The report warns that a long‑building cyber threat to US critical infrastructure has accelerated, driven by nation‑state APTs, proxies, and dozens of hacktivist groups exploiting internet‑exposed ICS devices, phishing OT personnel, and long‑dwell IT‑to‑OT intrusions. Immediate defensive actions recommended include removing ICS interfaces from the internet, changing default credentials (e.g., Unitronics 1111), blocking industrial protocol ports, and auditing MSP/RMM access #VoltTyphoon #Unitronics
Keypoints
- US critical infrastructure is highly exposed: tens of thousands of ICS/OT devices are internet‑reachable and many still use default or no credentials.
- A broad spectrum of actors — Tier 1 APTs (e.g., Volt Typhoon, APT33, MuddyWater) and dozens of Tier 2 proxy/hacktivist groups — are actively targeting OT/ICS environments.
- Three main attack paths enable disruption: direct exploitation of exposed assets (default creds), phishing into OT‑adjacent accounts, and long‑dwell IT infiltration with lateral movement into OT.
- Notable real incidents and confirmations (CISA, FBI, Mandiant, Claroty) show both credential‑based PLC compromise (Unitronics PLCs via TCP/20256) and years‑long pre‑positioning for destructive effects (Volt Typhoon).
- Priority mitigations for defenders: remove internet‑exposed ICS interfaces, change defaults (Unitronics 1111), block industrial ports at the perimeter, audit MSP/RMM access, enable logging, and hunt for LOTL anomalies.
<li Documented tooling and techniques include custom backdoors and wipers (IOCONTROL, Tickler, RustyWater, PowGoop), living‑off‑the‑land execution (netsh, wmic, ntdsutil, PowerShell), and registry/PortProxy modifications to maintain persistence.
MITRE Techniques
- [T1110.003 ] Password Spraying – High‑volume password spraying against Office 365 and Azure accounts used for initial access (‘High-volume password spraying against Office 365 and Azure accounts’).
- [T1566.001 ] Spearphishing Attachment – Malicious Office macro attachments and Excel macros used to deliver initial payloads (‘Spearphishing with malicious Office macro attachments’).
- [T1566.002 ] Spearphishing Link – Phishing sites cloning Google Login/Google Meet to harvest credentials via fraudulent links (‘Phishing sites cloning Google Login and Google Meet’).
- [T1078 ] Valid Accounts – Abuse of legitimate accounts and timed valid‑account activity to blend with business hours for stealthy access (‘Valid account abuse, timed to business hours to blend with legitimate traffic’).
- [T1003 ] Credential Dumping – Use of LaZagne and Mimikatz for credential theft from compromised hosts (‘credential theft via LaZagne and Mimikatz’).
- [T1574.001 ] DLL Side‑Loading – PowGoop DLL side‑loader disguised as Google Update used to load malicious code (‘PowGoop DLL side-loader disguised as Google Update’).
- [T1102 ] Web Service – Use of web services and APIs (e.g., Telegram Bot API) for command and control (‘Small Sieve backdoor: Telegram Bot API for C2’).
- [T1071.004 ] Application Layer Protocol: DNS – DNS tunneling used for covert C2 and exfiltration (‘Mori backdoor: DNS tunneling for covert C2 exfiltration’).
- [T1190 ] Exploit Public‑Facing Application – Exploitation of internet‑facing appliances and Exchange ProxyShell to gain persistent access (‘ProxyShell exploitation against Microsoft Exchange servers’).
- [T1505.003 ] Server Software Component: Web Shell – Deployment of ASPX webshells on internet‑facing Exchange servers for persistent access (‘ASPX webshells on internet-facing Exchange servers’).
- [T1059.001 ] Command and Scripting Interpreter: PowerShell – Living‑off‑the‑land execution using PowerShell and native OS tools in OT‑adjacent environments (‘Exclusive living-off-the-land execution: netsh, wmic, ntdsutil, PowerShell only’).
- [T1112 ] Modify Registry – Registry changes for persistence and proxying (PortProxy registry modifications; Run key persistence) (‘PortProxy registry modifications’ / ‘persists via Run key named SharePoint.exe’).
- [T1595 ] Active Scanning – Use of Shodan, Censys, and internet scanning to discover exposed ICS devices and services (‘Shodan and Censys scanning for exposed devices’).
- [T1195 ] Supply Chain Compromise – Compromise of MSPs and downstream supply‑chain access via RMM tools to reach multiple industrial clients (‘Supply chain compromise via MSPs for simultaneous downstream industrial operator access’).
- [T1071.001 ] Application Layer Protocol: Web Protocols – C2 domains mimicking legitimate cloud services used for command and control (‘RustyWater: new Rust-based RAT, C2 via domains mimicking Dropbox and WordPress’).
- [T1218 ] Signed Binary Proxy Execution (LOTL) – Use of legitimate signed binaries and system tools (AnyDesk, native Windows utilities) to execute and persist without custom malware (‘AnyDesk deployed for persistent remote access without IT authorisation’ / ‘exclusive living-off-the-land execution’).
- [T1204.002 ] User Execution: Malicious Shortcut – Malicious LNK files delivered in password‑protected archives to trick targets into execution (‘Password-protected archives containing malicious LNK files delivered after trust is established’).
Indicators of Compromise
- [Malware/Tool ] documented malicious families and tools – IOControl (IOCONTROL), Tickler, and others such as RustyWater, PowGoop, POWERSTATS, Small Sieve (and other families referenced).
- [Ports ] network access vectors used for discovery/exploitation – TCP 20256 (Unitronics PLC access), TCP 502 (Modbus) and other industrial ports like 44818, 4840, 20000, and UDP 47808.
- [Registry Keys/Values ] persistence and configuration artifacts – Run key named SharePoint.exe, PortProxy registry modifications.
- [Default Credentials ] account artifacts enabling direct compromise – Unitronics default password ‘1111’ used to authenticate to exposed PLCs.
- [Domains / C2 ] command‑and‑control infrastructure examples – domains mimicking Dropbox and WordPress (RustyWater C2), Telegram Bot API endpoints for Small Sieve, and other C2 domains.
- [Installed Remote Tools ] unauthorized remote access software observed – AnyDesk installed without IT authorization; MSP/RMM tools such as Syncro and PDQ Connect used as access vectors.
- [File/Artifact ] on‑host indicators – ASPX webshells on Exchange servers; password‑protected archives containing malicious LNK files; and IOControl backdoor binaries.
- [Network Traffic / Protocols ] outbound/inbound protocol indicators – Outbound MQTT traffic from ICS devices (ports 1883 / 8883), inbound connections to TCP 20256 from external IPs, and unusual DNS subdomain queries indicative of high entropy C2 activity.
- [Scanning Infrastructure ] discovery activity sources – Shodan/Censys query results for exposed ICS devices and observational use of Starlink IPs to evade geolocation blocks during scans.