Incident: Title: Pipedream Malware Threatens Industrial Control Systems Worldwide

Published Date: 2022-04-13

Postmortem Analysis
Timeline 1. The software failure incident involving the Pipedream malware toolkit was reported in the article published on 2022-04-13 [126863]. Therefore, the software failure incident happened in April 2022.
System 1. Programmable Logic Controllers (PLCs) sold by Schneider Electric and OMRON 2. Open Platform Communications Unified Architecture (OPC UA) servers 3. Codesys software used in PLCs 4. Industrial control systems (ICS) software [126863]
Responsible Organization 1. An unnamed "APT actor" developed the malware toolkit targeting industrial control systems [126863].
Impacted Organization 1. Industrial control system equipment owners worldwide were impacted by the software failure incident involving malware targeting industrial control systems like power grids, factories, water utilities, and oil refineries [126863].
Software Causes 1. The failure incident was caused by a new hacker toolset malware designed to target industrial control systems, including programmable logic controllers (PLCs) and Open Platform Communications Unified Architecture (OPC UA) servers [126863].
Non-software Causes unknown
Impacts 1. The software failure incident involving the Pipedream malware toolkit had the potential to disrupt or take control of industrial control system equipment, including programmable logic controllers (PLCs) sold by Schneider Electric and OMRON, as well as Open Platform Communications Unified Architecture (OPC UA) servers [126863]. 2. The malware could hijack target devices, disrupt operators' access to them, permanently brick them, or provide hackers with access to other parts of an industrial control system network [126863]. 3. The incident highlighted the use of multiple zero-day vulnerabilities to exploit underlying software in PLCs, such as Codesys, which is widely used across various types of PLCs, posing a significant threat to industrial environments [126863]. 4. The malware's adaptability suggested a focus on power grid and oil refineries, with potential risks to petrochemical facilities, including the ability to send commands to servo motors via OMRON PLCs, which could lead to destruction or loss of life [126863]. 5. Infrastructure operators were advised to take protective measures, such as limiting network connections, implementing monitoring systems for ICS systems, and collaborating with security firms and government agencies to defend against potential threats [126863].
Preventions 1. Implementing monitoring systems for ICS systems that send alerts for suspicious behavior [126863]. 2. Limiting industrial control systems' network connections [126863]. 3. Collaborating with the US government and security firms to identify and develop protective measures against potential attacks [126863].
Fixes 1. Implementing monitoring systems for ICS systems that send alerts for suspicious behavior [126863] 2. Limiting industrial control systems' network connections [126863]
References 1. Department of Energy 2. Cybersecurity and Infrastructure Security Agency (CISA) 3. National Security Agency (NSA) 4. Federal Bureau of Investigation (FBI) 5. Dragos 6. Mandiant 7. Palo Alto Networks 8. Microsoft 9. Schneider Electric 10. OMRON 11. US government 12. Security firm Mandiant 13. WIRED 14. Biden administration 15. Russian government 16. Ukrainian officials 17. Justice Department 18. Russian hacker groups 19. Russian FSB intelligence agency 20. Sandworm hackers 21. Berserk Bear hacker group 22. Petro Rabigh 23. Saudi Arabian oil refinery 24. Iranian nuclear enrichment centrifuges 25. Ukrainian electrical utility 26. WIRED's sources [126863]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to targeting industrial control systems with malware, specifically exploiting underlying software in PLCs known as Codesys, has happened again at Schneider Electric and OMRON [126863]. (b) The software failure incident related to targeting industrial control systems with malware has also happened at other organizations beyond Schneider Electric and OMRON, as the malware could easily be adapted to work in almost any industrial environment, affecting critical infrastructure owners worldwide [126863].
Phase (Design/Operation) design (a) The software failure incident described in the articles is related to the design phase. The incident involves malware designed to target industrial control systems like power grids, factories, water utilities, and oil refineries. The malware contains components designed to disrupt or take control of the functioning of devices, including programmable logic controllers (PLCs) sold by Schneider Electric and OMRON. It exploits underlying software in those PLCs known as Codesys, which is used broadly across hundreds of other types of PLCs, making it adaptable to work in almost any industrial environment [126863]. (b) The software failure incident is not related to the operation phase or misuse of the system.
Boundary (Internal/External) outside_system The software failure incident described in the article [126863] is primarily categorized as an outside_system failure. The incident involves the discovery of a new hacker toolkit named "Pipedream" that targets industrial control systems like power grids, factories, water utilities, and oil refineries. The malware toolkit was developed by an unnamed "APT actor," potentially a state-sponsored hacker group, and is designed to disrupt or take control of industrial control system equipment, including programmable logic controllers (PLCs) and Open Platform Communications Unified Architecture (OPC UA) servers. The malware exploits underlying software vulnerabilities in PLCs like Schneider Electric and OMRON, which are widely used across various industries, making it adaptable to almost any industrial environment. The article highlights that the malware toolkit has not yet been deployed for disruptive or destructive effects on victims' industrial control systems, indicating an external threat to the system originating from outside sources.