Pipedream (toolkit)
Pipedream is a software framework for malicious code targeting programmable logic controllers (PLCs) and industrial control systems (ICS).[1] First publicly disclosed in 2022, it has been described as a "Swiss Army knife" for hacking.[1] It is believed to have been developed by state-level Advanced Persistent Threat actors.[1]
The name "Pipedream" was given by the cybersecurity company Dragos;[2] the cybersecurity company Mandiant uses the name "Incontroller".[3][4] It has been compared with the Industroyer toolkit used in the December 2015 Ukraine power grid cyberattack.[3] Dragos refers to the authors of the software as Chernovite.[5]
Details
The toolkit consists of custom-made tools that, once they have established initial access in an operational technology (OT) network, enables them to scan for, compromise, and control certain ICS/SCADA devices, including the following:[6]
- Schneider Electric PLCs,
- OMRON Sysmac NEX PLCs, and
- Open Platform Communications Unified Architecture (OPC UA) servers.
The toolkit has a modular architecture and enables cyber actors to conduct highly automated exploits against targeted devices. The tools have a virtual console with a command interface that mirrors the interface of the targeted ICS/SCADA device. Modules interact with targeted devices, enabling operations by lower-skilled cyber actors to emulate higher-skilled actor capabilities.[6]
APT actors can leverage the modules to scan for targeted devices, conduct reconnaissance on device details, upload malicious configuration/code to the targeted device, back up or restore device contents, and modify device parameters.[6]
In addition, the APT actors can use a tool that installs and exploits a known-vulnerable ASRock-signed motherboard driver, AsrDrv103.sys, exploiting CVE-2020-15368 to execute malicious code in the Windows kernel. Successful deployment of this tool can allow APT actors to move laterally within an IT or OT environment and disrupt critical devices or functions.[6]
See also
- Industroyer
- Stuxnet
- Havex
- Triton (malware)
References
- ↑ 1.0 1.1 1.2 Greenberg, Andy. "Feds Uncover a 'Swiss Army Knife' for Hacking Industrial Systems" (in en-US). Wired. ISSN 1059-1028. https://www.wired.com/story/pipedream-ics-malware/. Retrieved 2022-04-15.
- ↑ "CHERNOVITE's PIPEDREAM Malware Targeting Industrial Control Systems (ICS)" (in en-US). 2022-04-13. https://www.dragos.com/blog/industry-news/chernovite-pipedream-malware-targeting-industrial-control-systems/.
- ↑ 3.0 3.1 Page, Carly (14 April 2022). "State-backed hackers have developed custom malware" (in en-US). https://social.techcrunch.com/2022/04/14/us-warns-of-state-backed-malware-designed-to-hijack-critical-infrastructure-systems/.
- ↑ "INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems" (in en). https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool.
- ↑ "CHERNOVITE Threat Activity Group" (in en-US). 2022-04-13. https://www.dragos.com/threat/chernovite/.
- ↑ 6.0 6.1 6.2 6.3 "APT Cyber Tools Targeting ICS/SCADA Devices". https://www.cisa.gov/uscert/ncas/alerts/aa22-103a.
Original source: https://en.wikipedia.org/wiki/Pipedream (toolkit).
Read more |