Security

Research

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently


An Iranian government-linked cybercriminal crew used custom malware called IOCONTROL to attack and remotely control US and Israel-based water and fuel management systems, according to security researchers.

While IOCONTROL is a custom-built backdoor for hijacking IoT devices, it also has a "direct impact" on operational technology (OT) including fuel pumps used in gas stations, according to Claroty's Team82.

The threat intel group analyzed a sample deployed on a Gasboy fuel management system during an attack attributed to CyberAv3ngers, an Islamic Revolutionary Guard Corps (IRGC)-affiliated group. The malware was embedded in Gasboy's Payment Terminal, called OrPT, which means that the attackers could have fully shut down fuel services and potentially stolen customers' payment information, or so we're told.

"We've assessed that IOCONTROL is a cyberweapon used by a nation-state to attack civilian critical infrastructure," Team82 asserted in a December 10 report. 

Affected devices include routers, programmable logic controllers (PLCs), human-machine interfaces (HMIs), firewalls, and other Linux-based IoT/OT platforms made by Baicells, D-Link, Hikvision, Red Lion, Orpak, Phoenix Contact, Teltonika, Unitronics, and other vendors.

The FBI and other federal agencies last December blamed CyberAv3ngers for "multiple" attacks against Unitronics PLCs used in water and other critical infrastructure systems across the US. At the time, the Feds only mentioned the crew was targeting Israel-made devices in US facilities.

Team82's research suggests the scope extended beyond that. One of the attacks compromised "several hundred" fuel management devices made by Orpak Systems and Gasboy in America and Israel, according to the security shop. Orpak gear is made in Israel, while Gasboy is made in the US. 

Cyberav3ngers previously bragged on its Telegram channel about attacking 200 gas stations in Israel and the US by targeting Orpak systems. 

While this particular wave of attacks spanned mid-October 2023 to late January 2024, the IOCONTROL sample that Team82 obtained from VirusTotal indicated that the Iranian gang launched another campaign in July and August that hit multiple IoT and Supervisory Control and Data Acquisition (SCADA) systems.

The malware uses the MQTT IoT messaging protocol for communications. This apparently makes it easier for the attackers to disguise malicious traffic to and from their command-and-control (C2) infrastructure. 

It also uses Cloudflare's DNS over HTTPS (DoH) service to translate hostnames into an IP addresses, which also helps the attackers evade detection. Instead of sending a clear-text DNS request, "they used an encrypted protocol (HTTPS), meaning that even if a network tap exists, the traffic is encrypted so they won't be discovered," Team82 wrote.

Before connecting to the C2 infrastructure to receive its instructions, IOCONTROL drops a backdoor on the infected device, allowing its masterminds to maintain control over the equipment. Commands that can be issued to the malware include arbitrary code execution, self-delete, and port scan, among others.

"This functionality is enough to control remote IoT devices and perform lateral movement if needed," the researchers noted. ®

Send us news
15 Comments

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

Ransomware isn't always about the money: Government spies have objectives, too

Analysts tell El Reg why Russia's operators aren't that careful, and why North Korea wants money AND data

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?