{"id":3808,"date":"2019-04-12T16:14:08","date_gmt":"2019-04-12T19:14:08","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=3808"},"modified":"2019-04-12T16:14:08","modified_gmt":"2019-04-12T19:14:08","slug":"el-malware-triton-ataca-de-nuevo","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=3808","title":{"rendered":"El malware Triton ataca de nuevo"},"content":{"rendered":"<p style=\"font-weight: 400;\"><u><\/u>Han sido hallados \u201crastros\u201d de otro ataque cibern\u00e9tico del malware \u201cTriton\u201d a una instalaci\u00f3n industrial aut\u00f3noma, del \u00e1rea Petroqu\u00edmica en Arabia Saudita. Este ataque de hackers orientados al ciberterrorisrmo \/ cibervandalismo, normalmente realiza sus acciones ingresando maliciosamente a los sistemas de control completamente aut\u00f3nomos, con que hoy operan las modernas plantas industriales, provocando\u00a0 severos da\u00f1os\u00a0y hasta destrucci\u00f3n de los citados sistemas, con las consecuencias imaginables en los procesos, en la infraestructura y en la\u00a0 seguridad.<!--more--><\/p>\n<p id=\"speakable-summary\"><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2019\/04\/refinery.jpg?w=730&amp;crop=1\" alt=\"refinery\" width=\"407\" height=\"270\" \/>A highly capable hacker group reportedly behind a failed plot to blow up a Saudi petrochemical plant has now been found in a second facility.<\/p>\n<p><a class=\"crunchbase-link\" href=\"https:\/\/crunchbase.com\/organization\/fireeye\" target=\"_blank\" data-type=\"organization\" data-entity=\"fireeye\" rel=\"noopener noreferrer\">FireEye\u00a0<\/a>\u00a0researchers said it found traces of the so-called Triton group in another\u00a0unnamed \u201ccritical infrastructure\u201d facility. The group\u2019s eponymous\u00a0malware, previously\u00a0<a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/10\/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html\">linked to the Russian government<\/a>, is designed to burrow into a target\u2019s networks and sabotage their industrial control systems, often used in power plants and oil refineries to control the operations of the facility.<\/p>\n<p>By compromising these controls, a successful attack can cause significant disruption \u2014 even destruction.<\/p>\n<p>The company was tight-lipped on the intrusion at the second facility, declining\u00a0to describe the type of facility or its location \u2014 or even the year of the attack.<\/p>\n<p>\u201cWe assess the group was attempting to build the capability to cause physical damage at the facility when they accidentally caused a process shutdown that led to the Mandiant investigation,\u201d said Nathan Brubaker, senior manager, analysis at FireEye, in an email to TechCrunch describing the first incident.<\/p>\n<p>Brubaker declined to comment on the motives of the second facility.<\/p>\n<p>FireEye\u2019s latest research revealed more about how the hackers work. Their findings showed the hackers could spend close to a year after their initial compromise of a facility\u2019s network before launching a deeper assault, taking the time to prioritize their understanding of how the network looked and how to pivot from one system to another. The hackers\u2019 goal is to quietly gain access to the facility\u2019s safety instrumented system, an autonomous monitor that ensures physical systems don\u2019t operate outside of their normal operational state. These critical systems are strictly segmented from the rest of the network to prevent any damage in the event of a cyberattack.<\/p>\n<p>By gaining access to the critical safety system, the hackers focused on finding a way to effectively deploy\u00a0<a class=\"crunchbase-link\" href=\"https:\/\/crunchbase.com\/organization\/triton\" target=\"_blank\" data-type=\"organization\" data-entity=\"triton\" rel=\"noopener noreferrer\">Triton\u2019s\u00a0<\/a>\u00a0payloads to carry out their mission without causing the systems to enter into a safe fail-over state.<\/p>\n<p>In the case of the\u00a0<a href=\"https:\/\/www.nytimes.com\/2018\/03\/15\/technology\/saudi-arabia-hacks-cyberattacks.html\" target=\"_blank\" rel=\"noopener noreferrer\">August 2017 attack<\/a>\u00a0in which Triton was deployed, the Saudi facility would have been destroyed had it not been for a bug in the code.<\/p>\n<p>\u201cThese attacks are also often carried out by nation states that may be interested in preparing for contingency operations rather than conducting an immediate attack,\u201d said FireEye\u2019s report. \u201cDuring this time, the attacker must ensure continued access to the target environment or risk losing years of effort and potentially expensive custom [industrial control system] malware,\u201d said the report. \u201cThis attack was no exception.\u201d<\/p>\n<p>But the security firm warned that the attackers\u2019 slow and steady approach \u2014 which involved moving slowly and precisely as to not trigger any alarms \u2014 showed they had a deep focus on not getting caught. That, they said, suggests there may be other targets beyond the second facility \u201cwhere the [hackers] was or still is present.\u201d<\/p>\n<p>The security company published lists of hashes unique to the files found in the second facility\u2019s attack in a hope that IT staff in other at-risk industries and facilities can check for any compromise.<\/p>\n<p>\u201cNot only can these [tactics, techniques and procedures] be used to find evidence of intrusions, but identification of activity that has strong overlaps with the actor\u2019s favored techniques can lead to stronger assessments of actor association, further bolstering incident response efforts,\u201d the company said.<\/p>\n<p style=\"font-weight: 400;\"><strong>Fuente:\u00a0<\/strong><em><a href=\"https:\/\/techcrunch.com\/2019\/04\/09\/triton-malware-strike\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/techcrunch.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Han sido hallados \u201crastros\u201d de otro ataque cibern\u00e9tico del malware \u201cTriton\u201d a una instalaci\u00f3n industrial aut\u00f3noma, del \u00e1rea Petroqu\u00edmica en Arabia Saudita. Este ataque de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29,24],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/3808"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3808"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/3808\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}