Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Iran-linked IOCONTROL malware targets Linux-based SCADA and IoT platforms
Global Security

Iran-linked IOCONTROL malware targets Linux-based SCADA and IoT platforms

AdminBy AdminDecember 13, 2024No Comments3 Mins Read
IOCONTROL Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 13, 2024Hacker newsIoT Security / Operational Technology

IOCONTROL malware

Iran-linked threat actors have been linked to new custom malware targeting IoT and operational technology (OT) environments in Israel and the US.

The malware received a code name IOCONTROL from cybersecurity company OT Claroty, highlighting its ability to attack IoT and SCADA devices such as IP cameras, routers, programmable logic controllers (PLCs), human machine interfaces (HMIs), firewalls, and other Linux-based based on IoT/OT platforms.

“Although the malware is believed to be custom-built by the threat actor, it appears that the malware is generic enough to run on different platforms from different vendors due to its modular configuration,” the report said. companies. said.

Cyber ​​security

Development is done by IOCONTROL the tenth family of malicious programs to single out Industrial Control Systems (ICS) after Stuxnet, Havex, Industroyer (aka CrashOverride), Triton (aka Trisis), BlackEnergy2, Industroyer2, PIPEDREAM (aka INCONTROLLER), COSMICENERGY and FrostyGoop (aka BUSTLEBERM) to date .

Claroty said it has analyzed a sample of malware extracted from the Gasboy fuel management system, which was previously hacked by a hacking group called Cyber ​​Av3ngerswhich has been linked to cyber attacks using Unitronics PLCs to hack into water supply systems. The malware was embedded in the Gasboy payment terminal, otherwise known as OrPT.

This also means that the threat actors, given their ability to control the payment terminal, also had the means to shut down fuel services and potentially steal customer credit card information.

“Malware is essentially a cyber weapon used by a nation state to attack civilian critical infrastructure; at least one of the victims was the Orpak and Gasboy fuel management systems,” Clarotti said.

The ultimate goal of the infection chain is to deploy a backdoor that is automatically launched every time the device is restarted. A notable aspect of IOCONTROL is its usability MQTTa messaging protocol widely used in IoT devices for communication that allows threat actors to mask malicious traffic.

Moreover, command and control (C2) domains are resolved using Cloudflare’s DNS-over-HTTPS (DoH) service. This approach, already adopted by Chinese and Russian nation-state groups, is important because it allows malware to avoid detection when sending DNS requests in the open.

Cyber ​​security

After a successful C2 connection is established, the malware transmits device information, namely hostname, current user, device name and model, time zone, firmware version, and location, to the server after waiting for further commands to execute.

This includes checking for malware installation in a designated directory, executing arbitrary operating system commands, terminating the malware, and scanning an IP range on a specific port.

“The malware interacts with C2 over a secure MQTT channel and supports basic commands including arbitrary code execution, self-deletion, port scanning and more,” Clarotti said. “This feature is sufficient to control remote IoT devices and perform lateral movement when needed.”

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.