INCONTROLLER: fresh Malware Developed to mark Industrial Control Systems
Only a fewer times in past we have seen publically documented malware developed to mark industrial control systems (ICS). Over 10 years ago STUXNET impacted Iranian atomic centrifuges. Then INDUSTROYER turned off electrical power in Ukraine and TRITON targeted the safety systems from a critical infrastructure organization. Today, a couple years later, we ran into INCONTROLLER. INCONTROLLER is simply a set of fresh ICS- oriented attack tools built to mark circumstantial Schneider electrical and Omron devices that are embedded in different types of machinery leveraged across multiple industries. The tools – which are very likely state-sponsored – represent an exceptionally uncommon and dangerous cyber-attack that contains capabilities related to disruption, sabotage, and possibly physical destruction. In this talk I will present our analysis of INCONTROLLER, its components, attack scenarios, and the implications for defenders.
Website: https://confidence-conference.org
Facebook: https://www.facebook.com/confidence.conference
Twitter: https://twitter.com/confidenceconf