Center for Threat-Informed Defense

Version 14.1 15.0

Software : ICS ATT&CK Changelog

Modified Software

Description

REvil is a ransomware family that has been linked to the GOLD SOUTHFIELD group and operated as ransomware-as-a-service (RaaS) since at least April 2019. REvil, which as been used against organizations in the manufacturing, transportation, and electric sectors, is highly configurable and shares code similarities with the GandCrab RaaS.[1][2][3]

References:

  1. Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.
  2. Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020.
  3. Group IB. (2020, May). Ransomware Uncovered: Attackers’ Latest Methods. Retrieved August 5, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-26 20:06:33.317000+00:00 2024-04-11 00:15:32.724000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 2.1 2.2

Description

Stuxnet was the first publicly reported piece of malware to specifically target industrial control systems devices. Stuxnet is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.[1][2][3][4] Stuxnet was discovered in 2010, with some components being used as early as November 2008.[1]

References:

  1. Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved. 2017/09/22
  2. CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.
  3. Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.
  4. Ralph Langner. (2013, November). To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve. Retrieved December 7, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-03-20 13:50:55.168000+00:00 2024-04-10 23:46:32.577000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.3 1.4

Description

Industroyer is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.[1] Industroyer was used in the attacks on the Ukrainian power grid in December 2016.[2] This is the first publicly known malware specifically designed to target and impact operations in the electric grid.[3]

References:

  1. Anton Cherepanov. (2017, June 12). Win32/Industroyer: A new threat for industrial controls systems. Retrieved December 18, 2020.
  2. Dragos Inc.. (2017, June 13). CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Retrieved December 18, 2020.
  3. Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020.
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2023-10-17 20:09:38.062000+00:00 2024-04-11 16:06:34.700000+00:00
x_mitre_contributors[0] Dragos Threat Intelligence Dragos Threat Intelligence

Description

VPNFilter is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. [1] [2]

References:

  1. William Largent 2018, June 06 VPNFilter Update - VPNFilter exploits endpoints, targets new devices Retrieved. 2019/03/28
  2. Carl Hurd 2019, March 26 VPNFilter Deep Dive Retrieved. 2019/03/28
Details
Values Changed
FIELD OLD VALUE NEW VALUE
modified 2022-10-12 18:30:51.174000+00:00 2024-03-07 18:57:15.800000+00:00
x_mitre_attack_spec_version 2.1.0 3.2.0
x_mitre_version 1.0 1.1