Hacking

Is the Armageddon a PLC-Based Worm?

Three German security researchers have presented a PLC-based worm with Proof-of-Concept based on the Siemens SIMATIC S7-1200 PLC.

Three German security researchers have presented a PLC-based worm at Black Hat Asia. The proof of concept is based on the Siemens SIMATIC S7-1200 PLC which reminds us all two well of an earlier PLC attacking worm known as STUXNET.

STUXNET targeted Siemens SIMATIC S7-300 PLCs located in nuclear facilities in Iran. However, the main difference is that all of the worms targeting PLCs so far “lived” and spread in computers and only attacked PLCs. This new proof of concept worm, however, lives in, spreads over and attacks PLCs.

The worm was designed and developed specially for the PLC environment, which resulted in a custom and optimized PLC worm. The worm takes into account computing limits of PLCs and uses the limited resources accordingly.

The spreading mechanism avoided the historical mistake made by the Morris worm in the 80s by first checking if the target PLC has already been infected. As you’ll remember the Morris worm caused computers to crash because it didn’t check whether or not the target was already infected. Multiple infections then caused the target to lose all its resources and crash. The same problem could occur even more easily in systems that have more limited resources, such as PLCs, and apparently the researchers wanted to avoid this. If no signs of previous infection are detected the worm will copy itself to the target and start looking for new targets.

The worm replicates itself on the target PLC using ports and protocols used by Siemens SIMATIC PLCs.

Security researchers Ralf Spenneberg, Maik Brüggemann and Hendrik Schwartke who presented the proof of concept also added some features that simulate typical worm behavior. The worm connects to a command & control server using TCP. The worm also supports a basic proxy function that allows it to link the command & control server to any potential other targets within the infected network.

The worm can also start an endless loop which will eventually cause the PLC to crash in a denial of service (DoS) attack which in real life would cause whatever service or infrastructure (electricity, water, nuclear power plant, etc.) managed by the PLC to stop. Finally, the worm can also manipulate the outputs of the PLC which allows it to modify any value of the PLC process.

The fact that the worm spreads using PLCs makes it invisible to any host-based security solutions such as antivirus and host based IPS. This proof of concept worm requires the target PLC to stop for about 10 seconds during the initial infection phase, monitoring the PLC for such short interruptions could be a way to detect a potential infection. Monitoring the network traffic for ICS (Industrial Control System) specific traffic and connections could also be an effective way to detect an infection spreading on the network.

Written by:  Alper Başaran

About the Author: Alper Başaran is a Hacker and Penetration Tester – Buccaneer of the Interwebs, he owns the Turkish blog alperbasaran.com.

Alper Basaran provides business process focused and goal oriented penetration testing services to his customers. Based in Turkey he has expanded his operations to the Middle East.

 

[adrotate banner=”9″]

Edited by Pierluigi Paganini

(Security Affairs – PLC-Based Worm, malware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Texas oilfield supplier Newpark Resources suffered a ransomware attack

Texas oilfield supplier Newpark Resources suffered a ransomware attack that disrupted its information systems and…

4 hours ago

Palo Alto Networks warns of potential RCE in PAN-OS management interface

Palo Alto Networks warns customers to restrict access to their next-generation firewalls because of a…

8 hours ago

iPhones in a law enforcement forensics lab mysteriously rebooted losing their After First Unlock (AFU) state

Law enforcement warns that securely stored iPhones awaiting forensic examination are mysteriously rebooting, making them…

15 hours ago

U.S. CISA adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Palo Alto Expedition, Android, CyberPanel and Nostromo…

1 day ago

DPRK-linked BlueNoroff used macOS malware with novel persistence

SentinelLabs observed North Korea-linked threat actor BlueNoroff targeting businesses in the crypto industry with a new…

1 day ago

Canada ordered ByteDance to shut down TikTok operations in the country over security concerns

Canada ordered ByteDance to shut down TikTok operations over security concerns but did not issue…

2 days ago

This website uses cookies.