BTC $106805.8580
ETH $2583.9009
XRP $2.2374
BNB $658.3683
SOL $152.7788
TRX $0.2770
DOGE $0.1739
ADA $0.6326
stETH $2582.2461
WBTC $106694.1367
HYPE $42.1365
wstETH $3103.8764
SUI $2.9913
BCH $476.1633
LINK $13.5003
USDS $1.0000
WBT $51.2308
LEO $9.1902
XLM $0.2600
AVAX $19.1531
ONDO $0.7724
TON $2.9820
WETH $2582.6977
weETH $2764.3984
HBAR $0.1557
LTC $86.4199
BSC-USD $1.0006
XMR $329.0462
DOT $3.8350
USDE $0.9996
BTCB $106794.9921
BGB $4.5116
PEPE $0.0000
UNI $7.6437
AAVE $276.0552
PI $0.5649
sUSDe $1.1825
DAI $1.0004
TAO $360.0698
OKB $51.4558
APT $4.6348
CBBTC $106771.7032
ICP $5.3651
NEAR $2.2368
CRO $0.0900
ETC $17.0143
TKX $32.1546
BTC $106805.8580
ETH $2583.9009
XRP $2.2374
BNB $658.3683
SOL $152.7788
TRX $0.2770
DOGE $0.1739
ADA $0.6326
stETH $2582.2461
WBTC $106694.1367
HYPE $42.1365
wstETH $3103.8764
SUI $2.9913
BCH $476.1633
LINK $13.5003
USDS $1.0000
WBT $51.2308
LEO $9.1902
XLM $0.2600
AVAX $19.1531
ONDO $0.7724
TON $2.9820
WETH $2582.6977
weETH $2764.3984
HBAR $0.1557
LTC $86.4199
BSC-USD $1.0006
XMR $329.0462
DOT $3.8350
USDE $0.9996
BTCB $106794.9921
BGB $4.5116
PEPE $0.0000
UNI $7.6437
AAVE $276.0552
PI $0.5649
sUSDe $1.1825
DAI $1.0004
TAO $360.0698
OKB $51.4558
APT $4.6348
CBBTC $106771.7032
ICP $5.3651
NEAR $2.2368
CRO $0.0900
ETC $17.0143
TKX $32.1546
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • New 'FrostyGoop' malware for ICS systems detected, targets critical infrastructure

    In early January 2024, a devastating cyberattack on a local energy company took place in the Ukrainian city of Lviv. Cybersecurity researchers have discovered a ninth malware targeting industrial control systems (ICS). The new malware, dubbed FrostyGoop, is the first to use Modbus TCP communication to sabotage operational technology (OT) networks.

    Dragos, an industrial cybersecurity company, discovered FrostyGoop in April 2024. According to their data, this malware, written in the Golang language, is able to communicate with industrial control systems via port 502 using the Modbus TCP protocol.

    FrostyGoop has a wide range of capabilities, including reading and writing data to ICS devices, processing Modbus commands, and logging. The main target of this malware was ENCO controllers that have TCP port 502 open to the Internet.

    The incident led to the loss of heating services in more than 600 apartment buildings for almost two days. According to the researchers, the attackers sent Modbus commands to the ENCO controllers, which caused inaccurate measurements and system malfunctions. Initial access was likely gained by exploiting a vulnerability in Mikrotik routers in April 2023.

    Although FrostyGoop makes extensive use of the Modbus protocol, it is not the only example of such malware. In 2022, Dragos and Mandiant described another ICS malware called PIPEDREAM, which also used various industrial networking protocols.

    The ability of malware to read or modify data on ICS devices using Modbus poses a serious threat to industrial operations and public safety. Dragos notes that more than 46,000 ICS devices available on the Internet communicate using this protocol.

    The researchers emphasize the importance of implementing comprehensive cybersecurity systems to protect critical infrastructure from similar threats in the future.

    Global scam by Stargazer Goblin: 3,000 fake GitHub accounts spreading malware
    Top 10 Emerging Cybercrime Methods in 2024

    Comments 0

    Add comment