“Everybody talks, nobody listens. Good listeners are as rare as white crows” – Helen Keller
Wired[1] cites a Dragos report[2] on a cyber-attack on ICS with affect on well-being of society.
The attack was performed using the MODBUS protocol[3] and was able to manipulate ICS devices (ENCON PLC) to cause heating systems to fail in 600 buildings this past January in Lviv, Ukraine. Sources are Ukrainian city officials, utility, and security services. Several requests for additional comment made by Wired were not answered.
As a follow on an individual is demonstrating how he used SHODAN to locate 30 ENCON devices found in Romania, Ukraine and Lithuania and was able to issue some Modbus commands. Wired also names a Lithuanian company as one of the suppliers of control devices to Ukraine:
“malware was used to target ENCO control devices—Modbus-enabled industrial monitoring tools sold by the Lithuanian firm Axis Industries—and change their temperature outputs to turn off the flow of hot water “
Some take-aways for me:
- This is another of the brief glimpses we have seen of what is going on below the cyberg[4].
- PLC’s are surely devices of interest by those seeking to disrupt critical infrastructure.
- Security of the supply chain continues to be a serious issue that manufacturers and suppliers need to take note of.
- Modbus which is a tried and true protocol with little or no cybersecurity continues to be widely applied in ICS environments. There is even an organisation that is promoting it[5].
- The implications of Project Shine still have not sunken in that far in the asset owner’s world.
- If an individual researcher is using SHODAN to demonstrate success at finding ICS devices, then one must wonder what the state supported cyber samurai are doing.
- Do not fully agree with one of Drago’s conclusions that “ this threat underscores the urgent need for ICS network visibility and monitoring of Modbus TCP traffic” if that means providing cybersecurity analysts located in the office IT side with more access to control networks .
Finally those involved in offense continue to be ahead of the policy makers trying to defend critical infrastructure who in one national cyber strategy chose to name “baby monitors” and “personal fitness devices” without even thinking about mentioning PLCs[6].
[1] https://www.wired.com/story/russia-ukraine-frostygoop-malware-heating-utility/
[2] https://hub.dragos.com/report/frostygoop-ics-malware-impacting-operational-technology
[3] https://modbus.org/faq.php
[5] https://modbus.org/
[6] http://scadamag.infracritical.com/index.php/2023/03/15/impressions-of-the-u-s-national-cybersecurity-strategy-of-2023/