TRISIS in Perspective
Implications of Safety System Attacks
for ICS Defenders
Place Your Header Here in Arial 22pt
Place Subtitle Here
Agenda
• TRISIS Event
• TRISIS Malware
• XENOTIME Activity Group
• Defensive Recommendations
TRISIS Event
Unspecified gas facility in Saudi Arabia attacked in August 2017.
Infection resulted in system shutdown during the intrusion.
Not assessed as a shutdown due to an attack (accidental).
Attack focused on Schneider Electric Triconex Safety System (SIS).
TRISIS Attack Progression
Establish
Access on
SIS-
Connecting
System
Transfer
TRISIS
Package to
System
Use TRISIS
Base EXE to
Upload
Tristation
Program
Tristation
Program
Compromises
SIS
Leverage
Access for
ICS
Disruption via
SIS
Establish
Access on
SIS-
Connecting
System
Transfer
TRISIS
Package to
System
Use TRISIS
Base EXE to
Upload
Tristation
Program
Tristation
Program
Compromises
SIS
Leverage
Access for
ICS
Disruption via
SIS
TRISIS Attack - Observed
Something breaks here! (maybe)
TRISIS Malware exploits and installs rootkit on SIS
Engineering
Workstation
LIBRARY.ZIP +
TRILOG.EXE
SIS
INJECT.BIN IMAIN.BIN
TRISIS Activity Group: XENOTIME
Deliberate targeting of SIS accepts risk of physical damage and potential
loss of life.
New ‘norm’ established in ICS targeting and operations.
Post-TRISIS, we have observed that XENOTIME has expanded its targeting to
North America and other safety systems.
XENOTIME isn’t simply a problem for Schneider Triconex customers.
ICS Cyber Kill Chain – Focus on Stage 2
SIS Connectivity – Isolation isn’t always possible
Increasing connectivity requirements
results in SIS connectivity to general
network.
Yokogawa ProSafe-RS recommends that
SIS connected to rest of network.
Honeywell Safety Manager docs provide
similar guidance.
Border Defense – Stopping Stage 2
• Look for Credential Theft and Re-Use.
• Remote logon activity should route through a hardened jump host for
better monitoring.
• If not possible, implement host-based logging visibility on border
hosts from IT to ICS along with network monitoring host to host.
• File Monitoring
• Unknown ICS malware will often evade AV (known limitation).
• AV effective for supplementary tools like Mimikatz.
• Open source: Bro + Yara for files of interest crossing border.
• Command and Control Detection – outbound activity from ICS
ICS Network Defense – Choke Points and Pivoting
• Following initial access, attacker
must pivot through network to reach
host of interest.
• Architectural decisions can limit
adversary freedom of movement.
• Treat choke points like IT-ICS
boundary.
• Most effective: physical/virtual LAN
segmentation. Install taps for better
visibility.
SIS Monitoring and Defense
• Assumption: adversary has breached network and has access to SIS.
• Harden SIS-Connected hosts, such as EWS, to the greatest extent possible.
• Patching
• Limit local and admin accounts as well as remote access.
• Logging (Sysmon, Windows event log)
• Treat SIS-connected hosts as a choke point.
• Physical Defense: Isolate as much as possible. Use keyswitch-like controls.
• Monitor Traffic Flow to SIS.
• Organizational awareness of known maintenance periods
SIS Response and Recovery – Plan Ahead
• Forensics and Root Cause Analysis
• TRISIS victim was able to determine a cyber event was involved in plant
shutdown. This is often overlooked.
• Assess capability to obtain forensics artifacts from the SIS.
e.g. Control Program Audits
• Ensure robust forensic capability on SIS-connected devices, to enable
determination of cyber involvement.
• System Restoration and Recovery
• Known Good configuration secure backups (firmware if possible)
• Develop response plan. Engage Vendor contacts early.
Start Now with SIS Defense
XENOTIME is still learning.
The playing field is level, so we have time for designing defense.
Questions?
Sources and References
• Yokogawa SIS Prosafe-RS Documenation
https://tinyurl.com/ybtkwxfw
• Honeywell Safety Manager Specifications and Technical Data
https://tinyurl.com/yde2tgwy
• The Bro Network Security Monitor
https://www.bro.org/
• Yara: The Pattern Matching Swiss Knife for Malware Researchers
https://virustotal.github.io/yara/
• Sysmon – Microsoft
https://tinyurl.com/y9bcgolz
Sources and References
• Windows Security Event ID 4624
https://tinyurl.com/zaklujy
• TRISIS – Initial Release
https://dragos.com/blog/trisis/
• TRISIS and Xenotime webinars:
Analyzing TRISIS – Reid Wightman & Jimmy Wylie
XENOTIME and SIS – Joe Slowik
https://dragos.com/webinars.html

More Related Content

PDF
Trisis in Perspective: Implications for ICS Defenders
PDF
How to Respond to Industrial Intrusions
PDF
Behavior-Based Defense in ICS
PPTX
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
PPTX
How to Increase ICS Cybersecurity Return on Investment (ROI)
PPTX
The Four Types of Threat Detection and Use Cases in Industrial Security
PDF
Dragos and CyberWire: ICS Ransomware
PPTX
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Trisis in Perspective: Implications for ICS Defenders
How to Respond to Industrial Intrusions
Behavior-Based Defense in ICS
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
How to Increase ICS Cybersecurity Return on Investment (ROI)
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos and CyberWire: ICS Ransomware
Debunking the Hacker Hype: The Reality of Widespread Blackouts

What's hot (20)

PPTX
Dragos year in review (yir) 2018
PDF
Industrial Control Systems Cybersecurity Technology Selection
PPTX
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
PPTX
Solving ICS Cybersecurity Challenges in the Electric Industry
PDF
The Current ICS Threat Landscape
PPTX
Dressing up the ICS Kill Chain
PDF
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
PPTX
PLC Virtualization Dragos S4 2019
PPTX
Securing Electric Utility Infrastructure
PDF
Kofax Document Security
PPTX
Neighborhood Keeper - Introduction
PDF
Security Starts at the Endpoint
PDF
Vulnerability Management – Opportunities and Challenges!
PPTX
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
PPTX
Incident response live demo slides final
PDF
Kaspersky Lab new Enterprise Portfolio
PDF
Consequence Informed Cyber Security
PPTX
Supply Chain Threats to the US Energy Sector
PDF
You can't detect what you can't see illuminating the entire kill chain
PDF
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Dragos year in review (yir) 2018
Industrial Control Systems Cybersecurity Technology Selection
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
Solving ICS Cybersecurity Challenges in the Electric Industry
The Current ICS Threat Landscape
Dressing up the ICS Kill Chain
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
PLC Virtualization Dragos S4 2019
Securing Electric Utility Infrastructure
Kofax Document Security
Neighborhood Keeper - Introduction
Security Starts at the Endpoint
Vulnerability Management – Opportunities and Challenges!
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Incident response live demo slides final
Kaspersky Lab new Enterprise Portfolio
Consequence Informed Cyber Security
Supply Chain Threats to the US Energy Sector
You can't detect what you can't see illuminating the entire kill chain
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Ad

Similar to TRISIS in Perspective (20)

PDF
Securing Industrial Control System
PDF
Web Server Security Guidelines
PPTX
CSO CXO Series Breakfast
PDF
Cybersecurity Practices for Industrial Control Systems
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PDF
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
PDF
Defcon through the_eyes_of_the_attacker_2018_slides
PPTX
ch03.pptx
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
Dcit 418-Slide two presentation (1).pptx
PDF
Ccna sec 01
PDF
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
PDF
Pervasive Security Across Your Extended Network
PDF
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
PDF
ICS security
ODP
Cloud Computing
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
Ot ics cyberattaques dans les organisations industrielles
PDF
IoT Security, Mirai Revisited
Securing Industrial Control System
Web Server Security Guidelines
CSO CXO Series Breakfast
Cybersecurity Practices for Industrial Control Systems
Building a Cyber Security Operations Center for SCADA/ICS Environments
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
Defcon through the_eyes_of_the_attacker_2018_slides
ch03.pptx
Computer Security and Intrusion Detection(IDS/IPS)
Dcit 418-Slide two presentation (1).pptx
Ccna sec 01
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
Pervasive Security Across Your Extended Network
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
ICS security
Cloud Computing
CyberCrime in the Cloud and How to defend Yourself
Ot ics cyberattaques dans les organisations industrielles
IoT Security, Mirai Revisited
Ad

More from Dragos, Inc. (11)

PPTX
Dragos 2019 ICS Year in Review
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PPTX
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
PDF
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
PPTX
Purple Teaming ICS Networks
PDF
Rising Cyber Escalation US Iran Russia ICS Threats and Response
PPTX
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PPTX
2018 Year in Review- ICS Threat Activity Groups
PDF
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
PDF
Threat Activity Groups - Dragos
PDF
TTPs for Threat hunting In Oil Refineries
Dragos 2019 ICS Year in Review
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Purple Teaming ICS Networks
Rising Cyber Escalation US Iran Russia ICS Threats and Response
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
2018 Year in Review- ICS Threat Activity Groups
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Threat Activity Groups - Dragos
TTPs for Threat hunting In Oil Refineries

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Configure Apache Mutual Authentication
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
CloudStack 4.21: First Look Webinar slides
PDF
sbt 2.0: go big (Scala Days 2025 edition)
DOCX
search engine optimization ppt fir known well about this
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Five Habits of High-Impact Board Members
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
Chapter 5: Probability Theory and Statistics
1 - Historical Antecedents, Social Consideration.pdf
Configure Apache Mutual Authentication
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Final SEM Unit 1 for mit wpu at pune .pptx
Microsoft Excel 365/2024 Beginner's training
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
2018-HIPAA-Renewal-Training for executives
Flame analysis and combustion estimation using large language and vision assi...
UiPath Agentic Automation session 1: RPA to Agents
CloudStack 4.21: First Look Webinar slides
sbt 2.0: go big (Scala Days 2025 edition)
search engine optimization ppt fir known well about this
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Five Habits of High-Impact Board Members
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Convolutional neural network based encoder-decoder for efficient real-time ob...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
sustainability-14-14877-v2.pddhzftheheeeee

TRISIS in Perspective

  • 1. TRISIS in Perspective Implications of Safety System Attacks for ICS Defenders
  • 2. Place Your Header Here in Arial 22pt Place Subtitle Here Agenda • TRISIS Event • TRISIS Malware • XENOTIME Activity Group • Defensive Recommendations
  • 3. TRISIS Event Unspecified gas facility in Saudi Arabia attacked in August 2017. Infection resulted in system shutdown during the intrusion. Not assessed as a shutdown due to an attack (accidental). Attack focused on Schneider Electric Triconex Safety System (SIS).
  • 4. TRISIS Attack Progression Establish Access on SIS- Connecting System Transfer TRISIS Package to System Use TRISIS Base EXE to Upload Tristation Program Tristation Program Compromises SIS Leverage Access for ICS Disruption via SIS
  • 5. Establish Access on SIS- Connecting System Transfer TRISIS Package to System Use TRISIS Base EXE to Upload Tristation Program Tristation Program Compromises SIS Leverage Access for ICS Disruption via SIS TRISIS Attack - Observed Something breaks here! (maybe)
  • 6. TRISIS Malware exploits and installs rootkit on SIS Engineering Workstation LIBRARY.ZIP + TRILOG.EXE SIS INJECT.BIN IMAIN.BIN
  • 7. TRISIS Activity Group: XENOTIME Deliberate targeting of SIS accepts risk of physical damage and potential loss of life. New ‘norm’ established in ICS targeting and operations. Post-TRISIS, we have observed that XENOTIME has expanded its targeting to North America and other safety systems. XENOTIME isn’t simply a problem for Schneider Triconex customers.
  • 8. ICS Cyber Kill Chain – Focus on Stage 2
  • 9. SIS Connectivity – Isolation isn’t always possible Increasing connectivity requirements results in SIS connectivity to general network. Yokogawa ProSafe-RS recommends that SIS connected to rest of network. Honeywell Safety Manager docs provide similar guidance.
  • 10. Border Defense – Stopping Stage 2 • Look for Credential Theft and Re-Use. • Remote logon activity should route through a hardened jump host for better monitoring. • If not possible, implement host-based logging visibility on border hosts from IT to ICS along with network monitoring host to host. • File Monitoring • Unknown ICS malware will often evade AV (known limitation). • AV effective for supplementary tools like Mimikatz. • Open source: Bro + Yara for files of interest crossing border. • Command and Control Detection – outbound activity from ICS
  • 11. ICS Network Defense – Choke Points and Pivoting • Following initial access, attacker must pivot through network to reach host of interest. • Architectural decisions can limit adversary freedom of movement. • Treat choke points like IT-ICS boundary. • Most effective: physical/virtual LAN segmentation. Install taps for better visibility.
  • 12. SIS Monitoring and Defense • Assumption: adversary has breached network and has access to SIS. • Harden SIS-Connected hosts, such as EWS, to the greatest extent possible. • Patching • Limit local and admin accounts as well as remote access. • Logging (Sysmon, Windows event log) • Treat SIS-connected hosts as a choke point. • Physical Defense: Isolate as much as possible. Use keyswitch-like controls. • Monitor Traffic Flow to SIS. • Organizational awareness of known maintenance periods
  • 13. SIS Response and Recovery – Plan Ahead • Forensics and Root Cause Analysis • TRISIS victim was able to determine a cyber event was involved in plant shutdown. This is often overlooked. • Assess capability to obtain forensics artifacts from the SIS. e.g. Control Program Audits • Ensure robust forensic capability on SIS-connected devices, to enable determination of cyber involvement. • System Restoration and Recovery • Known Good configuration secure backups (firmware if possible) • Develop response plan. Engage Vendor contacts early.
  • 14. Start Now with SIS Defense XENOTIME is still learning. The playing field is level, so we have time for designing defense. Questions?
  • 15. Sources and References • Yokogawa SIS Prosafe-RS Documenation https://tinyurl.com/ybtkwxfw • Honeywell Safety Manager Specifications and Technical Data https://tinyurl.com/yde2tgwy • The Bro Network Security Monitor https://www.bro.org/ • Yara: The Pattern Matching Swiss Knife for Malware Researchers https://virustotal.github.io/yara/ • Sysmon – Microsoft https://tinyurl.com/y9bcgolz
  • 16. Sources and References • Windows Security Event ID 4624 https://tinyurl.com/zaklujy • TRISIS – Initial Release https://dragos.com/blog/trisis/ • TRISIS and Xenotime webinars: Analyzing TRISIS – Reid Wightman & Jimmy Wylie XENOTIME and SIS – Joe Slowik https://dragos.com/webinars.html