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case is related to non-human actions, specifically the discovery of a malware toolkit named Pipedream that was designed to target industrial control systems like power grids, factories, water utilities, and oil refineries [126863]. This malware toolkit contains components designed to disrupt or take control of devices, including programmable logic controllers (PLCs) and Open Platform Communications Unified Architecture (OPC UA) servers. The malware has the ability to hijack target devices, disrupt operators' access, permanently brick devices, and potentially give hackers access to other parts of an industrial control system network. The malware exploits underlying software in PLCs known as Codesys, which is used broadly across various types of PLCs, making it adaptable to work in almost any industrial environment. The malware was developed by an unnamed "APT actor," indicating an advanced persistent threat, possibly state-sponsored hacker groups [126863]. (b) The failure due to human actions in this case is related to the development and deployment of the malware toolkit by the APT actor. While the specific origin of the malware is not clear, the timing of the advisory follows warnings from the Biden administration about potential disruptive cyberattacks, particularly in the midst of the Russian invasion of Ukraine. The malware toolkit, although not yet deployed for disruptive or destructive effects, poses a significant threat to industrial control systems, with the potential to cause destruction or loss of life in critical infrastructure such as power grids and oil refineries [126863].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The article discusses a malware toolkit named Pipedream that targets industrial control systems, including programmable logic controllers (PLCs) sold by Schneider Electric and OMRON, which are hardware components used in industrial environments [126863]. (b) The software failure incident related to software: - The article highlights that the Pipedream malware toolkit exploits underlying software in PLCs known as Codesys, which is used across various types of PLCs, indicating a software-related vulnerability [126863].
Objective (Malicious/Non-malicious) malicious (a) The objective of the software failure incident was malicious, as it involved the discovery of a malware toolkit named "Pipedream" designed to target industrial control systems like power grids, factories, water utilities, and oil refineries. The malware was described as a comprehensive industrial control system attack tool with the ability to disrupt or take control of devices, including programmable logic controllers (PLCs) and Open Platform Communications Unified Architecture (OPC UA) servers. The malware was designed to hijack target devices, disrupt operators' access, brick devices, and potentially provide hackers access to other parts of industrial control system networks. The malware exploited underlying software vulnerabilities in PLCs, particularly targeting Schneider Electric and OMRON PLCs, with the potential to be adapted for various industrial environments [126863]. (b) The software failure incident was non-malicious in the sense that the malware had not yet been deployed for disruptive or destructive effects on any victim's industrial control systems. While the malware was sophisticated and capable of causing significant harm, there was no evidence that it had triggered actual physical effects on any industrial control systems at the time of discovery. The discovery of the malware and the subsequent advisory issued by government agencies aimed to raise awareness and provide protective measures for infrastructure operators to safeguard their operations against potential threats posed by the malware [126863].
Intent (Poor/Accidental Decisions) poor_decisions The intent of the software failure incident described in the articles is related to poor_decisions. The incident involves the discovery of a malware toolkit named Pipedream that is designed to target industrial control systems, including PLCs from Schneider Electric and OMRON, as well as OPC UA servers. The malware is described as a sophisticated and expansive industrial control system attack tool with the ability to disrupt or take control of devices, potentially causing significant damage to critical infrastructure such as power grids and oil refineries [126863].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the article as it discusses the discovery of a new hacker toolkit called "Pipedream" that targets industrial control systems. The malware was designed to target a wide range of industrial control system equipment, including programmable logic controllers (PLCs) from Schneider Electric and OMRON. The malware exploits underlying software in those PLCs known as Codesys, which is used broadly across hundreds of other types of PLCs, indicating a lack of professional competence in securing these systems [126863]. (b) The software failure incident related to accidental factors is not explicitly mentioned in the article.
Duration temporary The software failure incident described in the article is temporary. The malware toolkit named "Pipedream" has the ability to disrupt or take control of industrial control system equipment, including programmable logic controllers (PLCs) and Open Platform Communications Unified Architecture (OPC UA) servers [126863]. The malware has not yet triggered actual physical effects on a victim's industrial control systems, indicating that the failure is temporary and has not caused permanent damage [126863].
Behaviour other (a) crash: The software failure incident described in the article does not involve a crash where the system loses state and does not perform any of its intended functions [126863]. (b) omission: The incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s) [126863]. (c) timing: The incident does not involve a failure due to the system performing its intended functions correctly, but too late or too early [126863]. (d) value: The incident does not involve a failure due to the system performing its intended functions incorrectly [126863]. (e) byzantine: The incident does not involve a failure due to the system behaving erroneously with inconsistent responses and interactions [126863]. (f) other: The behavior of the software failure incident described in the article is related to a sophisticated malware toolkit designed to target industrial control systems, potentially disrupting or taking control of devices, including PLCs and OPC UA servers. The malware, named "Pipedream," is described as a comprehensive industrial control system attack tool with the ability to hijack target devices, disrupt operators' access, brick devices, and potentially give hackers access to other parts of the network. It is noted that the malware exploits multiple zero-day vulnerabilities and is adaptable to work in various industrial environments, posing a significant threat to critical infrastructure systems [126863].

