Ioncontrol: silent cyber weapon

CybersecurityHQ Report

Welcome reader to your CybersecurityHQ report

Brought to you by:

Cypago enables strategic decision making through a full Cyber GRC product suite to help you avoid business reputation impact, financial or client trust losses

Notes:

Nebojsa (Nesha) Todorovic, award-winning writer at Hacker Noon, joins the Defend & Conquer newsletter as a guest author. Nesha has won multiple accolades, including “Noonies2020 Most Controversial Writer” and “Noonies2022 Critical Thinker of the Year.” He is also a top-rated writer in remote work and WEB3, with numerous writing contest victories.

There is a famous line from Sun Tzu's "Art of War" that every battle is won or lost before it is ever fought. While we're at the famous lines about wars, we should mention Albert Einstein in the context of modern cyber warfare. 

"I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones."

It's possible to be wrong and right at the same time. He was clearly worried about the aftermath of a global nuclear war. Unfortunately, we must consider an additional, highly targeted, covert cyber warfare dimension. The one that attacks under the cover of digital darkness and "cherrypicks" the targets we don't even consider as such.

"Hacktivist groups from Iran, Iraq, Lebanon, and Sudan are working together under the campaign name "OpIsrael" to pool their resources and expertise to launch more sophisticated and destructive attacks. These attacks aim to disrupt infrastructure, gather intelligence, or spread propaganda to undermine Israel's war efforts. Israeli-based cybersecurity firm Check Point Software tracked over 40 cybergroups conducting attacks on government and media sites during Hamas' initial attack. As of July 2024, Israel reported that Iran and Iran-backed groups have been responsible for roughly three billion cyberattacks, with Israel's cyber defenses successfully preventing almost every attack."

Country

Target

Primary Objective

Attack Type

Status

Iran

Israeli government

Disrupt infrastructure

DDoS, data exfiltration

Active

Iran

Israeli media

Spread propaganda

Website defacement

Active

Iraq

Israeli military

Intelligence gathering

Phishing, espionage

Active

Lebanon

Israeli civilians

General disruption

Ransomware, DDoS

Active

Sudan

Israeli economy

Economic disruption

Data exfiltration, DDoS

Active

Iran

Israeli infrastructure

Sabotage and disruption

Malware, ransomware

Active

Lebanon

Israeli government

Disrupt defense systems

Advanced persistent threat (APT)

