Incident: Cryptojacking Malware Targets Industrial Control System of Water Utility

Published Date: 2018-02-12

Postmortem Analysis
Timeline 1. The software failure incident of cryptocurrency mining malware in the operational technology network of a water utility in Europe was reported on February 12, 2018, as per Article 68176.
System 1. Operational technology network of a water utility in Europe 2. Industrial control systems 3. Remote monitoring server 4. Internal networks of industrial control systems 5. Web plugin Browsealoud 6. Critical infrastructure controllers
Responsible Organization 1. Attackers who deployed cryptocurrency mining malware in the operational technology network of a water utility in Europe [68176].
Impacted Organization 1. A water utility in Europe's operational technology network [68176]
Software Causes 1. The software cause of the failure incident was the presence of cryptocurrency mining malware in the operational technology network of a water utility in Europe, impacting the systems and potentially degrading the operator's ability to manage the plant [68176].
Non-software Causes 1. The attackers exploited the industrial control system's high processor availability, which caused serious safety concerns [68176]. 2. The industrial control systems in many plants run dated, unpatched software, making them vulnerable to attacks [68176]. 3. The attackers targeted the water utility's network, which had restricted access to the internet for remote monitoring, allowing them to exploit unused processing power [68176].
Impacts 1. The software failure incident involving cryptocurrency mining malware in the operational technology network of a water utility in Europe had a "significant impact" on systems, potentially causing industrial control applications to hang, pause, and even crash, degrading the operator's ability to manage the plant [68176]. 2. The malware was designed to run quietly in the background, utilizing as much processing power as possible to mine the cryptocurrency Monero without overwhelming the system, and it could detect and disable security scanners and defense tools that might flag it [68176]. 3. The incident highlighted the danger of malware miners being on industrial control systems, as these systems require high processor availability, and any impact to that can lead to serious safety concerns [68176]. 4. The mining malware infecting the water treatment plant was designed to spread internally, moving laterally from the internet-connected remote monitoring server to other servers that were not meant to be exposed, showcasing the potential for the malware to expand and cause further damage [68176].
Preventions 1. Implementing strong network segmentation and access controls to prevent unauthorized access to critical systems [68176]. 2. Regularly updating and patching software on industrial control systems to address vulnerabilities and prevent malware infections [68176]. 3. Conducting thorough security audits to identify and address any misconfigurations or weaknesses in the network defenses [68176]. 4. Educating employees and staff on cybersecurity best practices to prevent inadvertent actions that could lead to malware infections [68176].
Fixes 1. Implementing robust intrusion detection systems to detect and prevent malicious mining malware from infiltrating industrial control systems [Article 68176]. 2. Regularly auditing and improving security measures in industrial control plants to ensure internal networks are properly siloed and free from misconfigurations or vulnerabilities that attackers could exploit [Article 68176]. 3. Ensuring that industrial control systems are hardened, patched with the latest updates, and have strong access controls in place to mitigate the risk of crypto-mining, ransomware, and other malware threats [Article 68176].
References 1. Radiflow - Critical infrastructure security firm that discovered cryptocurrency mining malware in the operational technology network of a water utility in Europe [Article 68176]. 2. Marco Cardacci - Consultant for the firm RedTeam Security, specializing in industrial control [Article 68176]. 3. Ilan Barda - CEO of Radiflow [Article 68176]. 4. Jérôme Segura - Lead malware intelligence analyst at the network defense firm Malwarebytes [Article 68176]. 5. Russian scientists - Group allegedly arrested for using a supercomputer at a secret Russian research and nuclear warhead facility for Bitcoin mining [Article 68176]. 6. Jonathan Pollet - Founder of Red Tiger Security, consulting on cybersecurity for heavy industrial clients like power plants and natural gas utilities [Article 68176].

