Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

‘Hexane’ Threat Actor Targeting Industrial Organizations

Security researchers from industrial cybersecurity firm Dragos say they have identified a new threat actor targeting industrial control systems (ICS) related entities in the oil and gas and telecommunications sectors. 

Security researchers from industrial cybersecurity firm Dragos say they have identified a new threat actor targeting industrial control systems (ICS) related entities in the oil and gas and telecommunications sectors. 

Referred to as HEXANE and active since at least mid-2018, the actor relies on malicious documents for initial intrusion. These documents drop malware onto the targeted environments to provide attackers with an initial foothold. 

The group has become increasingly active in the first half of 2019, targeting oil and gas companies in the Middle East, mainly those in Kuwait. 

The actor also hit telecommunication providers in the greater Middle East, Central Asia, and Africa, likely the first step in future network-focused man-in-the-middle and related attacks. 

This telecommunications targeting is in line with activity trends of other ICS adversaries as well, as they are increasingly targeting third-party organizations along the supply chains of potential targets. Last year, the XENOTIME group targeted several industrial original equipment manufacturers (OEMs), and hardware and software suppliers. 

“By compromising devices, firmware, or telecommunications networks used by targets within ICS, malicious activity could potentially enter the victim environment through a trusted vendor, bypassing much of the entity’s security stack,” Dragos notes in a report shared with SecurityWeek

The newly identified HEXANE shows similarities with previously observed threat actors MAGNALLIUM and CHRYSENE, as all are focused largely on oil and gas, while also showing similarities in some behaviors and tactics, techniques, and procedures (TTPs). 

What’s more, MAGNALLIUM too has showed an increase in activity in early- to mid-2019. Most recently, the group was observed targeting US government and financial organizations, along with oil and gas companies, in an attempt to gain access to computers within the target organizations’ environments.

“However, the collection of HEXANE behaviors, tools, and victimology makes this a unique entity compared to these previously-observed activity groups,” Dragos says.

HEXANE appears mostly focused on targets in the critical infrastructure, but victimology is divided between ICS verticals and telecommunications operations. The group’s infrastructure and capabilities, including malicious domains and detection evasion schemes, are different from related actors. 

At the moment, HEXANE does not appear to have the access or capabilities needed to disrupt ICS networks, Dragos concludes. 

Related: Learn More at SecurityWeek’s ICS Cyber Security Conference

Related: Five Threat Groups Target Industrial Systems: Dragos

Related: Hackers Behind ‘Triton’ Malware Target Electric Utilities in US, APAC

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

ICS/OT

Serious vulnerabilities found in Econolite EOS traffic controller software can be exploited to control traffic lights, but the flaws remain unpatched.

ICS/OT

A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.

ICS/OT

Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.