Mysterious Malware That Can Dupe Industrial Plant Operators Discovered

Advertisement
By Ellen Nakashima, The Washington Post | Updated: 3 June 2016 13:38 IST
Highlights
  • Irongate is designed to work on software that simulates a real machine.
  • The researchers found the malware on VirusTotal.
  • Researchers say it's only the fourth such class of malware ever found.
A group of researchers discovered a rare instance of malicious computer software cleverly designed to mask the disruption of an industrial machine that's being used, for instance, at an energy or chemical plant.

The team from FireEye, a cyber-security firm, stumbled across the malware last year while researching viruses that attack industrial control systems. They dubbed it Irongate.

The researchers say it's only the fourth such class of malware ever found. The most well-known example of this kind of malware is Stuxnet, which damaged nearly 1,000 centrifuges at an Iranian nuclear facility and was discovered in 2010. Stuxnet was jointly created by the United States and Israel, though neither country has officially acknowledged its involvement.

Advertisement

The FireEye team does not know who created Irongate or why, and the researchers say the malware is designed to work only on software that simulates a real machine.

But, the team said, its characteristics are still noteworthy.

Advertisement

For instance, researchers said the malware records five seconds of normal control activity and then plays it back over and over to deceive a control room operator into thinking everything is fine.

At the same time, as the operator sees only normal activity on his screen, the malware is able to substitute computer files that alter the temperature and pressure on a specific type of Siemens control system.

Advertisement

"You're talking about physical equipment that needs to be monitored to be stable," said Stephen Ward, FireEye communications director. "So if you can make them think everything's fine here, don't worry, they have no ability to respond. That's alarming."

The firm could find no clues to authorship.

"It could be research activity or it could be some sort of testing of concepts for a future attack," said Dan Scali, a team member.

Advertisement

Whatever it is, he said, "it highlights challenges we have in the industry in detecting these types of threats."

Team member Rob Caldwell said there have been no signs that the malware has been used in the real world.

The researchers found the malware on VirusTotal, a free online service and Google subsidiary that analyzes suspicious computer files and facilitates the detection of worms and other malware.

They marveled that it had sat on the database, unanalyzed, for two years before they spotted it.

Irongate also has an ability to detect and evade "sandboxes," or software programs that try to protect systems by test-running suspicious computer code before it is allowed to enter a network to see what the code does. When Irongate detects a sandbox, it shuts itself down.

They found a couple of similarities to Stuxnet.

Both Stuxnet and Irongate were designed to work on a single, highly specific process. With Stuxnet, it was control systems running uranium-enrichment centrifuges at Natanz. With Irongate, it is a specific simulated industrial process relying on Siemens software.

Both pieces of malware replace data files to manipulate a machine's operation. Stuxnet accelerated the spinning of the centrifuges. Irongate appears to alter temperature and pressure.

But unlike Stuxnet, which was much more powerful, Irongate works only in a simulated environment. And Stuxnet was launched by two countries seeking to alter the behavior of a third - Iran. With Irongate, the creator's motive is unknown.

"Our hope," Scali said, "is we will get more information from the community" of researchers.

© 2016 The Washington Post

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: FireEye, Internet, Irongate, Malware, Stuxnet, Virus
Advertisement

Related Stories

Popular Mobile Brands
  1. iQOO Z11 Global Variant Visits Geekbench With a Different Snapdragon Chip
  2. You Can Now Turn Your PS5 Into a Linux Gaming PC
  3. Valathu Vashathe Kallan OTT Release: Where to Watch Malayalam Crime Thriller Online
  4. EA Sports FC 26, Wuchang: Fallen Feathers and Nine Sols Join PS Plus in May
  5. Moto Buds 2 Plus Launched in India With ANC, Up to 40 Hours of Total Playback Tim
  6. Moto G87 Launched With 200-Megapixel Main Camera, 5,200mAh Battery
  7. These Four Xiaomi Phones Are Now Eligible to Get Android 17 Beta Updates
  8. CMF Watch 3 Pro India Launch Finally Confirmed, Here's What to Expect
  9. Google TV Update Adds YouTube Shorts, Nano Banana and Veo Features
  10. Vivo X Fold 6 Leaks Reveal 200-Megapixel Camera and 7,000mAh Battery
  1. ULA Atlas V Launches 29 Amazon Kuiper Satellites in Return Mission
  2. Moto Buds 2 Plus Launched in India With Hi-Res Audio, Up to 40 Hours of Total Playback Time: Price, Features
  3. iQOO Z11 Global Variant Spotted on Geekbench Database With Snapdragon Chipset, Unlike Chinese Model
  4. Samsung Reportedly Plans to Launch Galaxy Book Models With Android-Based One UI 9 Soon
  5. PS5 Linux Loader Gets Public Release, Allowing Users to Run Steam and PC Games on Console
  6. Nine Crypto Scam Centres Targeting US Users Shut Down in Joint Operation Involving UAE, US and China
  7. Google Photos Unveils New AI-Powered Wardrobe Feature to Help You Decide What to Wear
  8. OpenAI CEO Sam Altman Teases GPT-5.5 Cyber AI Model Rollout, Could Take On Anthropic’s Claude Mythos
  9. Vivo X Fold 6 Leaks Hint at 200-Megapixel Camera, MediaTek Dimensity 9500 Chip and 7,000mAh Battery
  10. Raakaasa OTT Release Date Confirmed: Know When and Where to Watch it Online
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.