On December 14, 2017, Schneider Electric published a security notification that initiated the public scrutiny of a security incident and ringed alarm bells for many security analysts.
This particular incident could have gone largely unnoticed if the targeted systems had not been significant enough. But in this case, everyone was at the edge of their seats. Schneider had discovered a new malware affecting the Triconex Safety Controllers - Triton.
Though the description of the incident may sound rather dull, its impact could have been quite the opposite. The Triconex systems belong to the class of Safety Instrument System (SIS) controllers which allow critical industrial systems to safely shut down in case of emergencies, to prevent a chain reaction of hazardous events.
These type of systems are used in numerous places across the world in various kinds of manufacturing plants, petroleum refineries, and even nuclear power plants. The SIS controller systems had never been targeted before in any cyberattack.
This attack stands right at the top with the likes of Stuxnet in 2010, in terms of potential global impact. TRITON was analysed by researchers at FireEye, who provided the technical details of the attack, the malware’s capabilities and recommendations to mitigate its impact.
Triton’s attack timeline can be seen below, as reported by Accenture Security.
The Triconex SIS controllers were targeted using a zero-day vulnerability in the engineering workstation, running the Windows operating system. The TRITON malware was designed to appear as the legitimate Triconex Tirlog application, which is a log review tool for the Triconex application suite by Schneider.
The TRITON architecture consisted of a malicious trilog.exe application binary, along with a zip file containing custom communication libraries required to interact with the Triconex controllers.
According to FireEye researchers, the attackers had several options once they were successful in compromising the SIS controllers.
On observing the threat model of this malware, researchers concluded that the attackers intended to cause significant physical harm to industrial systems in the long term. This kind of an objective differentiates from most other cybercrimes which do not aim to cause physical repercussions from an attack.
According to FireEye, a state-sponsored hacker group may have been responsible for developing and deploying TRITON, given the nature of the threat model and the potential attack impact.
The industrial security firm Dragos, which also analyzed the initial TRITON/TRISIS attacks, dubbed the threat actors as Xenotime and said the group was responsible for other global attacks beyond the Middle East as well.
In October 2018, FireEye published another blog post regarding TRITON attribution. This time, FireEye reported that the Central Scientific Research Institute of Chemistry and Mechanics (CNIIHM; a.k.a. ЦНИИХМ), a Russian government-owned technical research institution in Moscow, was involved in TRITON’s deployment.
There was some possibility of the attack having been conducted by a few CNIIHM employees without the approval of government authorities. However, the researchers believe that this alternative scenario has very low probability due to the complexity in executing such an attack. This indicates that TRITON was the work of a resourceful organization instead of just a few individuals.
Researchers provided several recommendations for industrial asset owners to defend against such attacks.
A free malware detection tool for TRITON was released during the 2018 Black Hat USA conference in Las Vegas. Schneider Electric also built its own tool during its forensic investigation to help their customers identify any future attacks.
Many security researchers have warned against more ICS attacks in the future. Dragos tracked several groups which targeted ICS networks in different regions, including groups like Iran-linked Chrysene and Russia-linked Allanite. The attackers behind the initial TRITON attacks are also believed to have launched more attacks.
Publisher