TRISIS Group, Known for Physical Destruction, Targets U.S. Electric Companies

XENOTIME, a destructive APT linked to Russia, has broadened its target set beyond Middle East oil and gas. XENOTIME, the APT group behind the TRISIS industrial control system (ICS) event, has expanded its focus beyond the oil and gas industries, Read More …

FireEye links Russian research lab to Triton ICS malware attacks

A Russian research laboratory is behind cyber-attacks on critical infrastructure, including on a Saudi petrochemical plant, according to a report published today by US cyber-security firm FireEye. The cyber-attacks took place in 2017 and deployed a never-before-seen malware strain known Read More …

Plague of the Cyber RATs: How a toxic computer code delivered by ‘Remote Access Trojans’ is an invisible army able to take over a petrochemical plant

On a broiling day last August, managers of a huge petrochemical plant in Saudi Arabia discovered to their horror that it had been attacked. The consequences could have been catastrophic: the invaders had seized command of its computerised control-and-safety system, and had Read More …

Trisis has the security world spooked, stumped and searching for answers

More than four months have passed since a novel, highly sophisticated piece of malware forced an important oil and gas facility in the Middle East to suddenly shut down, but cybersecurity analysts still don’t know who wrote the code. Since Read More …