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident related to cryptojacking malware impacting industrial control systems has happened at a water utility in Europe, as reported by Radiflow. This specific incident is the first known instance of mining malware being used against an industrial control system [68176]. (b) The articles mention that cryptojacking malware incidents are becoming more common and sophisticated, with attackers compromising popular web plugins like Browsealoud to steal mining power from users on thousands of mainstream websites, including those of the United States federal courts system and the United Kingdom's National Health Service. Additionally, reports surfaced about a group of Russian scientists being arrested for allegedly using a supercomputer at a secret Russian research and nuclear warhead facility for Bitcoin mining [68176].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the article where cryptocurrency mining malware was discovered in the operational technology network of a water utility in Europe. The malware was built to run quietly in the background, using processing power to mine cryptocurrency without overwhelming the system and creating obvious problems. It was also designed to detect and disable security scanners and defense tools that might flag it, indicating a sophisticated design to evade detection [68176]. (b) The software failure incident related to the operation phase is evident in the same article where the mining malware attack on the water utility's industrial control system had a significant impact on systems. The increased processor and network bandwidth usage caused by the malware could lead to industrial control applications hanging, pausing, or crashing, potentially degrading the operator's ability to manage the plant. This impact on the operation of the system highlights the failure introduced by the operation or misuse of the system [68176].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident described in the articles is primarily within the system. The failure was caused by the presence of cryptocurrency mining malware within the operational technology network of a water utility in Europe. The malware was designed to run quietly in the background, using processing power to mine cryptocurrency without overwhelming the system. It was also built to detect and disable security scanners and defense tools within the system [68176]. (b) outside_system: The software failure incident also involved contributing factors that originated from outside the system. Attackers exploited vulnerabilities in the system's network security to introduce the cryptocurrency mining malware. The attackers were looking for unused processing power within the internal network of the utility to benefit from mining cryptocurrency. The malware spread internally within the system, moving laterally from an internet-connected server to others that were not meant to be exposed [68176].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the articles is related to non-human actions, specifically the presence of cryptocurrency mining malware in the operational technology network of a water utility in Europe. The malware was designed to quietly mine cryptocurrency without overwhelming the system, disable security scanners, and increase processor and network bandwidth usage, potentially causing industrial control applications to hang, pause, and crash [68176]. (b) The articles also mention human actions contributing to software failure incidents. For example, reports surfaced about a group of Russian scientists being arrested for allegedly using a supercomputer at a secret Russian research and nuclear warhead facility for Bitcoin mining [68176]. Additionally, technicians with access to industrial control systems may yield to temptation, allowing hackers to exploit flaws in the system's defenses for mining purposes [68176].
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: The incident described in the articles is not directly attributed to hardware failure. Instead, the failure was caused by malicious mining malware infecting the operational technology network of a water utility in Europe, impacting the systems and potentially degrading the operator's ability to manage the plant [68176]. (b) The software failure incident related to software: The software failure incident in this case was caused by malicious mining malware that infected the operational technology network of a water utility in Europe. The malware was designed to run quietly in the background, using processing power to mine cryptocurrency without overwhelming the system. It was also built to detect and disable security scanners and defense tools, increasing processor and network bandwidth usage, which could cause industrial control applications to hang, pause, and crash [68176].
Objective (Malicious/Non-malicious) malicious (a) The objective of the software failure incident was malicious. The incident involved the discovery of cryptocurrency mining malware in the operational technology network of a water utility in Europe, marking the first known instance of mining malware being used against an industrial control system. The malware was designed to run quietly in the background, using processing power to mine cryptocurrency without causing obvious problems, while also disabling security scanners and defense tools. The attack had a significant impact on the systems, potentially degrading the operator's ability to manage the plant [68176]. Additionally, the incident highlighted the potential dangers of malicious miners on industrial control systems, emphasizing the need for heightened security measures to prevent such attacks [68176]. (b) The incident was non-malicious in the sense that the attackers were not specifically targeting the water utility's network for a cyberattack. Instead, they were looking for unused processing power that they could exploit for their benefit. The attackers were leveraging fallow processing power within the industrial control system to mine cryptocurrency, taking advantage of the system's high processor availability and electricity consumption. The incident also shed light on the vulnerabilities present in industrial control systems, such as running dated and unpatched software, which could inadvertently facilitate such attacks [68176].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The intent of the software failure incident related to poor_decisions: - The incident of cryptocurrency mining malware being used against an industrial control system in a water utility in Europe was not a targeted attack but rather attackers looking for unused processing power to benefit themselves [68176]. - The malware was designed to run quietly in the background to mine cryptocurrency without overwhelming the system and creating obvious problems, indicating a deliberate attempt to exploit the system's resources without being detected [68176]. - The attackers were trying to look for unused processing power that they could use for their benefit, showing a strategic decision to target industrial control systems for mining purposes [68176]. (b) The intent of the software failure incident related to accidental_decisions: - The incident of cryptocurrency mining malware infecting the water treatment plant was designed to spread internally, moving laterally from an internet-connected remote monitoring server to others that weren't meant to be exposed, indicating an unintended consequence of the malware's propagation within the system [68176]. - The malware could find weak spots even on a temporary basis and expand, suggesting an accidental consequence of the malware's ability to exploit vulnerabilities within the network [68176].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the article where it discusses the discovery of cryptocurrency mining malware in the operational technology network of a water utility in Europe. The malware was designed to run quietly in the background, using processing power to mine cryptocurrency without causing obvious problems. It was also built to detect and disable security scanners and defense tools, indicating a level of sophistication that could potentially be harmful to the industrial control system [68176]. (b) The accidental software failure incident is highlighted in the article where Radiflow discovered the cryptocurrency mining malware in the water utility's network. The CEO of Radiflow mentioned that they had no idea they would find a malicious miner when they installed intrusion detection products on the utility's network. The communication with multiple external IP addresses from the utility's servers was unexpected, indicating that the attackers were trying to exploit unused processing power without being specifically targeted [68176].
Duration temporary The software failure incident described in the articles can be categorized as a temporary failure. The incident involved the discovery of cryptocurrency mining malware in the operational technology network of a water utility in Europe, which had a significant impact on the systems [68176]. The malware was designed to run quietly in the background, using processing power to mine cryptocurrency without overwhelming the system and creating obvious problems. It was also built to detect and disable security scanners and defense tools that might flag it, indicating a deliberate attempt to remain undetected [68176]. Additionally, the incident highlighted the vulnerability of industrial control systems to such attacks, with concerns raised about the potential for malicious miners to exploit flaws in the defenses of these systems and cause disruptions [68176]. The sophistication of attacks involving mining malware has been increasing, with attackers targeting critical infrastructure like water treatment plants and spreading internally within networks [68176]. This indicates that the failure was not permanent but rather a result of specific circumstances and vulnerabilities that were exploited by the attackers.
Behaviour crash, omission, value, byzantine, other (a) crash: The incident involving cryptocurrency mining malware in the operational technology network of a water utility in Europe had a significant impact on systems, potentially causing industrial control applications to hang, pause, and even crash, degrading the operator's ability to manage the plant [68176]. (b) omission: The mining malware was designed to run quietly in the background, using processing power to mine cryptocurrency without overwhelming the system and creating obvious problems. It was also built to detect and disable security scanners and defense tools that might flag it, indicating an omission of security measures [68176]. (c) timing: The malware attack increased processor and network bandwidth usage, potentially causing industrial control applications to hang, pause, and crash, affecting the timing of system operations [68176]. (d) value: The mining malware was using processing power to mine cryptocurrency, indicating a failure in the system performing its intended functions correctly [68176]. (e) byzantine: The mining malware was designed to spread internally, moving laterally from an internet-connected remote monitoring server to others that weren't meant to be exposed, showing inconsistent responses and interactions within the system [68176]. (f) other: The incident also highlights the potential for malicious mining malware to cause physical damage to infected devices like smartphones, indicating a different type of behavior not covered by the previous options [68176].

