Skip Ribbon Commands
Skip to main content
Computer Emergency Response Team of Mauritius (CERT-MU)
Computer Emergency Response Team of Mauritius>Irongate ICS Malware Steals from Stuxnet Playbook

Irongate ICS Malware Steals from Stuxnet Playbook


Security researchers discovered a new malware known as “Irongate” that targets industrial control systems. As per the researchers, the malware contains few similar attributes as the Stuxnet malware. However, it does not currently pose a threat because it was designed with the single purpose of running within Siemens simulated control system environments. It was also found that the malware has gone undetected for years. Irongate’s key attributes include its ability to perpetrate a man-in-the-middle attack against process input and output, along with attacking process operator software within industrial simulations, according to FireEye. An Irongate-compromised system could give attackers the ability to alter industrial controls unbeknownst to the system operator. Those types of techniques have been used in the past to sabotage everything from power grids to logic controllers in nuclear centrifuges.
Source:
Threatpost
 
Team Cymru
 
Contact Information
 
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis