Evidence Suggests Russia Behind Malware Used In Infrastructure Attack

Nov. 2, 2018
U.S. security firm believes Russia was most likely responsible for Middle Eastern infrastructure attack.

Researchers from U.S. security firm FireEye now believe that Russia is most likely behind a malware attack at a critical infrastructure facility in the Middle East, according to an article from Ars Technica. FireEye researchers reportedly assess “with high confidence” that a Russian-government backed research institute – the Central Scientific Research Institute of Chemistry and Mechanics in Moscow – helped develop the software that caused a major operational failure at the facility.  

The malware, alternately labeled Triton and Trisis, according to the article, worked by tampering with the facility’s safety-instrumented system. A variety of evidence reportedly implicates the Russian institute, according to FireEye’s report, including “malware that was tested inside the institute, artifacts left inside the malware used in the attack, an IP address belonging to the institute and the malware developer’s operating hours.” 

Read the entire article here.

Sponsored Recommendations

Keys to Improving Safety in Chemical Processes (PDF)

Many facilities handle dangerous processes and products on a daily basis. Keeping everything under control demands well-trained people working with the best equipment.

Get Hands-On Training in Emerson's Interactive Plant Environment

Enhance the training experience and increase retention by training hands-on in Emerson's Interactive Plant Environment. Build skills here so you have them where and when it matters...

Managing and Reducing Methane Emission in Upstream Oil & Gas

Measurement Instrumentation for reducing emissions, improving efficiency and ensuring safety.

Micro Motion 4700 Coriolis Configurable Inputs and Outputs Transmitter

The Micro Motion 4700 Coriolis Transmitter offers a compact C1D1 (Zone 1) housing. Bluetooth and Smart Meter Verification are available.