• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

FireEye Caught Sneaky Malware Targeting Siemens Industrial Systems

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
June 3, 2016, 2:30 PM ET
Sewage treatment plant in Jordan
Madaba, Jordan - April 06: SCADA system, an employee of a sewage treatment plant points on a blueprint on April 06, 2016 in Madaba, Jordan. (Photo by Thomas Imo/Photothek via Getty Images)Thomas Imo—Photothek via Getty Images

Here’s a worrisome observation: Hackers are learning to design malicious software that goes after critical infrastructure and evades capture.

Computer security researchers at the cybersecurity firm FireEye (FEYE) said on Thursday that they discovered malware that targets industrial control systems, machines that undergird the operations of utilities and manufacturing plants. The malware, dubbed “irongate,” affects simulated Siemens (SIEMENS-AG) computing environments, the team said.

Get Data Sheet, Coins2Day ’s technology newsletter.

FireEye’s researchers stumbled upon the code on the site VirusTotal, a Google-owned (GOOG) search engine that checks malware samples against antivirus scans, in late 2015. Two unidentified sources uploaded two separate versions of the malware a year earlier; neither of the samples triggered an alarm at the time, the team said.

According to FireEye’s blog post, Siemens said the malware is not yet advanced enough to impact real-world systems. Irongate “is not viable against operational Siemens control systems,” the company said, and it “does not exploit any vulnerabilities in Siemens products.” (Coins2Day has reached out to Siemens for further clarification and will update this post if we hear back.)

For less sophisticated cyberattacks, watch:

The newly uncovered malware seems to take its cue from Stuxnet, a shadowy cyberattack allegedly designed by the United States and Israeli intelligence agencies to knock out the centrifuges used in Iran’s nuclear program. The researchers note that while the malware “does not compare to Stuxnet in terms of complexity, ability to propagate, or geopolitical implications,” it does incorporate “some of the same features and techniques”—for example, in the way they both manipulate certain digital processes in SCADA systems, check for defenses before detonating, and mask their tracks.

Some defining characteristics of the code: It can cause a man-in-the-middle attack—intercepting and meddling with data traffic—and can evade digital sandboxes, defensive tools that security managers use to analyze and block potential malware programs. You can learn more about the inner workings of the malware as well as its indicators of compromise in the FireEye post.

“We have generally not seen a lot of progress since Stuxnet to address the issues that Irongate brings up,” Dan Scali, a senior manager at FireEye, told Threatpost, a security blog sponsored by the Russian cybersecurity firm Kaspersky. “The concern is as the capability to do these types of attacks gets easier over time we need to bolster our defenses as a counterweight.”

The researchers said they have determined very little about the malware’s provenance. They speculated that it could be a “test case, proof of concept, or research activity for ICS [industrial control systems] attack techniques.”

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.