Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms

Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms

December 13, 2024 at 07:33AM

Iran-affiliated hackers have developed IOCONTROL, a custom malware targeting IoT and operational technology systems in Israel and the U.S. It can compromise various devices like cameras and PLCs, enabling attackers to shut down services and steal data. The malware functions via MQTT and employs advanced evasion tactics.

**Meeting Takeaways – Dec 13, 2024**

1. **New Malware Discovery**: A new custom malware, codenamed IOCONTROL, has been identified targeting IoT and operational technology environments, particularly affecting systems in Israel and the United States.

2. **Threat Actor Association**: The malware is linked to Iran-affiliated threat actors and is the tenth malware family to specifically target Industrial Control Systems (ICS), following notable preceding malware like Stuxnet and Industroyer.

3. **Targeted Devices**: IOCONTROL is capable of attacking various IoT and SCADA devices, including:
– IP cameras
– Routers
– Programmable Logic Controllers (PLCs)
– Human-Machine Interfaces (HMIs)
– Firewalls
– Linux-based platforms

4. **Modular Architecture**: The malware’s modular configuration allows it to operate across multiple vendor platforms, enhancing its versatility and threat potential.

5. **Method of Infection**: IOCONTROL was found embedded in a Gasboy fuel management system’s Payment Terminal, indicating the ability to compromise fuel services and possibly extract customer credit card information.

6. **Cyberweapon Usage**: It is described as a cyberweapon targeting civilian critical infrastructure, with implications for both operational disruption and data theft.

7. **Communication Techniques**:
– IOCONTROL utilizes MQTT, a messaging protocol common in IoT, facilitating covert communication and evasion of detection.
– Command-and-control (C2) communication employs Cloudflare’s DNS-over-HTTPS (DoH), mirroring tactics used by other nation-state actors.

8. **Malware Functionality**: Once a connection is established, the malware:
– Gathers device information (e.g., hostname, user, model, firmware version, location)
– Awaits further commands that can execute arbitrary code, conduct port scans, and manage its own processes.

9. **Implications for Security**: The emergence of IOCONTROL underscores the escalating sophistication and targeted nature of cyber threats in the realm of IoT and critical infrastructure security.

10. **Partnerships**: The content is a collaborative piece from a reputable partner, suggesting ongoing relationships in cybersecurity discussions.

**Action Points**:
– Investigate existing security protocols for IoT and OT devices in relevant sectors.
– Monitor for updates on IOCONTROL and similar threats.
– Consider enhanced training for stakeholders on identifying and mitigating such malware risks.

Full Article