IoT System Layer

Layer Option Rationale
Perception sensor, processing_unit, network_communication, embedded_software (a) sensor: The article mentions that the cryptocurrency mining malware discovered in the water utility's operational technology network had a significant impact on systems. The malware was designed to run quietly in the background, using processing power to mine cryptocurrency without overwhelming the system. This increased processor and network bandwidth usage, potentially causing industrial control applications to hang, pause, and crash, degrading the operator's ability to manage the plant [68176]. (b) actuator: The article does not specifically mention any failure related to actuator errors. (c) processing_unit: The article discusses how the mining malware increased processor and network bandwidth usage, potentially causing industrial control applications to hang, pause, and crash, which could impact the operator's ability to manage the plant [68176]. (d) network_communication: The article mentions that the malware was built to detect and disable security scanners and other defense tools that might flag it. It also spread internally, moving laterally from an internet-connected remote monitoring server to others that weren't meant to be exposed, highlighting potential vulnerabilities in network communication [68176]. (e) embedded_software: The article discusses how industrial control systems often run dated, unpatched software, as deploying new operating systems and updates can inadvertently destabilize crucial legacy platforms. This indicates potential vulnerabilities in the embedded software used in these systems [68176].
Communication unknown Unknown
Application TRUE The software failure incident described in the articles is related to the application layer of the cyber physical system. The failure was caused by the presence of cryptocurrency mining malware in the operational technology network of a water utility in Europe. This malware was designed to run quietly in the background, using processing power to mine cryptocurrency without causing obvious problems. The malware also aimed to disable security scanners and defense tools that could detect it, impacting the system's performance and potentially causing crashes [68176].

Other Details

Category Option Rationale
Consequence harm, property, non-human, theoretical_consequence (b) harm: The software failure incident involving cryptocurrency mining malware in the operational technology network of a water utility in Europe had a "significant impact" on systems, potentially degrading an operator’s ability to manage the plant. The malware increased processor and network bandwidth usage, which could cause industrial control applications to hang, pause, and even crash, posing serious safety concerns [68176].
Domain utilities, government (a) The failed system was related to the utilities industry, specifically a water utility in Europe. The incident involved the discovery of cryptocurrency mining malware in the operational technology network of the water utility, impacting its systems significantly [68176]. (g) The incident occurred in the utilities industry, specifically affecting a water utility in Europe. The malware was found in the operational technology network of the water utility, causing a "significant impact" on the systems [68176]. (l) The failed system was part of the government sector as it involved a water utility in Europe. The incident revealed the presence of cryptocurrency mining malware in the operational technology network of the utility, impacting its systems [68176].

Sources

Back to List