{"id":30736,"date":"2019-05-13T16:45:54","date_gmt":"2019-05-13T12:45:54","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=30736"},"modified":"2020-12-22T16:50:58","modified_gmt":"2020-12-22T12:50:58","slug":"triton-malware","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/triton-malware\/","title":{"rendered":"How To Detect and Defend Against Triton Malware"},"content":{"rendered":"<p>Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the <a href=\"https:\/\/www.zdnet.com\/article\/what-is-the-iiot-everything-you-need-to-know-about-the-industrial-internet-of-things\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Industrial Internet of Things (IIoT)<\/a> is nothing new.<\/p>\n<p>These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. <!--more--><\/p>\n<p>While some threats are designed to penetrate any type of network or system, Triton is the first malware aimed specifically at breaching ICS and IIoT. Never mind that spyware, ransomware, and crypto jacking get more attention. Triton is as ugly as it gets because it aims to turn off or circumvent safety systems, paving the way for events (such as a deadly chemical release, explosions, or out-of-control fire) that can lead to loss of life.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/webinars\/responding-to-ransomware\/\">Responding to Ransomware: From Detection to Damage Control<\/a><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/cryptojacking-how-to-detect-and-avoid\/\">Cryptojacking: How to Detect and Avoid<\/a><\/p>\n<p>Here\u2019s what you need to know about Triton malware, including what can be done to safeguard your corporate network and connected equipment.<\/p>\n<h2>Triton\u2019s History from 2010 to the Present<\/h2>\n<p>Triton\u2019s can be traced to Stuxnet and events in 2010. During that year, the Stuxnet campaign was developed as a computer worm capable of gaining control of programmable logic controllers and changing how they managed the automated functions of industrial machinery.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-30742\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-3-5.png\" alt=\"How Stuxnet worked\" width=\"826\" height=\"714\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-3-5.png 826w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-3-5-300x259.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-3-5-768x664.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-3-5-624x539.png 624w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><\/p>\n<p>The original <a href=\"https:\/\/www.csoonline.com\/article\/3218104\/what-is-stuxnet-who-created-it-and-how-does-it-work.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">idea behind Stuxnet<\/a> was to develop a worm capable of undermining Iran\u2019s nuclear facility functions. It wasn\u2019t long until the worm was hijacked and adapted by third parties to wreak havoc on everything from power plants to water treatment facilities.<\/p>\n<p>Transmitted via sharing USB sticks and through the Windows systems of the day, it was the first worm that successfully infiltrated and shut down hardware used to control machinery.<\/p>\n<h3><a name=\"stuxnet\"><\/a>Stuxnet Toughens Up and Changes Names<\/h3>\n<p>Continued development by multiple groups led to the development of Triton in 2017. During August of that year, the new-and-improved malware emerged as a more dangerous variant of Stuxnet, one capable of disrupting and even destroying production processes. It was discovered by total fluke when a petrochemical plant in the Middle East shut down unexpectedly.<\/p>\n<p><q>Alternatively dubbed Triton, Trisis, and Hatman, the malware is still infecting thousands of computers and still capable of being transmitted through multiple means. Far from being neutralized as a threat, it continues to be refined and remains one of the most sophisticated <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/triton-malware-spearheads-latest-generation-of-attacks-on-industrial-systems\/\" rel=\"nofollow noopener\">threats to corporations<\/a> today.<\/q><\/p>\n<h2>Understanding ICS and How an Attacker Gains Entrance<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-30743\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-2-6.png\" alt=\"\" width=\"800\" height=\"530\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-2-6.png 800w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-2-6-300x199.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-2-6-768x509.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/05\/Group-2-6-624x413.png 624w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Knowing a little more about ICS (Industrial Control System) &amp; IIoT and how malware infiltrates corporate networks helps illustrate why threats like Triton should not be taken lightly. As the name implies, an Industrial Control System makes it possible to centralize the control of multiple pieces of equipment. That control may be housed in machinery located in a single facility or be networked to control machinery at multiple locations.<\/p>\n<p>Worms and malware gain entrance in a number of ways.<\/p>\n<p>A backdoor approach is to gain network access via infected attachments distributed by email. Using a service to protect your network and monitor websites can often detect backdoor access, but malware programs adapt to circumvent these defenses using a clever <a href=\"https:\/\/surfshark.com\/learn\/what-is-ip-masking\" rel=\"nofollow noopener\">form of IP masking<\/a> to take control of industrial controllers. Once opened, the worm bores into other network files and functions, making it possible to infect the ICS hardware. At that point, it\u2019s easy to shut down or otherwise interfere with the function of the plant machinery.