Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Destructive ICS Malware ‘Fuxnet’ Used by Ukraine Against Russian Infrastructure

ICS malware Fuxnet allegedly used by Ukrainian Blackjack group to disrupt industrial sensors and other systems belonging to a Moscow infrastructure firm.

ICS malware Fuxnet

Industrial and enterprise IoT cybersecurity firm Claroty has conducted an analysis of Fuxnet, a piece of industrial control system (ICS) malware used recently by Ukrainian hackers in an attack aimed at a Russian underground infrastructure company.

In recent months, a hacker group named Blackjack, which is believed to be affiliated with Ukraine’s security services, has claimed to have launched attacks against several key Russian organizations. The hackers targeted ISPs, utilities, data centers and Russia’s military, and allegedly caused significant damage and exfiltrated sensitive information. 

Last week, Blackjack disclosed the details of an alleged attack aimed at Moscollector, a Moscow-based company responsible for underground infrastructure, including water, sewage and communication systems.

“Russia’s industrial sensor and monitoring infrastructure has been disabled,” the hackers claimed. “It includes Russia’s Network Operation Center (NOC) [that] monitors and controls gas, water, fire alarm and many others, including a vast network of remote sensors and IoT controllers.”

The hackers claimed to have wiped database, email, internal monitoring and data storage servers. 

In addition, they claimed to have disabled 87,000 sensors, including ones associated with airports, subway systems and gas pipelines. To achieve this, they claimed to have used Fuxnet, a malware they described as “Stuxnet on steroids”, which enabled them to physically destroy sensor equipment.

“Fuxnet has now started to flood the RS485/MBus and is sending ‘random’ commands to 87,000 embedded control and sensory systems (carefully excluding hospitals, airports, and other civilian targets),” the hackers said.

The hackers’ claims are difficult to verify, but Claroty was able to conduct an analysis of the Fuxnet malware based on information and code made available by Blackjack.

Advertisement. Scroll to continue reading.

The cybersecurity firm pointed out that the actual sensors deployed by Moscollector, which are used to collect physical data such as temperature, were likely not damaged by Fuxnet. Instead, the malware likely targeted roughly 500 sensor gateways, which communicate with the sensors over a serial bus such as the RS485/Meter-Bus that was mentioned by Blackjack. These gateways are also connected to the internet to be able to transmit data to the company’s global monitoring system. 

“If the gateways were indeed damaged, the repairs could be extensive given that these devices are spread out geographically across Moscow and its suburbs, and must be either replaced or their firmware must be individually reflashed,” Claroty noted.

Claroty’s analysis of Fuxnet showed that the malware was likely deployed remotely. Once on a device, it would start deleting important files and directories, shutting down remote access services to prevent remote restoration, and deleting routing table information to prevent communication with other devices. Fuxnet would then delete the file system and rewrite the device’s flash memory.  

Once it has corrupted the file system and blocked access to the device, the malware attempts to physically destroy the NAND memory chip and then rewrites the UBI volume to prevent rebooting. 

In addition, the malware attempts to disrupt the sensors connected to the gateway by flooding the serial channels with random data in an effort to overload the serial bus and the sensors. 

“During the malware operation, it will repeatedly write arbitrary data over the Meter-Bus channel. This will prevent the sensors and the sensor gateway from sending and receiving data, rendering the sensor data acquisition useless,” Claroty explained. “Therefore, despite the attackers’ claim of compromising 87,000 devices, it seems that they actually managed to infect the sensor gateways only and were trying to cause further disruption by flooding the Meter-Bus channel connecting the different sensors to the gateway, similar to network fuzzing the different connected sensor equipment. As a result, it appears only the sensor gateways were bricked, and not the end-sensors.”

Related: Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis

Related: CosmicEnergy ICS Malware Poses No Immediate Threat, but Should Not Be Ignored

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.

Register

People on the Move

Fastly announced that Scott Lovett will join the company as Chief Revenue Officer, effective June 3, 2024.

Digital transformation consulting firm Synechron has hired Aaron Momin as CISO.

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

More People On The Move

Expert Insights