Active

Iran

Israeli infrastructure

Data theft

SQL injection

Active

Iraq

Israeli military

Intelligence gathering

Spear phishing

Active

Iran

Israeli media

Disinformation campaigns

Fake news, DDoS

Active

Sudan

Israeli government

Infrastructure disruption

Ransomware

Active

Iran

Israeli energy sector

Sabotage and espionage

APT, data theft

Active

Lebanon

Israeli economy

Disrupt operations

DDoS, phishing

Active

Iraq

Israeli military

Cyber reconnaissance

Malware

Active

Sudan

Israeli media

Propaganda spread

Website defacement

Active

Iran

Israeli infrastructure

Disrupt critical services

Ransomware, APT

Active

Lebanon

Israeli government

Sabotage

Malware, data exfiltration

Active

Iran

Israeli civilians

General disruption

DDoS, data exfiltration

Active

Iraq

Israeli infrastructure

Disrupt economy

SQL injection

Active

Iran

Israeli media

Spread propaganda

Fake news, DDoS

Active

Sudan

Israeli infrastructure

Disrupt operations

Ransomware, APT

Active

Lebanon

Israeli economy

Economic disruption

Phishing

Active

Iran

Israeli defense

Gather intelligence

APT, data exfiltration

Active

Iraq

Israeli media

Spread disinformation

Website defacement

Active

Sudan

Israeli economy

Financial sabotage

Data exfiltration

Active

Iran

Israeli government

Cyber espionage

Phishing, malware

Active

Lebanon

Israeli infrastructure

Disrupt critical services

Ransomware

Active

Iraq

Israeli military

Intelligence gathering

DDoS

Active

Sudan

Israeli civilians

General disruption

Ransomware

Active

Iran

Israeli media

Propaganda and sabotage

Fake news, DDoS

Active

Lebanon

Israeli infrastructure

Data exfiltration

SQL injection

Active

Iraq

Israeli economy

Economic disruption

Ransomware, phishing

Active

Sudan

Israeli defense

Cyber attacks on defense

APT

Active

Iran

Israeli infrastructure

Cyber sabotage

Malware

Active

Lebanon

Israeli military

Intelligence gathering

Malware

Active

Iraq

Israeli civilians

General disruption

Ransomware

Active

Sudan

Israeli media

Spread propaganda

Fake news

Active

Iran

Israeli government

Sabotage and espionage

APT, malware

Active

Lebanon

Israeli military

Intelligence gathering

Malware

Active

Sudan

Israeli infrastructure

Disrupt defense systems

Phishing

Active

Let that sink in - three billion cyberattacks since July! Kudos to Israel's cyber defenders, but in the merciless world of cybersecurity, prevention or elimination of "almost every attack" or threat isn't an optimistic statement. It only takes one successful cyber penetration to cause mayhem and a complete collapse of entire systems. 

The Latest Cybersecurity Goal - Deal With IONCONTROL

"Iran-affiliated threat actors have been linked to a new custom malware that's geared toward IoT and operational technology (OT) environments in Israel and the United States."

With the high tensions, labeling IONCONTROL as just another new malware is inaccurate. Let's call it as it is: a highly sophisticated cyberweapon developed and used by foreign entities to specifically target and attack civilian critical infrastructure in the USA and Israel.

IONCONTROL "is essentially custom built for IoT devices but also directly impacts OT such as the fuel pumps that are heavily used in gas stations."

Almost all OT (operational technology) devices are potential targets, including "routers, programmable logic controllers (PLCs), human-machine interfaces (HMIs), firewalls, and other Linux-based IoT/OT platforms." What makes it extremely dangerous and harmful are two components:

  1. Thanks to its modular configuration, its generic nature makes it suitable for successfully affecting a variety of platforms provided by different vendors.

  2. Fuel management systems are particularly vulnerable and, as a result, meticulously attacked. At one point, IONCONTROL directly jeopardized hundreds of US-made Gasboy and Israeli-made Orpak Systems fuel management systems in both the USA and Israel.

"For secure communication between compromised devices and the attackers, IOCONTROL leverages the MQTT protocol as a dedicated IoT communication channel. The attackers could disguise traffic over MQTT to and from the attackers' command-and-control infrastructure."

CyberAv3ngers vs. Cybersecurity Power Rangers

Where there's fuel, there's water on the target list. The hacker group operating under the codename CyberAv3ngers published a claim on Telegram stating that it had attacked 200 gas stations in Israel and the US Following the attacks on water treatment facilities, the US State Department revealed that Iran's Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC) is behind the group and offered a reward of up to $10 million for information leading to the identification or location of these individuals.

The terminology used was far away from being ambiguous. CyberAv3ngers are no "ordinary" hackers, but legit Iranian military officials conducting "unconscionable and dangerous," which can't be tolerated due to their severity:

"CyberAv3ngers, affiliated with the IRGC-CEC and Mahdi Lashgarian, targeted and compromised the Vision series of programmable logic controllers (PLCs) made by Israel-based Unitronics. The PLCs are used by the water and wastewater, energy, food and beverage, manufacturing, healthcare, and other industries, and may be rebranded as manufactured by other companies."

New Cyber Threats - New Cyberwarfare Precedents

It's evident that in the theater of cyberwar, anything and everything can be treated as a target. Attacks on the civil infrastructure are creating and legitimizing dangerous precedents. 

"The Israeli military conducted consecutive airstrikes against houses in the Gaza Strip that were allegedly home to Hamas cyber operations. Israel remains the only nation-state to have responded to cyber threats or cyber attacks through conventional military force. International concerns around establishing this precedent largely revolve around the perennial issue of how states can respond proportionately to cyberattacks."

