TLDR:
- A new PLC malware has been developed that can target ICS environments remotely through the PLC’s embedded Web server.
- This Stuxnet-like malware is platform-neutral, more resilient, and aims to disrupt critical infrastructure systems.
In a recent article on Dark Reading, the development of a new programmable logic controller (PLC) malware that can target industrial control systems (ICS) remotely has been highlighted. This malicious software does not require physical access to the target environment and is more resilient compared to traditional malware targeting critical infrastructure sectors. PLCs are crucial components of ICS that control various physical processes in manufacturing, industrial, and critical infrastructure settings.
The new Stuxnet-like malware, developed by a team of researchers from the Georgia Institute of Technology, attacks the front-end Web layer of PLCs with malicious JavaScript. Unlike traditional methods that target firmware or control logic, this malware approach provides significant advantages such as platform independence, ease of deployment, and higher levels of persistence. The researchers demonstrated a proof-of-concept cyberattack scenario using a widely used PLC that controlled an industrial motor, showcasing the potential impact on physical systems.
The Web-based PLC malware aims to disrupt or sabotage physical processes by manipulating output signals, falsifying sensor readings, disabling safety systems, and executing actions that could lead to catastrophic outcomes, including loss of life. The researchers highlighted the importance of understanding and mitigating the risks associated with PLC malware attacks to safeguard critical infrastructure systems from potential cyber threats.