New attack tactics aimed at industrial sites

Issue 1 2022 Information Security

Kaspersky experts have uncovered a new, rapidly evolving, series of spyware campaigns, attacking more than 2000 industrial enterprises across the globe. Unlike many mainstream spyware campaigns, these attacks stand out due to the limited number of targets in each attack and the very short lifespan of each malicious sample. The study identified more than 25 marketplaces where stolen data is being sold.

During the first half of 2021, Kaspersky ICS CERT experts noticed a curious anomaly in statistics on spyware threats blocked on ICS computers. Although the malware used in these attacks belongs to well-known commodity spyware families such as Agent Tesla/Origin Logger, HawkEye and others, these attacks stand out from the mainstream due to the very limited number of targets in each attack (from a handful to a few dozen) and the very short lifetime of each malicious sample.

A closer analysis of 58 586 samples of spyware blocked on ICS computers in H1 2021 revealed that around 21,2% of them were part of this new limited-scope and short-lifetime attack series. Their lifecycle is limited to about 25 days, which is much less than the lifespan of a ‘traditional’ spyware campaign.

Although each of these 'anomalous' spyware samples is short-lived and not widely distributed, they account for a disproportionately large share of all spyware attacks. In Africa, for example, every seventh computer attacked with spyware was hit with one of the anomalous spyware samples (2,0% out of 15,4%).

Notably, most of these campaigns are spread from one industrial enterprise to another via well-crafted phishing emails. Having penetrated the victim’s system, the attacker uses the device as the next-attack C2 (command and control) server. With access to the victim’s mailing list, criminals can abuse corporate email and spread the spyware even further.

According to Kaspersky ICS CERT telemetry, more than 2000 industrial organisations worldwide have been incorporated into the malicious infrastructure and used by cybergangs to spread the attack to their contact organisations and business partners. We estimate the total number of compromised or stolen corporate accounts as a result of these attacks to be more than 7000.

The sensitive data obtained from ICS computers often ends up in various marketplaces. Kaspersky experts identified more than 25 different marketplaces where the stolen credentials from these industrial campaigns were being sold. Analysis of those marketplaces showcased high demand for corporate account credentials, especially for Remote Desktop Accounts (RDP). Over 46% of all RDP accounts sold in analysed marketplaces are owned by companies in the US, while the rest originate from Asia, Europe and Latin America. Almost 4% (almost 2000 accounts) of all RDP accounts being sold belonged to industrial enterprises.

Another growing market is Spyware-as-a-Service. Since the source code of some popular spyware programs have been made public, they have become highly available in online shops in the form of a service – developers sell not only malware as a product, but also a licence for a malware builder and access to infrastructure preconfigured to build the malware.

‘‘Throughout 2021, cybercriminals extensively used spyware to attack industrial computers. Today we witness a new rapidly evolving trend in the industrial threat landscape. To avoid detection, criminals shrink the size of each attack and limit the use of each malware sample by quickly enforcing its replacement with a fresh-built one. Other tactics include the vast abuse of corporate email infrastructure to spread malware. This is different from anything we’ve observed in spyware before and we anticipate such attacks to gain traction in the year ahead,’ comments Kirill Kruglov, security expert at Kaspersky ICS CERT.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
The role of advanced technologies in ransomware recovery
Information Security
As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...