Introducing ‘FrostyGoop’: The Devastating Malware Attacking Vital Infrastructure

July 23, 2024
2 mins read

TLDR:

  • New ICS malware named FrostyGoop discovered by Dragos targeting critical infrastructure
  • Malware uses Modbus TCP communications to sabotage OT networks

Cybersecurity researchers at Dragos have identified a new Industrial Control Systems (ICS) malware called FrostyGoop. This malware, discovered in April 2024, targets critical infrastructure and was used in a disruptive cyber attack on an energy company in Lviv, Ukraine. FrostyGoop is written in Golang and uses Modbus TCP communications to interact directly with ICS devices, specifically targeting Windows systems with ENCO controllers exposed on TCP port 502.

The incident in Lviv resulted in a loss of heating services to over 600 buildings for nearly two days, as the adversaries sent malicious Modbus commands to ENCO controllers. This attack highlights the potential threats posed to critical infrastructure by malware like FrostyGoop, which can read and write to ICS devices, posing serious safety and operational risks. Organizations are urged to implement comprehensive cybersecurity frameworks to defend against similar threats in the future.

Full Article:

Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the Ukrainian city of Lviv earlier this January. Industrial cybersecurity firm Dragos has dubbed the malware FrostyGoop, describing it as the first malware strain to directly use Modbus TCP communications to sabotage operational technology (OT) networks. It was discovered by the company in April 2024.

“FrostyGoop is an ICS-specific malware written in Golang that can interact directly with Industrial Control Systems (ICS) using Modbus TCP over port 502,” researchers Kyle O’Meara, Magpie (Mark) Graham, and Carolyn Ahlers said in a technical report shared with The Hacker News. It’s believed that the malware, mainly designed to target Windows systems, has been used to target ENCO controllers with TCP port 502 exposed to the internet. It has not been tied to any previously identified threat actor or activity cluster.

FrostyGoop comes with capabilities to read and write to an ICS device holding registers containing inputs, outputs, and configuration data. It also accepts optional command line execution arguments, uses JSON-formatted configuration files to specify target IP addresses and Modbus commands, and logs output to a console and/or a JSON file. The incident targeting the municipal district energy company is said to have resulted in a loss of heating services to more than 600 apartment buildings for almost 48 hours. “The adversaries sent Modbus commands to ENCO controllers, causing inaccurate measurements and system malfunctions,” the researchers said in a conference call, noting initial access was likely gained by exploiting a vulnerability in Mikrotik routers in April 2023.

While FrostyGoop extensively employs the Modbus protocol for client/server communications, it’s far from the only one. In 2022, Dragos and Mandiant detailed another ICS malware named PIPEDREAM (aka INCONTROLLER) that leveraged various industrial network protocols such as OPC UA, Modbus, and CODESYS for interaction. It’s also the ninth ICS-focused malware after Stuxnet, Havex, Industroyer (aka CrashOverride), Triton (aka Trisis), BlackEnergy2, Industroyer2, and COSMICENERGY. The malware’s ability to read or modify data on ICS devices using Modbus has severe consequences for industrial operations and public safety, Dragos said, adding more than 46,000 internet-exposed ICS appliances communicate over the widely-used protocol.

“The specific targeting of ICS using Modbus TCP over port 502 and the potential to interact directly with various ICS devices pose a serious threat to critical infrastructure across multiple sectors,” the researchers said. “Organizations must prioritize the implementation of comprehensive cybersecurity frameworks to safeguard critical infrastructure from similar threats in the future.”

Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and