A new malware strain called IOCONTROL has emerged, posing a significant threat to Internet of Things (IoT) devices and operational technology (OT) systems, particularly those in critical infrastructure.
First observed in December 2024, IOCONTROL is allegedly created by the anti-Israeli and pro-Iranian hacktivist group “Cyber Av3ngers.”
IOCONTROL employs advanced techniques to evade detection and establish persistence on targeted systems.
The malware uses executable packing with modified UPX magic values, making it challenging to identify and unpack.
Once unpacked, it creates multiple environment variables using the setenv() function, with values derived from a hard-coded GUID string.
The malware establishes persistence by creating directories with full permissions and copying itself to /usr/bin/iocontrol.
It then writes a bash script that runs at system startup, containing watchdog and cleanup code.
IOCONTROL’s communication with its command and control (C2) server involves a DNS lookup process using CloudFlare, followed by connection establishment via the MQTT protocol.
According to Flashpoint, this streamlined networking protocol is particularly suited for IoT devices with limited processing capabilities.
Once installed, IOCONTROL enables threat actors to achieve multiple objectives, including:
The malware’s ability to execute system commands allows attackers to perform more dangerous activities, such as loading additional payloads or damaging critical systems.
IOCONTROL’s emergence highlights the growing sophistication of threats targeting IoT and OT environments.
Its alleged attribution to Cyber Av3ngers and potential availability for sale on underground forums suggest that this malware could see increased use in future attacks.
Organizations, particularly those managing critical infrastructure, are advised to enhance their defenses against such evolving threats.
Implementing robust IoT and OT security measures, along with comprehensive threat intelligence, will be crucial in mitigating the risks posed by IOCONTROL and similar malware strains.
Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free.
Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting…
Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial institutions…
From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats…
Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages DNS…
A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community due…
PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a…