Podcast
Root Causes 307: OT Red Teaming Leads to Malware Attack


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
May 31, 2023
In this episode we describe how tools from operational technology red team exercises are being repurposed for malware attacks.
Podcast Transcript
Lightly edited for flow and brevity.
And this article from Mandiant is very interesting about a new variant on OT malware.
And that is this. We know that in the enterprise world, we have script kiddies who we use that term because of the fact that the technology pipeline of the bad guys, in the enterprise world especially, when enterprises are the target, that homogenous set of technologies – there’s all kinds of open source research malware that’s out there that people can look at and utilize and start doing things like keylogging. Keylogging is not that hard because the code for it is available. You and I have talked quite a bit before about various other kinds of fraudulent malware that can help you to do fraud events with money when the source code for the Zeus virus – this is going way back now - was made available, a lot of people realized, oh geez, hooking the memory space within the Windows operating system is not that difficult, I can actually hook the memory space of a browser and start to do man-in-the-browser-type event whenever you’re doing your banking or other things like that. And so that kinds of techniques became pretty ubiquitous amongst people who might not have figured out those kinds of clever techniques on their own. Well, obviously, OT-type of malware requires a whole lot of inside knowledge and a whole lot of innovative clever-type of events like that. So, the problem here is that what we’re seeing, and this is Mandiant saying this, they think the source of this malware, and I’m not really as much interested in the Russian attribution of this at the moment.
As I say, I’m not as interested in the Russian attribution of this malware as I am interested in the fact that this malware seems to have been sourced from a, probably a legitimate, operation of red teaming. So in other words, the penetration testers that were hired by OT industry within a country - like Russia - to basically test out their security posture. And some of these tools are making their way out of those hands and into the hands of people who are going to do bad things.