<\/p>\n<p>Infections can also spread via websites as well as file-sharing in supposed safe environments. And as with the original Stuxnet, there is the potential for sabotage to occur by introducing the malware to a system via USB stick.<\/p>\n<p>There\u2019s a good chance your IT team is already doing what they can to close doors to ransomware and crypto jacking, the two most popular malware today. Ransomware seems to be on the decline, though occurrences of crypto jacking <a href=\"https:\/\/www.networkcomputing.com\/network-security\/ransomware-attacks-drop-sharply-crytojacking-rises\" rel=\"nofollow noopener\">continue to rise<\/a>. Expect threats like Triton to become more common, which makes now a good time for IT teams to become familiar with preventing, detecting, and mitigating it.<\/p>\n<h2>First and Second Stages of the Attack<\/h2>\n<p>Your network defenses should already ward off a number of threats each day. A robust and regularly updated firewall is a good idea. If you haven\u2019t already, appoint someone on the IT team to make sure your firewall is always up to date. This applies even if you operate a small business.<\/p>\n<p>At the second stage, the threat breaks into the network. There is only a limited amount of time to find and neutralize it, so moving quickly is paramount.<\/p>\n<p>In addition to a strong firewall, ensure your antivirus software is updated at least once a day and that there are network fail-safes that effectively wall off access to data and functions when a threat is detected. Regular software updates may seem like a trivial matter, but they are essential to keeping out malware like Triton. It\u2019s no surprise that FINRA ranks \u201csecurity updates\u201d as <a href=\"https:\/\/www.name.com\/blog\/business\/websites-2\/security\/2019\/03\/best-cybersecurity-practices-for-website-owners-in-2019\/\" rel=\"nofollow noopener\">second on their business cybersecurity checklist<\/a>.<\/p>\n<p>Beyond a firewall and AV software, recommended industrial cybersecurity solutions now include a virtual private network (VPN). No longer a niche tool for security experts and content pirates, the strongest and <a href=\"https:\/\/privacycanada.net\/best-vpn-canada\/\" rel=\"nofollow noopener\">best VPN services<\/a> on the market today serve as a means to encrypt data and establish and maintain online privacy through anonymity via IP address shielding. It\u2019s harder for the bad guys to penetrate a network if they can\u2019t find it in the first place.<\/p>\n<h2>Detecting the Attack<\/h2>\n<p>There is good news in all this. Just as malicious software has evolved, system protections, bolstered by <a href=\"https:\/\/www.dataversity.net\/how-ai-helps-organizational-cybersecurity-in-2019\" rel=\"nofollow noopener\">artificial intelligence (AI) improvements<\/a>, are more sophisticated than ever.<\/p>\n<p>When your protections detect a threat, two things need to happen.<\/p>\n<ol>\n<li>Access to data and system functions are blocked at once. Passwords can be used to initiate the blocks if necessary.<\/li>\n<li>Isolating and destroying the threat is essential. This isn\u2019t as easy as it may seem since the nature of worms is to duplicate and then infiltrate all sorts of stored files.<\/li>\n<\/ol>\n<h2>Mitigating the Attack<\/h2>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Recognition is the key to bringing an attack to a halt. At the risk of making the point repetitive, this means keeping protections updated at all times. Most credible virus protection software offers daily patch releases to thwart emerging threats. By applying these patches as soon as they come out, the chance is better that you\u2019ll catch and contain the threat.<br \/>\nThere should be an incident response team, armed with a <a href=\"https:\/\/www.forbes.com\/sites\/quora\/2017\/09\/22\/how-can-we-stop-all-these-high-profile-cyber-attacks-and-security-breaches\/#4d4d14c67efe\" rel=\"nofollow noopener\">security incident response plan<\/a>, trained to step in and deal with a detected threat. The purpose is to have a preordained process to contain the threat, determine how to deal with it, and ultimately wipe it from the system before any data can be manipulated or stolen.<\/p>\n<h2>Protect Yourself by Upping Your Backup Game<\/h2>\n<p>While taking care of a threat while it\u2019s in progress is great, organizations should plan for failure and that means a fail-proof backup plan. In the event the Triton worm succeeds, you will need to shut down, cleanse the system, and then install the most recent clean backup.<\/p>\n<p>The backed up files should be inaccessible to the worm that\u2019s tainting the primary system. One option is a secondary server that can\u2019t communicate with the primary one without authorization or else some type of secure cloud storage. Daily updates will ensure little data is lost if an attack breaches the primary system.<\/p>\n<h2>The Bottom Line<\/h2>\n<p>Stay on top of the latest protections and take nothing for granted. Ensure your IT team is constantly looking for information on new threats and how to neutralize them. With worms and other forms of malware becoming more complex every day, you can\u2019t afford to be caught off guard by something as nasty as Triton.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new. These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":30741,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-30736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/30736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=30736"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/30736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/30741"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=30736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=30736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=30736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}