Cybersecurity company Dragos identified FrostyGoop as the ninth known malware targeting industrial controllers, specifically focusing on the widely used Modbus protocol.
The attackers exploited a vulnerability in a Mikrotik router to gain access to Lviv's industrial network, subsequently installing a remote access tool over an open internet port.
The malicious code manipulated controller measurements rather than shutting down systems directly, displaying a sophisticated approach to avoid immediate detection.
Dragos maintains a neutral stance in cyberattacks, emphasizing education over assigning blame, although highlighting the techniques used by adversaries in compromising industrial control systems.
Collection
[
|
...
]