New Dangerous Malware Discovered that Can Take Down Electric Power Grids
Now, security researchers have discovered the culprit behind the attacks on industrial control systems.
Slovakia-based security software maker ESET and US critical infrastructure security firm Dragos Inc. say they have uncovered a new dangerous piece of malware in the wild that targets critical industrial control systems and is capable of causing blackouts.
Dubbed "Industroyer" or "CrashOverRide," the grid-sabotaging malware was likely to be used in the December 2016 cyber attack against Ukrainian electric utility Ukrenergo, which the security firms say represents a dangerous advancement in critical infrastructure hacking.
"The functionality in the CRASHOVERRIDE framework serves no espionage purpose and the only real feature of the malware is for attacks which would lead to electric outages," reads Dragos analysis [PDF] of the malware.According to the researchers, CrashOverRide is the biggest threat designed to disrupt industrial control systems, after Stuxnet — the first malware allegedly developed by the US and Israel to sabotage the Iranian nuclear facilities in 2009.
Unlike Stuxnet, the CrashOverRide malware does not exploit any "zero-day" software vulnerabilities to do its malicious activities; instead, it relies on four industrial communication protocols used worldwide in power supply infrastructure, transportation control systems, and other critical infrastructure systems.
Since there have been four malware discovered in the wild that target industrial control systems, including Stuxnet, Havex, BlackEnergy, and CrashOverRide, Stuxnet and CrashOverRide were designed only for sabotage, while BlackEnergy and Havex were meant for conducting espionage.
The recent analysis of the malware suggests CrashOverRide could cause power outages far more widespread, sophisticated and longer lasting than the Ukraine December 2016 blackout.
Dragos CEO Robert M. Lee said the CrashOverRide malware is capable of causing power outages that can last up to a few days in portions of a country's electric grid, but it is not capable enough to bring down the entire grid of a nation.
The malware includes interchangeable, plug-in components that could allow CrashOverRide to be altered to different electric power utilities or even launched simultaneous attacks on multiple targets.
"CrashOverRide is not unique to any particular vendor or configuration and instead leverages knowledge of grid operations and network communications to cause impact; in that way, it can be immediately re-purposed in Europe and portions of the Middle East and Asia," Dragos' paper reads.
"CrashOverRide is extensible and with a small amount of tailoring such as the inclusion of a DNP3 protocol stack would also be effective in the North American grid."According to the researchers, the malware can be modified to target other types of critical infrastructure as well with additional protocol modules.
The security firms have already alerted government authorities, and power grid companies about the dangerous threat, along with some advises that could help them to defend against this threat.