• Home
  • Services
  • Team
  • Blogs
  • Contact
The Triton Attack on an SIS Controller – an Update
By John Lear 4 April 2019
In late 2017, a cyber attack occurred on the Triconex Safety System of a Middle Eastern Facility. The hack tried to change the code in the Safety Controller, but during one of the steps of the attack, the controller shutdown. This led to a “crash” shutdown of the facility, with all safety system outputs going to their “safe” values. In practice, this is likely to mean that most valves and drives on the facility went to their “fail” states. While in theory, “facilities” are designed to go to their “fail safe” states, in practice, it may be rather exciting.
On 18 December 2018, ICS-CERT released an update on details of what has been titled “HatMan - Safety System Targeted Malware”. (https://ics-cert.us-cert.gov/MAR-17-352-01-HatMan-Safety-System-Targeted-Malware-Update-B). The update included details of the YARA signature to identify a custom, Windows-based remote deployment tool that threat actors may have used.
However, of more interest is the general commentary of the implications of the attack.
The construction of the different HatMan components indicates significant knowledge about ICS environments—specifically Tricon controllers—and an extended development lifecycle to refine such an advanced attack. In addition, it is very likely that an additional component or a separate piece of malware has been developed to impact a control system in tandem with a HatMan attack on the safety system. Although there may be theories as to what this might look like—considering the areas in which Triconex equipment is used—this piece of the puzzle has not yet been revealed.
It is also worth considering the possibility of other threat actors moving into this attack space. Because the HatMan samples have been made public—some files are on VirusTotal and many have been made available on other sites—it is very likely that both researchers and other threat actors alike are doing their own analysis. In particular, the components made available could allow another party to build a similar attack, or to use it as a basis for attacks on other systems. To this end, the security of all safety systems, not just Triconex controllers, should be considered.
In summary, it is an indication, that there are sophisticated teams working in the area, and that operators of Industrial Control Systems need to be on the alert.
With regards defence, there are some offerings to help detect some aspects of the current knowledge of this attack, but “ultimately, the best mitigation strategy for this malware—and others of the same sort—is to employ defense in depth and follow any relevant best practices. Rather than solely attempting to protect vulnerable targets—such as the Triconex devices targeted by HatMan—one prevents an attacker from ever reaching them.”
KAJE Cyber can assist you protect your assets by undertaking an ICS Risk Assessment, in accord with IEC62443, to help identify the layers of defence most appropriate to your system.
© Copyright 2020 Kaje Cyber | All Rights Reserved. Designed by CrazyDomains

We use cookies to enable essential functionality on our website, and analyze website traffic. By clicking Accept you consent to our use of cookies. Read about how we use cookies.

Your Cookie Settings

We use cookies to enable essential functionality on our website, and analyze website traffic. Read about how we use cookies.

Cookie Categories
Essential

These cookies are strictly necessary to provide you with services available through our websites. You cannot refuse these cookies without impacting how our websites function. You can block or delete them by changing your browser settings, as described under the heading "Managing cookies" in the Privacy and Cookies Policy.

Analytics

These cookies collect information that is used in aggregate form to help us understand how our websites are being used or how effective our marketing campaigns are.