The senior threat researcher with Trend Micro, Kyle Wilhoit, has recently discovered 13 different types of crimeware disguised as new versions for human machine interface (HMI) software for Siemens Simatic WinCC, GE Cimplicity, and Advantech device drivers.
The news has been reported by the Dark Reading website, the expert explained that this new wave of attacks is very interesting because it reveals a new trend in the criminal ecosystem.
Wilhoit first noticed the anomalous spike in the attacks last October, the attackers run spear-phishing campaigns and drive-by downloads to compromise victims’ machine. The attacker shares links to the fake HMI product uploader which serves the financial malware on the machine. In some cases, the visitor is redirected to a website that looks like the legitimate Siemens website to trick the users into downloading a SCADA software or any update.
Wilhoit believes that these attacks are not carried out by state-sponsored hackers with for cyber espionage or sabotage. The attacks are conducted by criminal crews with traditional financial crimeware.
“It’s an interesting trend — traditional banking Trojans, not targeted attacks,” Wilhoit says.
The attacks represent a serious menace for the industrial environment, despite ICS/SCADA systems have been targeted in the past by several vyber threats (i.e. Havex and BlackEnergy, and the most popular Stuxnet), the discovery demonstrates the incresing interest of criminal organizations in the hacking of industrial systems.
“So to succeed in attacking SCADA, you don’t have to necessarily be targeted in nature… The ultimate end goal here is probably not industrialized espionage, but to get banking credentials” said Wilhoit referring that cyber criminals are interested to any kinf of financially lucrative information.
The ICS/SCADA systems are an easy target for criminals because in many cases they run outdated software and they lack of proper security defenses. This happens because in the industry is always privileged the availability and the continuity of the processes instead the cyber security.
“We are starting to see a migration of attackers starting to realize SCADA is a good attack vector… because it’s so insecure,” said the researcher. “A lot we are finding are caught no problem with [up-to-date] antivirus,”
Wilhoit says targeted attacks on critical infrastructure via Havex and BlackEnergy indeed remain a threat, but the Financial crimeware could have a serious impact on industrial systems, causing the disruption of the environment by breaching through vulnerable HMI software.
“HMI systems are very finicky, so it doesn’t take much to make these things fall over. Financial information could be stolen, but what if an [HMI] box drops inadvertently?” he says.
Wilhoit confirmed to have found 32 financial malware samples disguised as WinCC software, be aware the hackers haven’t compromised legitimate software, instead they are offering bogus software that infect the machine.
“They have been using the WinCC naming convention and file structure, as malware,” he says. “The shift… is they [attackers] are utilizing valid applications, valid SCADA naming conventions, so the banking Trojan looks like SCADA software,””They’re not exploiting vulnerabilities in those products,”
Wilhoit will provide further data the attacks he uncovered next week at the S4 ICS/SCADA conference in Miami where he will also present a malware-based attack scenario of the targeted SCADA. The experts will focus on data exfiltration operated by financial malware used by the attackers.
“I’m going to create malware targeting an ICS system and hiding its traffic on a valid ICS Modbus” network, he says. “I’m doing it to show how fast you can craft malware that’s not terribly advanced but will bypass AV or” other security measures, he says.
(Security Affairs – SCADA, malware)