Home Malware Programs Trojans Triton

Triton

Posted: December 18, 2017

Triton is a backdoor Trojan that conducts highly-specialized attacks against the safety management systems of energy sector-based targets. Although the Triton's infection methods still are being investigated, threat actors with state-sponsored resources appear to be installing it manually after gaining prior access to the system through network port vulnerabilities or brute-force attacks. This threat can disable or modify critical safety features to the point of physical harm, and any employees should respond with removing Triton through industry-approved methods immediately.

A God of the Seas is After Your Power

In a unique campaign that represents a landmark event for the security of the energy sector, threat actors of an unknown sponsorship are deploying Trojans capable of disrupting what's known as the SiS or Safety instrumented System of industrial control units. Although Triton is far from the first Trojan to commit attacks against this industry (others include Icoscript, Havex and the Western-funded Stuxnet worm), it's the first to succeed in harming the safety-specific systems. Malware experts estimate that these attacks are meant to cause significant, possibly irreparable physical harm to the affected hardware currently by running heavily-customized, injected code.

Triton includes a variety of default and hard-coded features specific to harming Schneider Electric SE's Triconex technology. Threat actors with apparent sponsorship from a hostile state (due to the high-specificity of the programming, emphasis on long-term goals, and overall lack of financial incentive) are running Triton after dropping it through a Python-based Trojan. Brute-force techniques are highly likely of being in use for helping the cybercrooks gain this remote access in the first place.

Triton's main executable uses the name of a default Triconex app to hide its identity while the threat actor instructs it. The Trojan uses the same TriStation protocol as legitimate programs for re-configuring the system's controllers. Notably, analysis of the lone, verifiable Triton attack shows the threat actors refraining from shutting down the control units to achieve temporary outages. Instead, they tried to validate a bad code for reprogramming the units' behavior drastically, most likely, as an attempt to cause maximum damage later.

Calming Waves in the Aftermath of State-Funding Terrorism

While Triton is a highly-specific backdoor Trojan that's unlikely of impacting regular PC owners, its impact on the energy sector's point of view on security may be significant. The Trojan can take advantage of ease-of-use integration between distributed control systems and safety instrumented ones, can cause false-positive flags in SiS logic, and interfere with SiS's ability to detect hazards that the threat actor may initiate via the DCS. When it's practical, using traditionally-segregated safety systems that operate on one-way network communications, instead of bidirectionally-transmitted data, can reduce, if not remove, Triton's damage potential significantly.

Malware experts are only logging a single incident of a live attack from the Triton campaign. Although Schneider Electric SE is leaving the identity of the affected location (which, due to a code-validation check, terminated Triton before it could cause any hardware damage) anonymous, early data correlates the infection with a plant in the Middle East, such as Saudi Arabia. Any workers trying to remove Triton within industry-appropriate guidelines should remain aware of this threat's optional persistence capabilities and all associated network security hazards.

Triton is a one-of-a-kind moment in backdoor Trojan technology that lets threat actors exert more control than ever over high-impact, industrial hardware. In this light, companies may reconsider the recent pushes towards convenience-based integration of their different safety systems.

Loading...