CosmicEnergy is a form of malware allegedly originating from Russia that targets industrial control systems, specifically those associated with electrical grids. Unlike other forms of malware, CosmicEnergy lacks the built-in functionality to autonomously discover and identify target systems within a network. Instead, attackers must conduct prior reconnaissance such as gathering IP addresses of MSSQL servers and target IEC-104 devices, identifying critical systems and their vulnerabilities. The malware utilizes an MSSQL server as a gateway to access Operational Technology (OT) systems. Once inside, it can manipulate power line switches and circuit breakers, leading to potential power disruptions.
The malware shares similarities with Industroyer and its variants, interacting with the IEC-104 protocol to cause electric power disruption, much like Industroyer. It issues IEC-104 ON/OFF commands to interact with Remote Terminal Units (RTUs). Despite these capabilities, as of now, CosmicEnergy is not considered an immediate threat but should not be ignored given its potential for significant disruption. Recent advisories from organizations such as the FBI and the Critical Infrastructure Security Agency have highlighted destructive attack vectors, including CosmicEnergy.
Over the past two months, CosmicEnergy has been implicated in attacks affecting thousands of downstream victims, including government agencies. This new strain of malware, discovered in 2023, is part of a series of OT-specific malware that began with Stuxnet in 2010. Other recent strains include Industroyer2 and Incontroller, both discovered last year. According to Mandiant, CosmicEnergy operates using two derivative components named Piehop and Lightwork.
Description last updated: 2024-05-04T18:38:49.501Z