CHERNOVITE’s PIPEDREAM Malware Targeting Industrial Control Systems (ICS) April 14, 2022
Dragos identified and
analyzed PIPEDREAM’s capabilities through our normal business,
independent research, and collaboration with various partners in
early 2022. Dragos assesses with high confidence that PIPEDREAM has
not yet been employed in the wild for destructive effects. CHERNOVITE’s
PIPEDREAM can execute 38 percent of known ICS attack techniques and
83 percent of known ICS attack tactics.1
PIPEDREAM can manipulate a wide variety of industrial
control programmable logic controllers (PLC) and industrial
software, including Omron and Schneider Electric controllers, and
can attack ubiquitous industrial technologies including CODESYS,
Modbus, and Open Platform Communications Unified Architecture (OPC
UA). Together, PIPEDREAM can affect a significant percentage of
industrial assets worldwide. PIPEDREAM is not currently taking
advantage of any Schneider or Omron vulnerabilities, instead it
leverages native functionality. While
CHERNOVITE is specifically targeting Schneider Electric and Omron
PLCs, there could be other modules targeting other vendors as well,
and PIPEDREAM’s functionality could work across hundreds of
different controllers. Said simply, a focus on the equipment vendor
is misplaced, and instead the focus should be placed on the tactics
and techniques the adversary is leveraging.
PIPEDREAM accomplishes this far-reaching impact through a series of five components that Dragos labels:
These combined components allow CHERNOVITE to enumerate an industrial environment, infiltrate engineering workstations, exploit process controllers, cross security and process zones, fundamentally disable controllers, and manipulate executed logic and programming. All of these capabilities can lead to a loss of safety, availability, and control of an industrial environment, dramatically increasing time-to-recovery, while potentially placing lives, livelihoods, and communities at risk. Due to the historic and expansive nature of PIPEDREAM, mitigating the CHERNOVITE threat will require a robust strategy, and not simply applying cybersecurity fundamentals. Dragos recommends the following defensive mitigations. Recommendations
CHERNOVITE Diamond Model Diagram
![]() |
Terms of Use | Copyright © 2002 - 2022 CONSTITUENTWORKS SM CORPORATION. All rights reserved. | Privacy Statement