Security researchers from industrial cybersecurity firm Dragos say they have identified a new threat actor targeting industrial control systems (ICS) related entities in the oil and gas and telecommunications sectors.
Referred to as HEXANE and active since at least mid-2018, the actor relies on malicious documents for initial intrusion. These documents drop malware onto the targeted environments to provide attackers with an initial foothold.
The group has become increasingly active in the first half of 2019, targeting oil and gas companies in the Middle East, mainly those in Kuwait.
The actor also hit telecommunication providers in the greater Middle East, Central Asia, and Africa, likely the first step in future network-focused man-in-the-middle and related attacks.
This telecommunications targeting is in line with activity trends of other ICS adversaries as well, as they are increasingly targeting third-party organizations along the supply chains of potential targets. Last year, the XENOTIME group targeted several industrial original equipment manufacturers (OEMs), and hardware and software suppliers.
“By compromising devices, firmware, or telecommunications networks used by targets within ICS, malicious activity could potentially enter the victim environment through a trusted vendor, bypassing much of the entity’s security stack,” Dragos notes in a report shared with SecurityWeek.
The newly identified HEXANE shows similarities with previously observed threat actors MAGNALLIUM and CHRYSENE, as all are focused largely on oil and gas, while also showing similarities in some behaviors and tactics, techniques, and procedures (TTPs).
What’s more, MAGNALLIUM too has showed an increase in activity in early- to mid-2019. Most recently, the group was observed targeting US government and financial organizations, along with oil and gas companies, in an attempt to gain access to computers within the target organizations’ environments.
“However, the collection of HEXANE behaviors, tools, and victimology makes this a unique entity compared to these previously-observed activity groups,” Dragos says.
HEXANE appears mostly focused on targets in the critical infrastructure, but victimology is divided between ICS verticals and telecommunications operations. The group’s infrastructure and capabilities, including malicious domains and detection evasion schemes, are different from related actors.
At the moment, HEXANE does not appear to have the access or capabilities needed to disrupt ICS networks, Dragos concludes.
Related: Learn More at SecurityWeek’s ICS Cyber Security Conference
Related: Five Threat Groups Target Industrial Systems: Dragos
Related: Hackers Behind ‘Triton’ Malware Target Electric Utilities in US, APAC

More from Ionut Arghire
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
Latest News
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
