Late last week, word surfaced that may foreshadow an ominous future: Hackers attacked Schneider Electric’s Triconex Safety Instrumented Systems (SIS), targeting controllers and disrupting industrial safety systems. FireEye, which uncovered the attack, said the suspected state-sponsored cyber gangsters used a new piece of malware called “Triton” aimed at industrial control systems, in this case Schneider’s controllers.
Because the attack lacked the hallmarks of a ransomware extortion, FireEye believes the hacker’s mission was to disrupt an operation. “The targeted systems provided emergency shutdown capability for industrial processes,” the security specialist's threat research team wrote in a blog post. “We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations.”
FireEye categorized Triton as limited edition malware, following in the same path as the Stuxnet attack used against Iran in 2010 and Industroyer which the security watchdog believes was deployed by Russian operators, the Sandworm Team, against Ukraine in 2016. “Triton is consistent with these attacks, in that it could prevent safety mechanisms from executing their intended function, resulting in a physical consequence,” FireEye said.
Here are some more details of the attack, per FireEye:
FireEye hedged its bet to formally attribute the attack to a state sponsored entity but did suggest that the hacker’s evident resources combined with no apparent demand for financial gain pointed in that direction. “The targeting of critical infrastructure as well as the attacker’s persistence, lack of any clear monetary goal and the technical resources necessary to create the attack framework suggest a well-resourced nation state actor,” the researchers wrote.
Here are some more details about the Triton malware, per FireEye: