Names | IOCONTROL | |
Category | Malware | |
Type | ICS malware | |
Description | (Claroty) Team82 obtained a sample of a custom-built IoT/OT malware called IOCONTROL used by Iran-affiliated attackers to attack Israel- and U.S.-based OT/IoT devices. IOCONTROL has been used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs, firewalls, and more. Some of the affected vendors include: Baicells, D-Link, Hikvision, Red Lion, Orpak, Phoenix Contact, Teltonika, Unitronics, and others. We’ve assessed that IOCONTROL is a cyberweapon used by a nation-state to attack civilian critical infrastructure. | |
Information | <https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol> |
Last change to this tool card: 27 December 2024
Download this tool card in JSON format
Previous: IRAFAU
Next: IRONHALO
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |