Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Industroyer

Industroyer

Industroyer is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.[1]Industroyer was used in the attacks on the Ukrainian power grid in December 2016.[2] This is the first publicly known malware specifically designed to target and impact operations in the electric grid.[3]

ID: S0604
Associated Software: CRASHOVERRIDE, Win32/Industroyer
Type: MALWARE
Platforms: Windows
Contributors: Dragos Threat Intelligence; Joe Slowik - Dragos
Version: 1.1
Created: 04 January 2021
Last Modified: 11 April 2024

Associated Software Descriptions

NameDescription
CRASHOVERRIDE

[2]

Win32/Industroyer

[1]

Enterprise Layer
downloadview
ICS Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Industroyer’s main backdoor connected to a remote C2 server using HTTPS.[1]

EnterpriseT1554Compromise Host Software Binary

Industroyer has used a Trojanized version of the Windows Notepad application for an additional backdoor persistence mechanism.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Industroyer can use an arbitrary system service to load at system boot for persistence and replaces the ImagePath registry value of a Windows service with a new backdoor binary.[2]

EnterpriseT1485Data Destruction

Industroyer’s data wiper module clears registry keys and overwrites both ICS configuration and Windows files.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

Industroyer decrypts code to connect to a remote C2 server.[1]

EnterpriseT1499.004Endpoint Denial of Service:Application or System Exploitation

Industroyer uses a custom DoS tool that leverages CVE-2015-5374 and targets hardcoded IP addresses of Siemens SIPROTEC devices.[1]

EnterpriseT1041Exfiltration Over C2 Channel

Industroyer sends information about hardware profiles and previously-received commands back to the C2 server in a POST-request.[1]

EnterpriseT1083File and Directory Discovery

Industroyer’s data wiper component enumerates specific files on all the Windows drives.[1]

EnterpriseT1105Ingress Tool Transfer

Industroyer downloads a shellcode payload from a remote C2 server and loads it into memory.[1]

EnterpriseT1046Network Service Discovery

Industroyer uses a custom port scanner to map out a network.[1]

EnterpriseT1027Obfuscated Files or Information

Industroyer uses heavily obfuscated code in its Windows Notepad backdoor.[1]

EnterpriseT1572Protocol Tunneling

Industroyer attempts to perform an HTTP CONNECT via an internal proxy to establish a tunnel.[2]

EnterpriseT1090.003Proxy:Multi-hop Proxy

Industroyer usedTor nodes for C2.[2]

EnterpriseT1012Query Registry

Industroyer has a data wiper component that enumerates keys in the RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services.[1]

EnterpriseT1018Remote System Discovery

Industroyer can enumerate remote computers in the compromised network.[1]

EnterpriseT1489Service Stop

Industroyer’s data wiper module writes zeros into the registry keys inSYSTEM\CurrentControlSet\Services to render a system inoperable.[2]

EnterpriseT1082System Information Discovery

Industroyer collects the victim machine’s Windows GUID.[2]

EnterpriseT1016System Network Configuration Discovery

Industroyer’s 61850 payload component enumerates connected network adapters and their corresponding IP addresses.[1]

EnterpriseT1078Valid Accounts

Industroyer can use supplied user credentials to execute processes and stop services.[1]

ICST0800Activate Firmware Update Mode

TheIndustroyer SIPROTEC DoS module places the victim device into firmware update mode. This is a legitimate use case under normal circumstances, but in this case is used the adversary to prevent the SIPROTEC from performing its designed protective functions. As a result the normal safeguards are disabled, leaving an unprotected link in the electric transmission.[4]

ICST0802Automated Collection

Industroyer automatically collects protocol object data to learn about control devices in the environment.[5]

ICST0803Block Command Message

InIndustroyer the first COM port from the configuration file is used for the actual communication and the two other COM ports are just opened to prevent other processes accessing them. Thus, the IEC 101 payload component is able to take over and maintain control of the RTU device.[5]

ICST0804Block Reporting Message

Industroyer uses the first COM port from the configuration file for the communication and the other two COM ports are opened to prevent other processes accessing them. This may block processes or operators from getting reporting messages from a device.[5]

ICST0805Block Serial COM

InIndustroyer the first COM port from the configuration file is used for the actual communication and the two other COM ports are just opened to prevent other processes accessing them. Thus, the IEC 101 payload component is able to take over and maintain control of the RTU device.[5]

