Mysterious malware can dupe industrial plant operators

  • By Ellen Nakashima The Washington Post
  • Thursday, June 2, 2016 3:12pm
  • Business

A group of researchers discovered a rare instance of malicious computer software cleverly designed to mask the disruption of an industrial machine that’s being used, for instance, at an energy or chemical plant.

The team from FireEye, a cybersecurity firm, stumbled across the malware last year while researching viruses that attack industrial control systems. They dubbed it Irongate.

The researchers say it’s only the fourth such class of malware ever found. The most well-known example of this kind of malware is Stuxnet, which damaged nearly 1,000 centrifuges at an Iranian nuclear facility and was discovered in 2010. Stuxnet was jointly created by the United States and Israel, though neither country has officially acknowledged its involvement.

The FireEye team does not know who created Irongate or why, and the researchers say the malware is designed to work only on software that simulates a real machine.

But, the team said, its characteristics are still noteworthy.

For instance, researchers said the malware records five seconds of normal control activity and then plays it back over and over to deceive a control room operator into thinking everything is fine.

At the same time, as the operator sees only normal activity on his screen, the malware is able to substitute computer files that alter the temperature and pressure on a specific type of Siemens control system.

“You’re talking about physical equipment that needs to be monitored to be stable,” said Stephen Ward, FireEye communications director. “So if you can make them think everything’s fine here, don’t worry, they have no ability to respond. That’s alarming.”

The firm could find no clues to authorship.

“It could be research activity or it could be some sort of testing of concepts for a future attack,” said Dan Scali, a team member.

Whatever it is, he said, “it highlights challenges we have in the industry in detecting these types of threats.”

Team member Rob Caldwell said there have been no signs that the malware has been used in the real world.

The researchers found the malware on VirusTotal, a free online service and Google subsidiary that analyzes suspicious computer files and facilitates the detection of worms and other malware.

They marveled that it had sat on the database, unanalyzed, for two years before they spotted it.

Irongate also has an ability to detect and evade “sandboxes,” or software programs that try to protect systems by test-running suspicious computer code before it is allowed to enter a network to see what the code does. When Irongate detects a sandbox, it shuts itself down.

They found a couple of similarities to Stuxnet.

Both Stuxnet and Irongate were designed to work on a single, highly specific process. With Stuxnet, it was control systems running uranium-enrichment centrifuges at Natanz. With Irongate, it is a specific simulated industrial process relying on Siemens software.

Both pieces of malware replace data files to manipulate a machine’s operation. Stuxnet accelerated the spinning of the centrifuges. Irongate appears to alter temperature and pressure.

But unlike Stuxnet, which was much more powerful, Irongate works only in a simulated environment. And Stuxnet was launched by two countries seeking to alter the behavior of a third – Iran. With Irongate, the creator’s motive is unknown.

“Our hope,” Scali said, “is we will get more information from the community” of researchers.

Talk to us

> Give us your news tips.

> Send us a letter to the editor.

> More Herald contact information.

More in Business

The livery on a Boeing plane. (Christopher Pike / Bloomberg)
Former Lockheed Martin CFO joins Boeing as top financial officer

Boeing’s Chief Financial Officer is being replaced by a former CFO at… Continue reading

Izaac Escalante-Alvarez unpacks a new milling machine at the new Boeing machinists union’s apprentice training center on Friday, June 6, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
Boeing Machinists union training center opens in Everett

The new center aims to give workers an inside track at Boeing jobs.

Some SnoCo stores see shortages after cyberattack on grocery supplier

Some stores, such as Whole Foods and US Foods CHEF’STORE, informed customers that some items may be temporarily unavailable.

People take photos and videos as the first Frontier Arlines flight arrives at Paine Field Airport under a water cannon salute on Monday, June 2, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
Water cannons salute Frontier on its first day at Paine Field

Frontier Airlines joins Alaska Airlines in offering service Snohomish County passengers.

Amit B. Singh, president of Edmonds Community College. 201008
Edmonds College and schools continue diversity programs

Educational diversity programs are alive and well in Snohomish County.

A standard jet fuel, left, burns with extensive smoke output while a 50 percent SAF drop-in jet fuel, right, puts off less smoke during a demonstration of the difference in fuel emissions on Tuesday, March 28, 2023 in Everett, Washington. (Olivia Vanni / The Herald)
Sustainable aviation fuel center gets funding boost

A planned research and development center focused on sustainable aviation… Continue reading

Helion's 6th fusion prototype, Trenta, on display on Tuesday, July 9, 2024 in Everett, Washington. (Olivia Vanni / The Herald)
Helion celebrates smoother path to fusion energy site approval

Helion CEO applauds legislation signed by Gov. Bob Ferguson expected to streamline site selection process.

Support local journalism

If you value local news, make a gift now to support the trusted journalism you get in The Daily Herald. Donations processed in this system are not tax deductible.