Sandworm Zero Day Used to Target CIMPLICITY SCADA Systems
A post-Sandworm investigation revealed that the zero-day vulnerability is likely being used to target SCADA-centric victims who are using GE Intelligent Platform’s CIMPLICITY HMI Solution Suite. Based on our observations, the Sandworm team appears to be utilizing certain files used by the CIMPLICITY software as attack vectors.
[More: Sandworm to Blacken: The SCADA Connection]
In a nutshell, CIMPLICITY is a Human Machine Interface (HMI) software suite that SCADA systems employ to monitor and control devices in its environment. HMI acts as an integral operator console that oversees automation control and safety operations. Additionally, it also allows real-time visibility across any location and lets the team track and analyze previous incidents.
According to our research, the malware targeting CIMPLICITY drops infected files into the CIMPLICITY installation directory using an environment variable on the user's machine. However, indications of SCADA-specific commands being sent by malware have been found.
As we continue to investigate this critical targeted attack, we encourage systems admins to consider employing whitelisting and application control on SCADA systems and to constantly inspect networks for likely intrusions. Also keep tabs on the latest updates on this topic as it develops.
Visit the Threat Intelligence Center for more on ICS and SCADA systems and industrial cyber security.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Recent Posts
- Unleashing Chaos: Real World Threats Hidden in the DevOps Minefield
- From Vulnerable to Resilient: Cutting Ransomware Risk with Proactive Attack Surface Management
- AI Assistants in the Future: Security Concerns and Risk Management
- Silent Sabotage: Weaponizing AI Models in Exposed Containers
- AI vs AI: DeepFakes and eKYC