Published on July 21st, 2014 📆 | 4942 Views ⚑


Discovered a new Havex variant which hit SCADA via OPC

Convert Text to Speech

Recently, researchers at security firm FireEye have discovered a new variant of Havex remote access Trojan that has capability to actively scan OPC (Object linking and embedding for Process Control) servers, used for controlling SCADA (Supervisory Control and Data Acquisition) systems in critical infrastructure, energy, and manufacturing sectors.
OPC is a communications standard that allows interaction between Windows-based SCADA or other industrial control systems (ICS) applications and process control hardware. New Havex variant gathers system information and data stored on a compromised client or server using the OPC standard. OPC is pervasive and is one of the most common ICS protocols.

โ€œThreat actors have leveraged Havex in attacks across the energy sector for over a year, but the full extent of industries and ICS systems affected by Havex is unknown,โ€ wrote the researchers from FireEye in a blog post. โ€œWe decided to examine the OPC scanning component of Havex more closely, to better understand what happens when itโ€™s executed and the possible implications.โ€

[adsense size='1']

Researchers set up a typical OPC server environment to conduct a real time test of the new variant's functionality. ICS or SCADA systems consist of OPC client software that interacts directly with an OPC server, which works in tandem with the PLC (Programmable Logic Controller) to control industrial hardware.
Once after getting into network, the Havex downloader calls the runDll export function and then starts scanning of OPC servers in the SCADA network.
havex opc server
To identify potential OPC server, the OPC Scanner module use the Windows networking (WNet) functions i.e. WNetOpenEnum and WNetEnumResources, that enumerates network resources or existing connections.

โ€œThe scanner builds a list of all servers that are globally accessible through Windows networking,โ€ researchers wrote. โ€œThe list of servers is then checked to determine if any of them host an interface to the Component Object Models (COM).โ€

Using OPC scan, the new Havex variant could gather any details about connected devices and sends them back to the command-and-control server for the attackers to analyze. It appears that this new variant is used as a tool for future intelligence gathering.

โ€œThis is the first โ€œin the wildโ€ sample using OPC scanning. It is possible that these attackers could have used this malware as a testing ground for future utilization, however,โ€ researchers wrote.

So far, researchers have not seen any attempt to control the connected hardware. The attack path, the developer and the intention behind the development of the malware is still not known, but researchers are investigating and trying to gather all the information about the new variant.

Tagged with: โ€ข โ€ข โ€ข โ€ข

Comments are closed.