home.social

#mikrotikvulnerability — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #mikrotikvulnerability, aggregated by home.social.

  1. New ICS Malware 'FrostyGoop' Targeting Critical Infrastructure

    Date: July 23, 2024

    CVE: N/A

    Vulnerability Type: Exploitation of Modbus TCP communication

    CWE: [[CWE-668]], [[CWE-20]], [[CWE-74]]

    Sources: The Hacker News, Yahoo News, Dragos

    Synopsis

    FrostyGoop is a newly identified malware designed to target Industrial Control Systems (ICS) by exploiting Modbus TCP communication protocols. This malware caused significant disruption to critical infrastructure in Lviv, Ukraine, earlier this year.

    Issue Summary

    In January 2024, FrostyGoop malware targeted an energy company in Lviv, resulting in a 48-hour loss of heating services to over 600 apartment buildings. This malware interacts directly with ICS devices using Modbus TCP over port 502, making it a serious threat to critical infrastructure.

    Technical Key Findings

    FrostyGoop, written in Golang, can read and write to ICS device registers and uses JSON-formatted configuration files to target specific IP addresses and Modbus commands. Initial access was likely gained through a vulnerability in Mikrotik routers.

    Vulnerable Products

    ENCO controllers with TCP port 502 exposed and ICS devices using Modbus TCP are particularly vulnerable to this malware.

    Impact Assessment

    The malware's ability to manipulate ICS devices can lead to significant operational disruptions, inaccurate system measurements, and potential safety hazards, affecting public safety and industrial operations.

    Patches or Workarounds

    Currently, there are no specific patches available for FrostyGoop.

    #FrostyGoop #ICS #ModbusTCP #CriticalInfrastructure #CyberAttack #EnergySector #Ukraine #Dragos #IndustrialControlSystems #Golang #MikrotikVulnerability