That Saudi oil and gas plant that got hacked. You’ll never guess who could… OK, it’s Russia

More from: | The Register |
0

FireEye reckons it’s fingered the miscreants behind nasty cyber-infection at industrial complex

A malware infection at a Saudi petrochemical plant last year was likely the work of a Moscow-based research operation backed by the Russian government.

Security shop FireEye says this week it is confident in labeling the Kremlin-backed Central Scientific Research Institute of Chemistry and Mechanics (CNIIHM) as the source of tools used to carry out the 2017 Triton attack on industrial control systems at a Saudi oil and gas facility.

FireEye says that an operation known as TEMP.Veles was the precursor of what would become the Triton attack. After reconnaissance the TEMP team infiltrated machines in the Saudi organization and installed malware, which spread throughout its network. This

(...)

Read full article » http://go.theregister.com/feed/www.theregister.co.uk/2018/10/24/triton_malware_attack/


About | The Register |

The Register is a leading global online tech publication, with more than nine million monthly unique browsers worldwide. The core audiences are the UK and US, accounting for more than six million. The bulk of the remaining readership are located in Canada, Australia and northern Europe.

Starting out in London in 1994 as an occasional email newsletter, The Register began publishing online daily in 1998. Today The Register is headquartered in London, San Francisco and Sydney and the sun never sets on its reporting team around the world.

»Twitter: @TheRegister »Facebook: @VultureCentral