Saturday, April 26, 2025
Homecyber securityNew IOCONTROL Malware Let Attackers Control Critical Infrastructure & Gain Remote Access

New IOCONTROL Malware Let Attackers Control Critical Infrastructure & Gain Remote Access

Published on

SIEM as a Service

Follow Us on Google News

A new malware strain called IOCONTROL has emerged, posing a significant threat to Internet of Things (IoT) devices and operational technology (OT) systems, particularly those in critical infrastructure.

First observed in December 2024, IOCONTROL is allegedly created by the anti-Israeli and pro-Iranian hacktivist group “Cyber Av3ngers.”

Technical Analysis Reveals Sophisticated Capabilities

IOCONTROL employs advanced techniques to evade detection and establish persistence on targeted systems.

- Advertisement - Google News

The malware uses executable packing with modified UPX magic values, making it challenging to identify and unpack.

Once unpacked, it creates multiple environment variables using the setenv() function, with values derived from a hard-coded GUID string.

IOCONTROL Malware
An example of an encrypted string within the malware

The malware establishes persistence by creating directories with full permissions and copying itself to /usr/bin/iocontrol.

It then writes a bash script that runs at system startup, containing watchdog and cleanup code.

IOCONTROL’s communication with its command and control (C2) server involves a DNS lookup process using CloudFlare, followed by connection establishment via the MQTT protocol.

According to Flashpoint, this streamlined networking protocol is particularly suited for IoT devices with limited processing capabilities.

Threat Actor Objectives and Potential Impact

Once installed, IOCONTROL enables threat actors to achieve multiple objectives, including:

  1. Remote access and control of infected systems.
  2. System manipulation.
  3. Data exfiltration.
  4. Lateral movement within networks.
  5. Surveillance of compromised infrastructure.

The malware’s ability to execute system commands allows attackers to perform more dangerous activities, such as loading additional payloads or damaging critical systems.

IOCONTROL’s emergence highlights the growing sophistication of threats targeting IoT and OT environments.

Its alleged attribution to Cyber Av3ngers and potential availability for sale on underground forums suggest that this malware could see increased use in future attacks.

Organizations, particularly those managing critical infrastructure, are advised to enhance their defenses against such evolving threats.

Implementing robust IoT and OT security measures, along with comprehensive threat intelligence, will be crucial in mitigating the risks posed by IOCONTROL and similar malware strains.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

How to Develop a Strong Security Culture – Advice for CISOs and CSOs

Developing a strong security culture is one of the most critical responsibilities for today’s...

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...