Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

6/17/2019
12:00 PM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

XENOTIME Threat Actor Laying the Groundwork to Disrupt Utilities

Malware targets Schneider Electric's Triconex safety instrumented system.

Dragos has been watching the XENOTIME threat actor since it first came on the scene in 2014. It wrote a new advisorythat says this threat actor is showing new signs of expansion into new verticals.

XENOTIME has always been focused on industrial control systems. The 2017 TRISIS malware attack on a Saudi Arabian oil and gas facility represented a general escalation of attacks on ICS. TRISIS targeted safety systems and was designed to cause loss of life or physical damage.

FireEye Intelligence assesses with high confidence that the intrusion activity was supported by the Central Scientific Research Institute of Chemistry and Mechanics (CNIIHM; a.k.a. ЦНИИХМ), a Russian government-owned technical research institution located in Moscow. This is bolstered by trace elements in the malware used.

The malware is called TRISIS because it targets Schneider Electric's Triconex safety instrumented system (SIS) enabling the replacement of logic in final control elements. TRISIS is highly targeted and likely does not pose an immediate threat to other Schneider Electric customers, let alone other SIS products. Schneider initially thought that the malware had not leveraged any vulnerabilities in its product, but the company has now said that it did in fact exploit a flaw in older versions of the Triconex Tricon system.

Triconex safety systems are used in numerous industries. But Dragos found that each SIS is unique and to understand process implications would require specific knowledge of the process. This means that TRISIS is not a highly scalable attack that could be easily deployed across numerous victims without significant additional work.

But following that Saudi incident, Dragos has found that XENOTIME had expanded its operations to include oil and gas entities outside the Middle East. Additionally, the group compromised several ICS vendors and manufacturers in 2018.

In February 2019, while working with clients across various utilities and regions, Dragos said that they had identified a persistent pattern of activity which was "attempting to gather information and enumerate network resources associated with US and Asia-Pacific electric utilities."

Dragos says that, "XENOTIME used credential capture and replay to move between networks, Windows commands, standard command-line tools such as PSExec, and proprietary tools for operations on victim hosts."

The observed XENOTIME activity focuses on initial information gathering and access operations that would be necessary for any follow-on ICS intrusion operations.

Dragos does not think that XENOTIME is currently capable of executing a prolonged disruptive or destructive event on electric utility operations. What the Dragos people think is important about the observed activity is that it shows the adversary's interest in meeting the prerequisites for doing so. They are getting ready to do mischief.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.