IoT System Layer

Layer Option Rationale
Perception embedded_software The software failure incident described in the article [126863] is related to the embedded software layer of the cyber-physical system. The malware toolkit named "Pipedream" was designed to target industrial control systems, specifically PLCs (programmable logic controllers) from Schneider Electric and OMRON, by exploiting underlying software in those PLCs known as Codesys. This embedded software vulnerability allowed the malware to disrupt or take control of the functioning of devices, including PLCs and OPC UA servers [126863].
Communication connectivity_level The software failure incident described in the article [126863] is related to the communication layer of the cyber-physical system that failed at the connectivity level. The malware toolkit, known as Pipedream, was designed to target industrial control systems, including programmable logic controllers (PLCs) and Open Platform Communications Unified Architecture (OPC UA) servers, which are crucial components of the network or transport layer in industrial environments. The malware was specifically crafted to disrupt or take control of these devices, indicating a failure at the connectivity level of the cyber-physical system.
Application TRUE The software failure incident described in the article [126863] is related to the application layer of the cyber physical system. The incident involves malware designed to target industrial control systems, including programmable logic controllers (PLCs) and Open Platform Communications Unified Architecture (OPC UA) servers. The malware is described as having the ability to disrupt or take control of devices, hijack target devices, prevent operators from accessing them, and potentially cause physical effects on industrial control systems. Additionally, the malware exploits multiple zero-day vulnerabilities in the underlying software of PLCs, such as Codesys, to carry out its malicious activities. This aligns with the definition of a failure at the application layer caused by bugs, software flaws, and unhandled exceptions [126863].

Other Details

Category Option Rationale
Consequence non-human, theoretical_consequence The consequence of the software failure incident discussed in the articles is primarily a theoretical consequence. The malware toolkit named Pipedream was designed to target industrial control systems, potentially causing significant disruptions and even physical harm, such as destruction or loss of life in petrochemical facilities. However, there is no specific mention of actual physical effects on a victim's industrial control systems or any real observed consequences of the malware being deployed to cause harm or damage [126863].
Domain utilities (a) The failed system was intended to support the industry of utilities, specifically targeting industrial control systems like power grids, factories, water utilities, and oil refineries [126863].

Sources

Back to List