Malware Mayhem: IOCONTROL Targets IoT in Israel and US – A Cybersecurity Comedy of Errors!

Iran-affiliated threat actors are spicing up the cyber scene with a new malware called IOCONTROL, targeting IoT and OT devices in Israel and the US. This malware is like a Swiss Army knife, able to attack IP cameras, routers, and more. It’s basically the James Bond of malware, minus the tuxedo and British accent.

Pro Dashboard

Hot Take:

Who knew Iran’s cyber villains had a flair for multitasking? While most of us are just trying to keep our Wi-Fi from crashing during Netflix binges, they’re crafting malware that turns your IoT devices into unwitting accomplices in their cyber escapades. IOCONTROL: the malware that says, “Why just hack when you can hack with style?”

Key Points:

  • IOCONTROL is a new malware targeting IoT and OT environments, linked to Iran-affiliated threat actors.
  • Designed to attack SCADA devices like IP cameras, routers, PLCs, and firewalls.
  • Malware uses MQTT messaging protocol and Cloudflare’s DoH service to disguise its activities.
  • Extracted from a compromised Gasboy fuel management system, allowing potential fuel service disruptions and credit card theft.
  • IOCONTROL adds to a notorious list of ICS-targeting malwares, including Stuxnet and Havex.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?