noam-moshe-headshot.jpeg
Internet of Things
Operational Technology

Nexus Podcast: Noam Moshe on the IOCONTROL Malware

Michael Mimoso
/
Dec 23, 2024

Subscribe and listen to the Nexus podcast on your favorite platform.

The discovery of the IOCONTROL malware and backdoor has sparked new concerns about the activity of advanced actors targeting civilian critical infrastructure around the world. Claroty Team82 recently published an extensive technical research blog on the malware, explaining its capabilities and targeting of IoT devices. Its modular configuration also makes it possible for the malware to infect operational technology (OT) and SCADA devices such as PLCs and HMIs. 

On this episode of the Nexus Podcast, Team82 researcher Noam Moshe provides some technical details on IOCONTROL, how and where it’s been used and what defenders should be doing about it. 

IOCONTROL: A Linux-Based Backdoor

“The major functionality of [IOCONTROL] is a [Linux-based] backdoor, basically acting like a RAT (remote access Trojan), allowing the attackers access remotely to infected devices. And basically what it does is that immediately on infection, it will call back to the [command and control] server of the attacker, reach back, tell it, hey, I've been infected.”

Device and system information is relayed back to the C&C server and the infected device then awaits commands it can execute. 

“After some unpacking, it will call back to the C&C server and then the attackers can fully control the host that was infected with this malware, meaning they can simply get some information about the platform like what is the platform architecture so they can issue OS commands to it,” Moshe said. 

IOCONTROL Capable of DoS and Code Execution

Team82 describes how devices from manufacturers ORPAK and Gasboy were discovered to be infected with IOCONTROL, and the attackers had the capability to disrupt gasoline services for stations in the U.S. and Israel. Other victims have already been identified, dating back to the Unitronics attacks of late 2023. Devices such as IP cameras, routers, PLCs, HMIs, firewalls, and more have been infected, affecting vendors including Baicells, D-Link, Hikvision, Red Lion, Orpak, Phoenix Contact, Teltonika, Unitronics, and others.

Listen to Noam Moshe on the Unitronics Attacks

“They can simply cause denial of service, meaning stopping services, deleting files, basically disrupting the behavior of this attacked machine,” Moshe said. “The target was mainly OT- and IoT- centric, meaning it could be like a module on a gas station, it could be a firewall, access point, an IP camera, a varied set of targets.”

The backdoor also allows the attackers to fully control compromised devices and execute arbitrary commands.

Moshe recommends that defenders use the indicators of compromise published in the Team82 blog to detect any possible infections or malicious activity. Internet-facing devices were heavily targeted, and Moshe recommends any connections be done behind a virtual private network or secure remote access solution. 

“The most important tip that I would give is to simply make sure your security posture is good, that you're not exposing any devices to the internet, and you know what you expose,” he said.

Internet of Things
Operational Technology
Michael Mimoso
Editorial Director

Michael Mimoso is Director of Influencer Marketing at Claroty and Editorial Director of Nexus.

Stay in the know Get the Nexus Connect Newsletter
You might also like… Read more
Latest on Nexus Podcast