Dark
Light

Dragos drops Intel Brief on FrostyGroup ICS Malware – Aus Cyber Mag

1 min read
52 views



TLDR:

Dragos has released an intelligence brief on the FrostyGroup ICS malware, highlighting its impact on OT systems. The malware targets devices using the Modbus TCP protocol and was involved in a cyber-attack on a district energy company in Ukraine. The incident led to a two-day remediation process and impacted over 600 apartment buildings.

Summary of the Article:

Dragos has recently published an intelligence brief that delves into the impact of the FrostyGroup ICS malware on connected OT systems. The malware, named FrostyGoop, was discovered in a malware scanning repository in April 2024.

  • The FrostyGoop malware targets devices communicating over Modbus TCP.
  • It can manipulate control, modify parameters, and send unauthorized command messages.

The Cyber Security Situation Center in Ukraine shared details with Dragos about a cyber-attack on a district energy company in Lviv that took place in January 2024. The attack, facilitated by FrostyGoop and internet-exposed ICS devices, led to a two-day remediation process and affected over 600 apartment buildings in the area.

Dragos assessed that the incident highlights the vulnerability of ICS systems to cyber-attacks, particularly those using common protocols like Modbus TCP. The full intelligence brief can be accessed for more in-depth information on the FrostyGroup ICS malware and its impact on OT systems.


Previous Story

Data breaches spiked by 490% since first half of 2023

Next Story

CrowdStrike spills the beans on global PC crash incident

Latest from News

August 2024: 36 Cybersecurity M&A Deals Unveiled

“`html TLDR: Key Points: 36 cybersecurity-related M&A deals announced in August 2024 Major deals include Ark-Vantyr, Check Point-Cyberint, Cisco-Robust Intelligence, DigiCert-Vercara, EQT-Acronis Summary: Thirty-six