting appears to be liquid natural gas and electric community-specific. However, the nature of the malware is that it works in a wide variety of industrial controllers and systems. The malware initially targets Schneider Electric and Omron controllers, however, there are no vulnerabilities specific to those product lines." — Robert M. Lee, CEO at Dragos.

Specific Cyberthreats to Specific Industrial Machinery

According to the CSA, cybercriminals have developed custom-made tools to specifically target the machines in question. Once the machines are compromised, the cybercriminals can upload malicious code, modify device parameters, and back up device contents, among other things a company does not want to have to deal with.

Practical concerns for the Schneider Electric devices in question include losing the ability to connect your network to the PLCs, severing connections to prompt re-connects that require entering credentials that the cybercriminals may then steal, and crashing PLCs outright until they are restarted and recovery operations are completed.

For OMRON devices, cybercriminals may install hostile software to further enable new attacks, back up and restore files to and from the PLC, and outright issue commands to the PLC to manipulate files and capture data.

Cybercriminals have also developed a tool to exploit a known vulnerability in a specific ASRock-signed motherboard driver. The tool adds malicious code to Windows systems, opening the door for cybercriminals to move into general computer networks and wreak havoc in IT or OT environments.

Finally, the CSA cites fresh vulnerabilities for servers running Open Platform Communications Unified Architecture (OPC UA).

Enact Point Defense Early

The CSA includes numerous strategies to mitigate risk before cybercriminals have a chance to attack the industrial systems in question, including the usual advice on multifactor authentication, changing passwords often and making them strong, and closely monitoring any machines cited as being under particular threat. The CSA also provides a plentiful list of more advanced preventative actions for IT professionals.

"Attackers need an initial point of compromise to gain access to the industrial control systems involved, and organizations should build their defenses accordingly," adds Erlin. "The joint advisory recommends isolating affected systems, as well as employing endpoint detection, configuration & integrity monitoring, and log analysis. This isn’t a matter of simply applying a patch.”

US Warns of Cyberthreat to Specific Industrial Machines originally appeared on IndustryWeek, an Endeavor Business Media partner site.
About the Author

Dennis Scimeca | Technology Editor, IndustryWeek

Dennis Scimeca is a veteran technology journalist with particular experience in vision system technology, machine learning/artificial intelligence, virtual and augmented reality, and interactive entertainment. He has experience writing for consumer, developer, and B2B audiences with bylines in many highly regarded specialist and mainstream outlets.

At IndustryWeek, he covers the continuing expansion of new technologies into the manufacturing world and the competitive advantages gained by learning and employing these new tools.

He also seeks to build connections between manufacturers by sharing the stories of their challenges and successes employing new technologies. If you would like to share your story with IndustryWeek, please contact him at [email protected].