Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

‘Hexane’ Threat Actor Targeting Industrial Organizations

Security researchers from industrial cybersecurity firm Dragos say they have identified a new threat actor targeting industrial control systems (ICS) related entities in the oil and gas and telecommunications sectors. 

Security researchers from industrial cybersecurity firm Dragos say they have identified a new threat actor targeting industrial control systems (ICS) related entities in the oil and gas and telecommunications sectors. 

Referred to as HEXANE and active since at least mid-2018, the actor relies on malicious documents for initial intrusion. These documents drop malware onto the targeted environments to provide attackers with an initial foothold. 

The group has become increasingly active in the first half of 2019, targeting oil and gas companies in the Middle East, mainly those in Kuwait. 

The actor also hit telecommunication providers in the greater Middle East, Central Asia, and Africa, likely the first step in future network-focused man-in-the-middle and related attacks. 

This telecommunications targeting is in line with activity trends of other ICS adversaries as well, as they are increasingly targeting third-party organizations along the supply chains of potential targets. Last year, the XENOTIME group targeted several industrial original equipment manufacturers (OEMs), and hardware and software suppliers. 

“By compromising devices, firmware, or telecommunications networks used by targets within ICS, malicious activity could potentially enter the victim environment through a trusted vendor, bypassing much of the entity’s security stack,” Dragos notes in a report shared with SecurityWeek

The newly identified HEXANE shows similarities with previously observed threat actors MAGNALLIUM and CHRYSENE, as all are focused largely on oil and gas, while also showing similarities in some behaviors and tactics, techniques, and procedures (TTPs). 

What’s more, MAGNALLIUM too has showed an increase in activity in early- to mid-2019. Most recently, the group was observed targeting US government and financial organizations, along with oil and gas companies, in an attempt to gain access to computers within the target organizations’ environments.

Advertisement. Scroll to continue reading.

“However, the collection of HEXANE behaviors, tools, and victimology makes this a unique entity compared to these previously-observed activity groups,” Dragos says.

HEXANE appears mostly focused on targets in the critical infrastructure, but victimology is divided between ICS verticals and telecommunications operations. The group’s infrastructure and capabilities, including malicious domains and detection evasion schemes, are different from related actors. 

At the moment, HEXANE does not appear to have the access or capabilities needed to disrupt ICS networks, Dragos concludes. 

Related: Learn More at SecurityWeek’s ICS Cyber Security Conference

Related: Five Threat Groups Target Industrial Systems: Dragos

Related: Hackers Behind ‘Triton’ Malware Target Electric Utilities in US, APAC

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.