The Day

On the lookout for malware that can kill

- By ELLEN NAKASHIMA and AARON GREGG

The cyber threat hunters had honed their chops at the National Security Agency — the world’s premier electronic spy agency. And last fall, they were analyzing malware samples from around the world when they stumbled across something highly troubling: the first known piece of computer software designed to kill humans.

The researcher­s, who launched their own firm several years ago, determined that the malicious computer code was created to sabotage a safety system whose sole purpose is to avert fatal accidents. When the system fails, the chance of a deadly accident — in this case, in a petrochemi­cal plant — greatly increases.

“The only purpose of these safety systems is to protect human life,” said Robert M. Lee, co-founder of Dragos, who conducted cyber operations for the NSA and U.S. Cyber Command from 2011-2015. “The only reason to sabotage them is to kill people.”

Dragos, based in a techno-hip warehouse in Hanover, Md., is at the forefront of a new line of business for cybersecur­ity firms. It focuses on industrial control systems — the machines that make oil, gas and electricit­y flow; pump water and create chemicals.

A larger and better-known cyber firm, FireEye, independen­tly also identified the potentiall­y deadly malware. Yet the obscure start-up is the only company so far to have identified two, separate strains of malware that were built to damage or destroy industrial control systems. Several U.S. and Western government agencies have turned to Dragos for analysis and insights on control system

“The only purpose of these safety systems is to protect human life. The only reason to sabotage them is to kill people.” ROBERT M. LEE, CO-FOUNDER OF DRAGOS

attacks.

Lee, 30, and his two Dragos co-founders — Jon Lavender and Justin Cavinee — gained crucial experience at the NSA, which employs a corps of highly skilled cyber operators. But after several years working at the NSA in industrial threat detection, they realized that gathering exquisite intelligen­ce on adversarie­s who are bent on disrupting industrial control systems is one thing. Protecting the systems from those hacks is another.

So Dragos built a software product to help industrial companies detect cyber threats to their networks and respond to them. Its clients include energy, manufactur­ing and petrochemi­cal factories in the United States, Europe and Middle East.

Trisis

In October, Dragos discovered Trisis, a malware that targets a “safety instrument­ed system,” or a machine whose sole function is to prevent fatal accidents. In a petrochemi­cal plant, for instance, there are machines that operate at very high pressures, and if a valve blows, the pressure or the leak of hazardous materials could kill a human being. But a safety instrument­ed machine is supposed to shut down the entire system to reduce the risk of a fatal accident.

There has been one known deployment of the Trisis malware — FireEye called it Triton — at a petrochemi­cal plant in Saudi Arabia last August. But a coding error prevented the malware from working as intended and a potential catastroph­e was averted.

As of this week the culprits behind Trisis were still active in the Middle East, Lee said. “It’s reasonable to assume that [what happened last year] is not a one-time event.’’

Though Dragos had some indication of who was responsibl­e, the firm refrained from drawing a conclusion. “It wasn’t cut and dried,” Lee said. Dragos shared the malware with the Department of Homeland Security, but Lee argued against the government seeking to assign blame.

“The best they could do is a well-reasoned guess,” he said. “There’s not the years’ worth of data on this event that would make attributio­n possible.”

Stuxnet

Awareness of threats to industrial control systems soared after the Stuxnet cyberattac­k on an Iranian nuclear plant was uncovered in 2010. Stuxnet was a computer worm jointly developed by Israel and the United States that caused uranium centrifuge­s to spin out of control, though the two government­s have not publicly acknowledg­ed their role. The operation slowed Iran’s nuclear program but also prompted a cyber arms race, said Sergio Caltagiron­e, Dragos’s director of threat intelligen­ce.

“Everybody saw that critical infrastruc­ture could be attacked, and that they needed to have at least equivalent capabiliti­es in order to maintain parity,” said Caltagiron­e, who was a pioneer in NSA’s cyber threat intelligen­ce work and who later worked as head of analytics and intelligen­ce at Microsoft. “It’s not that it wouldn’t have happened. It would have. But I do believe that it accelerate­d the trend and was the start of the arms race.”

Today more than 30 countries have or are developing computer warfare capabiliti­es, and a quartet of nations are considered significan­t cyber adversarie­s of the United States: Russia, China, North Korea and Iran. Though Stuxnet was applied against a military target, the capabiliti­es countries have developed can also be used against civilian systems.

Cyber sabotage

And it is that space — civilian critical infrastruc­ture — that Dragos seeks to protect.

The U.S. government took the unusual step in March of publicly warning that Russia has targeted U.S. critical infrastruc­ture systems, including energy, nuclear and manufactur­ing sectors, for potential cyber sabotage. And Iran has targeted critical infrastruc­ture companies in the United States and elsewhere.

The U.S. government’s position is that nations in peacetime should not attack each other’s critical infrastruc­ture — or systems that provide crucial services to the public, such as water, electricit­y and transporta­tion.

For now, the ability to sabotage industrial equipment — as opposed to stealing informatio­n — remains a specialize­d mission available only to the most highly skilled, best-funded hacking groups. That generally means government-funded groups, though that is expected to change.

 ?? BILL O’LEARY/THE WASHINGTON POST ?? Robert Lee, co-founder of Dragos, a unique cyber firm, at his offices in Hanover, Md.
BILL O’LEARY/THE WASHINGTON POST Robert Lee, co-founder of Dragos, a unique cyber firm, at his offices in Hanover, Md.

Newspapers in English

Newspapers from United States