Description

Iranian threat actors, reportedly linked to the hacking group CyberAv3ngers, have been deploying a new malware called IOCONTROL to target Internet of Things (IoT) devices and Operational Technology (OT)/SCADA systems critical to infrastructure in the U.S. and Israel. These attacks, which began in late 2023 and continued into mid-2024, have affected a wide range of devices, including routers, programmable logic controllers (PLCs), human-machine interfaces (HMIs), firewalls, IP cameras, and fuel management systems like Orpak and Gasboy. The modular nature of IOCONTROL allows it to compromise devices from various manufacturers, such as D-Link, Hikvision, and Red Lion, making it versatile in attacking diverse system architectures. The malware's stealthy operations include utilizing a persistence script that ensures it remains active even after system reboots. IOCONTROL communicates with its command-and-control (C2) server via the MQTT protocol over port 8883, a common method for IoT devices. It also uses DNS over HTTPS (DoH) to evade detection and encrypts its configuration using AES-256-CBC. IOCONTROL can execute multiple commands, including system information reporting, executing arbitrary commands, scanning networks, and self-deleting to remove traces of the attack. This malware poses significant risks to critical infrastructure, with the potential to disrupt operations or steal sensitive data. Claroty's Team82, which uncovered IOCONTROL, warns of its ongoing activity and urges defenders to identify and block the threat using the provided indicators of compromise (IoC).