Mysterious Malware That Can Dupe Industrial Plant Operators Discovered

Advertisement
By Ellen Nakashima, The Washington Post | Updated: 3 June 2016 13:38 IST
Highlights
  • Irongate is designed to work on software that simulates a real machine.
  • The researchers found the malware on VirusTotal.
  • Researchers say it's only the fourth such class of malware ever found.
A group of researchers discovered a rare instance of malicious computer software cleverly designed to mask the disruption of an industrial machine that's being used, for instance, at an energy or chemical plant.

The team from FireEye, a cyber-security firm, stumbled across the malware last year while researching viruses that attack industrial control systems. They dubbed it Irongate.

The researchers say it's only the fourth such class of malware ever found. The most well-known example of this kind of malware is Stuxnet, which damaged nearly 1,000 centrifuges at an Iranian nuclear facility and was discovered in 2010. Stuxnet was jointly created by the United States and Israel, though neither country has officially acknowledged its involvement.

The FireEye team does not know who created Irongate or why, and the researchers say the malware is designed to work only on software that simulates a real machine.

Advertisement

But, the team said, its characteristics are still noteworthy.

Advertisement

For instance, researchers said the malware records five seconds of normal control activity and then plays it back over and over to deceive a control room operator into thinking everything is fine.

At the same time, as the operator sees only normal activity on his screen, the malware is able to substitute computer files that alter the temperature and pressure on a specific type of Siemens control system.

Advertisement

"You're talking about physical equipment that needs to be monitored to be stable," said Stephen Ward, FireEye communications director. "So if you can make them think everything's fine here, don't worry, they have no ability to respond. That's alarming."

The firm could find no clues to authorship.

"It could be research activity or it could be some sort of testing of concepts for a future attack," said Dan Scali, a team member.

Advertisement

Whatever it is, he said, "it highlights challenges we have in the industry in detecting these types of threats."

Team member Rob Caldwell said there have been no signs that the malware has been used in the real world.

The researchers found the malware on VirusTotal, a free online service and Google subsidiary that analyzes suspicious computer files and facilitates the detection of worms and other malware.

They marveled that it had sat on the database, unanalyzed, for two years before they spotted it.

Irongate also has an ability to detect and evade "sandboxes," or software programs that try to protect systems by test-running suspicious computer code before it is allowed to enter a network to see what the code does. When Irongate detects a sandbox, it shuts itself down.

They found a couple of similarities to Stuxnet.

Both Stuxnet and Irongate were designed to work on a single, highly specific process. With Stuxnet, it was control systems running uranium-enrichment centrifuges at Natanz. With Irongate, it is a specific simulated industrial process relying on Siemens software.

Both pieces of malware replace data files to manipulate a machine's operation. Stuxnet accelerated the spinning of the centrifuges. Irongate appears to alter temperature and pressure.

But unlike Stuxnet, which was much more powerful, Irongate works only in a simulated environment. And Stuxnet was launched by two countries seeking to alter the behavior of a third - Iran. With Irongate, the creator's motive is unknown.

"Our hope," Scali said, "is we will get more information from the community" of researchers.

© 2016 The Washington Post

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: FireEye, Internet, Irongate, Malware, Stuxnet, Virus
Advertisement

Related Stories

Popular Mobile Brands
  1. Redmi Note 15 Pro Series 5G Launched in India With These Features
  2. Realme P4 Power 5G Launch Today: Know Price in India, Specs and More
  3. Realme P4 Power 5G With 10,001mAh Battery Arrives in India: See Price
  4. Realme Buds Clip Launched in India With Open-Ear Design, IP55 Rating
  5. Redmi Note 15 Pro Series Launch Today: Know Price in India, Specs and More
  6. Clawdbot (Now Moltbot) Explained: What is It and Why is It Going Viral?
  7. Samsung Galaxy S26 Ultra Could Cost Less than Its Predecessor
  8. Adobe Express Premium Is Now Free for One Year for All Airtel Users
  9. Sony's WF-1000XM6 TWS Headset May Launch With This New Colour Option
  10. BSNL Launches Bharat Connect Prepaid; Slashes BSNL Superstar Premium Price
  1. Realme Buds Clip Launched in India With Open-Ear Design, IP55 Rating: Price, Features
  2. Snap Forms New Subsidiary Specs Inc. to Lead Consumer Smart Glasses Push
  3. Sony WF-1000XM6 Tipped to Launch With New 'Sandpink' Colour Option
  4. Realme P4 Power 5G Launched in India With 10,001mAh Battery, 50-Megapixel Primary Camera: Price, Specifications
  5. Redmi Note 15 Pro+ With 200-Megapixel Camera Launched in India Alongside Redmi Note 15 Pro: Price, Specifications
  6. Samsung Galaxy S26 Series Spotted in Leaked Case Renders; Samsung Tipped to Launch 25W Qi2 Magnetic Wireless Charger
  7. Samsung Galaxy A07 5G India Launch Timeline Confirmed; Key Features Including 50-Megapixel Camera Confirmed 
  8. Samsung Galaxy A37 Spotted With Flat Display and New Frame Design in Leaked Renders
  9. Apple's iPhone 18 Pro Models Tipped to Offer Support for Telephoto Extender Kit, Variable Aperture Lens
  10. Vivo Y31d Launched With Snapdragon 6s 4G Gen 2 Chipset and 7,200mAh Battery
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.