Don't Cry Wolf: Evidence-based Assessment of ICS Threats
This talk presents a methodology for evaluating industrial control system (ICS) threats by applying three criteria: ICS capability, malicious intent, and potential for adverse effects on operational technology (OT) environments. The speakers analyze four samples of suspected ICS malware, demonstrating that many are actually red-teaming tools, CTF challenges, or non-malicious utilities rather than sophisticated state-sponsored threats. The presentation emphasizes the importance of analytical rigor and evidence-based assessment to avoid over-hyping security incidents. The speakers also discuss techniques for static analysis of obfuscated Python and .NET binaries used in these samples.
Stop Chasing Ghosts: Why Most "Advanced" ICS Malware Is Just Red Team Noise
TLDR: Security researchers often over-index on the "advanced" label when analyzing industrial control system (ICS) threats, frequently misidentifying red team tools or CTF challenges as state-sponsored malware. By applying a rigorous three-part framework—ICS capability, malicious intent, and potential for adverse effects—analysts can filter out the noise and focus on actual threats. This post breaks down how to perform this assessment on obfuscated Python and .NET binaries to avoid wasting time on non-malicious artifacts.
Security researchers have a bad habit of crying wolf. When a new binary hits VirusTotal with a few detections and some industrial-sounding strings, the industry often jumps to conclusions about sophisticated nation-state actors. This knee-jerk reaction creates a massive amount of noise, forcing defenders to chase shadows while real threats go unnoticed. The reality is that most of what gets flagged as "advanced" ICS malware is actually just poorly secured red team tooling, CTF exercises, or benign utilities that happen to interact with industrial protocols.
The Three-Part Framework for ICS Threat Assessment
To stop wasting cycles on non-threats, you need a consistent methodology. At a minimum, any sample labeled as ICS malware must satisfy three specific criteria:
- ICS-Capable: The code must actually perform ICS or operational technology (OT) actions. This means speaking industrial protocols, interacting with runtime environments, or manipulating engineering software.
- Designed with Malicious Intent: You must find evidence that the software was built to cause harm. This is the difference between a legitimate red team tool and actual malware.
- Ability for Adverse Effects: You must be able to verify that the code can achieve a negative outcome in an OT environment, such as unauthorized access, data exfiltration, or the execution of arbitrary logic on a PLC.
If a sample fails any of these, it is not ICS malware. It might be a broken tool, a research project, or a red team utility, but it is not a threat to your production environment.
Deobfuscating the "Advanced" Threat
The biggest hurdle in this analysis is the obfuscation used in modern red team tools. Many of these samples are compiled Python or .NET binaries designed to hide their true purpose. For Python-based tools, you are often dealing with PyInstaller bundles. When static analysis fails, you need to extract the bytecode. Tools like pylingual are essential for turning those .pyc files back into readable source code.
Once you have the source, look for the "why." If you see a script that connects to a Modbus endpoint but doesn't issue any control commands, you are likely looking at a scanner or a reconnaissance tool, not a destructive payload.
For .NET binaries, the analysis often involves identifying the use of Assembly.Load to execute second-stage payloads fetched from remote sources like a Discord CDN. This is a classic pattern for red team loaders. If the binary is just fetching a payload that performs a simple connection test, it is almost certainly a red team exercise.
When Real Vulnerabilities Meet Bad Security
Sometimes, the threat isn't the malware itself, but the environment it targets. Take the case of CVE-2023-38831, a WinRAR vulnerability that has been heavily abused in the wild. We have seen samples that use this vulnerability to execute a batch file, which then modifies registry keys to disable security features in browsers like Chrome or Internet Explorer.
The goal here is often to facilitate the execution of a secondary, malicious binary. If you encounter this, don't just look at the WinRAR exploit. Look at the secondary payload. If that payload is just a VNC client or a basic information stealer, the "advanced" nature of the initial exploit doesn't make the entire campaign a state-sponsored operation. It makes it a targeted attack using publicly available exploits.
Practical Steps for Your Next Engagement
When you are on a penetration test or performing incident response, do not take the "ICS malware" label at face value. If you find a suspicious binary, start by running strings. Look for protocol names, vendor-specific strings, or references to engineering software. If you find them, check if the code actually uses them.
If you are dealing with a compiled binary, use Ghidra to look for the entry point and the main execution flow. If the binary is just a wrapper for a VNC client or a simple network scanner, document it as such. Do not let the presence of a few industrial strings trick you into reporting a "sophisticated ICS threat" when you are really looking at a basic red team tool.
Defenders should focus on the underlying hygiene issues that allow these tools to succeed. If an HMI is exposed to the internet and can be compromised by a simple VNC brute-force attack, the complexity of the malware used to get there is irrelevant. Secure the HMI, use strong passwords, and segment your OT network.
Analytical rigor is the only way to cut through the noise. When you see a new "threat," ask yourself if it is a duck, or if it is just a robot that looks like a duck. Most of the time, it is just a robot. Stop chasing the ghosts and start focusing on the actual, exploitable weaknesses in the environment.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web




