ICS/OT

Examining Triton Attack Framework: Lessons Learned in Protecting Industrial Systems

Recently, the infamous Triton (also known as Trisis) malware framework made news again after researchers from FireEye found evidence of the same attacker lurking in other critical infrastructure.

<p><span><span>Recently, the infamous Triton (also known as Trisis) malware framework <a href="https://www.securityweek.com/triton-hackers-focus-maintaining-access-compromised-systems-fireeye">made news again</a> after researchers from FireEye found evidence of the same attacker lurking in other critical infrastructure.

Recently, the infamous Triton (also known as Trisis) malware framework made news again after researchers from FireEye found evidence of the same attacker lurking in other critical infrastructure. In 2017, Triton was behind an attack that shut down Schneider Electric’s Triconex safety instrumentation system (SIS) at a petrochemical plant in Saudi Arabia — the malware went undetected for nearly a year and has been linked to a group called XENOTIME, affiliated with the Russian government. It was one of the first ever instances of a cyber physical attack aimed at targeting a safety system, the Triconex SIS platform, which is widely used in many industrial environments to monitor industrial processes and shut them down if something goes wrong.

Of course, attacks targeting critical infrastructure are nothing new. In 2010, Stuxnet targeted Iranian nuclear facilities. Not long after, we saw Flamer, Duku, BlackEnergy and Gauss. In 2016, CrashOverride caused blackouts in the Ukraine. So what do all of these malware attacks have in common? They all show evidence of modular attack frameworks being used by various threat actors, indicating that nation states are primed and ready to carry out even more attacks on critical infrastructure.

What’s most concerning is that the idea of attacking SIS systems could be used anywhere, including SIS systems from other manufacturers. The original exploitation of a zero-day vulnerability could be focused on other vulnerabilities, known or unknown. The framework to target SISes is not much different from attacking other ICS/SCADA or  distributed control systems. Examining the Triton attack toolkit and methodology behind it now offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks. 

So how exactly do you harden industrial control systems? 

Given that most of these attacks start with IT (Windows) platform exploitation, organizations should pay particular attention to the use of these systems in OT networks. All of the IT security functions should be reviewed and be up to date on patches/antivirus/host intrusion detection system capabilities. Network firewalls, and perimeter protections/analysis capabilities should be up to date on the published TTPs. 

Beyond that, staying in close communication with updated maintenance patching for industrial systems will help when trying to secure legacy, brownfield devices. Hardening these brownfield devices is tricky because some just cannot be patched. For those that can’t be updated, industrial gateway platforms can be put in front of the vulnerable systems. Long term, consumers should require their vendors to build in security mechanisms into industrial devices, thereby providing for sound supply chain best practices, device hardening/tamper resistance, and ultimately a means to convey trustworthiness on demand or at intervals across the entire OT environment.

It’s important to note that once attackers discover and learn these defenses, they are always looking for the easiest way around them, which in many cases is just some modest modification to malicious code already proven to be effective at some levels. At the end of the day, adversaries follow the same steps with a similar methodology in conducting attacks: 

1. Gain a toehold in the IT infrastructure of the target

Advertisement. Scroll to continue reading.

2. Escalate privilege to gain access to industrial elements (OT)

3. Perform reconnaissance in the OT environment by looking for existing or new vulnerabilities to be exploited

4. Exploit said vulnerabilities to establish a persistent presence

5. Repeat surreptitious access on demand; and 

6. Pivot and launch other exploits from these beachheads are common aspect of modern attacks

Knowing these tried and true repeatable attack patterns and hardening critical infrastructure devices is the best way for IT/OT teams to prepare for another inevitable round of Triton-like attacks in the future.

Learn More at SecurityWeek’s ICS Cyber Security Conference

Related Content

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

ICS/OT

In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that...

ICS/OT

SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.

ICS/OT

Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.

ICS/OT

The Municipal Water Authority of Aliquippa was just one of multiple organizations breached in the U.S. by Iran-linked "Cyber Av3ngers" hackers

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS/OT

Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version