Evidence Suggests Russia Behind Malware Used In Infrastructure Attack

Nov. 2, 2018
U.S. security firm believes Russia was most likely responsible for Middle Eastern infrastructure attack.

Researchers from U.S. security firm FireEye now believe that Russia is most likely behind a malware attack at a critical infrastructure facility in the Middle East, according to an article from Ars Technica. FireEye researchers reportedly assess “with high confidence” that a Russian-government backed research institute – the Central Scientific Research Institute of Chemistry and Mechanics in Moscow – helped develop the software that caused a major operational failure at the facility.  

The malware, alternately labeled Triton and Trisis, according to the article, worked by tampering with the facility’s safety-instrumented system. A variety of evidence reportedly implicates the Russian institute, according to FireEye’s report, including “malware that was tested inside the institute, artifacts left inside the malware used in the attack, an IP address belonging to the institute and the malware developer’s operating hours.” 

Read the entire article here.

Sponsored Recommendations

Heat Recovery: Turning Air Compressors into an Energy Source

More than just providing plant air, they're also a useful source of heat, energy savings, and sustainable operations.

Controls for Industrial Compressed Air Systems

Master controllers leverage the advantages of each type of compressor control and take air system operations and efficiency to new heights.

Discover Your Savings Potential with the Kaeser Toolbox

Discover your compressed air station savings potential today with our toolbox full of calculators that will help you determine how you can optimize your system!

The Art of Dryer Sizing

Read how to size compressed air dryers with these tips and simple calculations and correction factors from air system specialists.