The United States and Israel are similar but not identical. Yet, we are one hacker's attack from "cyber 9/11." The Washington Post didn't hesitate to ask, are we "sleepwalking toward a cyber 9/11" after, for that time, an unprecedented attack on the water supply in Oldsmar, FL?

"The unspoken understanding that all nations are engaging in cyber offensives has ensured state responses to significant incidents have remained confined to diplomatic reprimand and unattributed retaliation in cyberspace. This mutual understanding is evident in the US's response to the 2014 hacking of Sony Pictures Entertainment by North Korea, where President Obama limited the US's retaliations to economic sanctions and public disapproval. Similarly, US cyber offensives against Iran in 2018 elicited responses contained to cyberspace, despite escalating tensions between the two nations at the time."

The world has changed dramatically in the meantime. The ego of Kim Jong-Un over a comical depiction in a movie is the least of real-life worries for the world's safety. In striking contrast, Stuxnet is not a work of fiction, and it has already been "tested" at a "smaller" scale.

"The capacity for cyberwarfare to cause physical destruction was established in the 2009 Stuxnet attack where Iran's nuclear facilities were targeted by malware, which caused the nuclear centrifuges to spin undetected at unsafe speeds. The resulting physical damage demonstrated how cyberspace could affect conventional military capabilities."

Even in the worst imaginable scenario that includes nuclear warheads, there's still enough time and reason to act. That's not the case with modern cyberwarfare. One more serious cyber attack on the water supply system on American soil could easily change the "usual" counter-cyber response attitude. Stuxnet "only" damaged the Iran nuclear program. This time, the US air strikes could aim to completely eliminate the Iranian nuclear threat by conventional military force. 

Are We Waiting For An "Excuse" While Iran Has Nothing To Lose?

Can IONCONTROL be kept under control? 

"IOCONTROL malware is based on a generic OT/IoT malware framework for embedded Linux-based devices that are utilized and compiled against specific targets as needed. The malware communicates with a C2 over a secure MQTT channel and supports basic commands, including arbitrary code execution, self-delete, port scan, and more. This functionality is enough to control remote IoT devices and perform lateral movement if needed."

This is the result of research conducted by the Claroty Team82. The keywords from their thorough IOCONTROL analysis are extremely troubling:

  • a generic OT/IoT malware framework

  • utilized and compiled against specific targets as needed

  • arbitrary code execution

  • perform lateral movement if needed

Furthermore, their findings were "extracted from a Gasboy/ORPAK device, a fuel system platform. However, IOCONTROL was used to attack IoT and SCADA devices of various types, including IP cameras, routers, PLCs, HMIs, firewalls, and more from different vendors such as Baicells, D-Link, Hikvision, Red Lion, Orpak, Phoenix Contact, Teltonika, Unitronics, and others."

So, it's up to CyberAv3ngers to decide when and where to strike again. More importantly, how far would they be willing to go with their next attack?

It's one thing to not be able to have access to fuel or even water for a limited period of time as a result of cybersecurity failure or weakness, but the awareness of potential cyber penetration within homes and at a much larger scale is the next level. We have every reason to fear that no voice of reason or the top cybersecurity division won't be able to prevent the public outrage and demand for retribution by any means and weapons available. 

In the aftermath of the tragic events of the Hamas attack, "the army has launched multiple investigations into the failures of 7 October, and the head of military intelligence has resigned." The response brought the world to the very edge of WW3. 

The IOCONTROL failure resulted in a $10 million reward for Iranian military cyber division members. The road to Damascus has a completely new meaning after the fall of Assad. 

After a battle, everyone is a general. After a cyberattack, everyone is a cybersecurity expert. It's difficult to prevent all cyber threats, but it's even more challenging to reinvent the world in ruins after full-scale cyber warfare. Back to Einstein's ominous prediction with a small adjustment, we wouldn't be using sticks and rocks for fighting another war, but powerless gadgets and machines for basic survival. 

Stay safe, stay secure.

The CybersecurityHQ Team

Reply

or to participate.