ICST0806Brute Force I/O

TheIndustroyer IEC 104 module has 3 modes available to perform its attack. These modes are range, shift, and sequence. The range mode operates in 2 stages. The first stage of range mode gathers Information Object Addresses (IOA) and sends select and execute packets to switch the state. The second stage of range mode has an infinite loop where it will switch the state of all of the previously discovered IOAs. Shift mode is similar to range mode, but instead of staying within the same range, it will add a shift value to the default range values.[5]

ICST0807Command-Line Interface

The name of theIndustroyer payload DLL is supplied by the attackers via a command line parameter supplied in one of the main backdoors execute a shell command commands.[5]

ICST0884Connection Proxy

Industroyer attempts to connect with a hardcoded internal proxy on TCP 3128 [default Squid proxy]. If established, the backdoor attempts to reach an external C2 server via the internal proxy.[6]

ICST0809Data Destruction

Industroyer has a destructive wiper that overwrites all ICS configuration files across the hard drives and all mapped network drives specifically targeting ABB PCM600 configuration files.[6]

ICST0813Denial of Control

Industroyer is able to block serial COM channels temporarily causing a denial of control.[5]

ICST0814Denial of Service

TheIndustroyer SIPROTEC DoS module exploits the CVE-2015-5374 vulnerability in order to render a Siemens SIPROTEC device unresponsive. Once this vulnerability is successfully exploited, the target device stops responding to any commands until it is rebooted manually.[5] Once the tool is executed it sends specifically crafted packets to port 50,000 of the target IP addresses using UDP. The UDP packet contains the following 18 byte payload: 0x11 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 9E.[5]

ICST0815Denial of View

Industroyer is able to block serial COM channels temporarily causing a denial of view.[5]

ICST0816Device Restart/Shutdown

TheIndustroyer SIPROTEC DoS module exploits the CVE-2015-5374 vulnerability in order to render a Siemens SIPROTEC device unresponsive. While the vulnerability does not directly cause the restart or shutdown of the device, the device must be restarted manually before it can resume operations.[5]

ICST0827Loss of Control

Industroyer's data wiper component removes the registry image path throughout the system and overwrites all files, rendering the system unusable.[5]

ICST0837Loss of Protection

Industroyer contained a module which leveraged a vulnerability in the Siemens SIPROTEC relays (CVE-2015-5374) to create a Denial of Service against automated protective relays.[4]

ICST0829Loss of View

Industroyer's data wiper component removes the registry image path throughout the system and overwrites all files, rendering the system unusable.[5]

ICST0831Manipulation of Control

Industroyer toggles breakers to the open state utilizing unauthorized command messages.[5]

ICST0832Manipulation of View

Industroyer's OPC module can brute force values and will send out a 0x01 status which for the target systems equates to a Primary Variable Out of Limits misdirecting operators from understanding protective relay status.[5]

ICST0801Monitor Process State

Industroyer's OPC and IEC 61850 protocol modules include the ability to send stVal requests to read the status of operational variables.[5]

ICST0840Network Connection Enumeration

Industroyer contains an IEC 61850 module that enumerates all connected network adapters to determine their TCP/IP subnet masks.[5]

ICST0846Remote System Discovery

TheIndustroyer IEC 61850 payload component has the ability to discover relevant devices in the infected host's network subnet by attempting to connect on port 102.[5]

Industroyer contains an OPC DA module that enumerates all OPC servers using theICatInformation::EnumClassesOfCategories method withCATID_OPCDAServer20 category identifier andIOPCServer::GetStatus to identify the ones running.

ICST0888Remote System Information Discovery

TheIndustroyer IEC 61850 component sends the domain-specific MMSgetNameList request to determine what logical nodes the device supports. It then searches the logical nodes for the CSW value, which indicates the device performs a circuit breaker or switch control function.[1]

Industroyer's OPC DA module also uses IOPCBrowseServerAddressSpace to look for items with the following strings: ctlSelOn, ctlOperOn, ctlSelOff, ctlOperOff, Pos and stVal.[1]

Industroyer IEC 60870-5-104 module includes a range mode to discover Information Object Addresses (IOAs) by enumerating through each.[1]

ICST0881Service Stop

Industroyer has the capability to stop a service itself, or to login as a user and stop a service as that user.[5]

ICST0855Unauthorized Command Message

Using its protocol payloads,Industroyer sends unauthorized commands to RTUs to change the state of equipment.[5]

Groups That Use This Software

Campaigns

IDNameDescription
C00252016 Ukraine Electric Power Attack

Within the2016 Ukraine Electric Power Attack,Industroyer was used to target and disrupt the Ukrainian power grid substation components.[3][1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp