{"id":89283,"date":"2024-08-02T09:54:53","date_gmt":"2024-08-02T16:54:53","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=89283"},"modified":"2024-08-05T07:04:14","modified_gmt":"2024-08-05T14:04:14","slug":"ics-malware-frostygoopbustleberm-insights-others-missed","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/","title":{"rendered":"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed"},"content":{"rendered":"<p>In the last few weeks, there have been a few announcements made about a new malware threat known as FrostyGoop or BUSTLEBERM (as it was originally tracked by Mandiant). It is being recognized as the first custom malware to integrate Modbus for the purpose of causing physical damage. An associated incident has been reported where the malware was used to disrupt heating in Ukrainian homes in the context of a Russian cyberattack.<\/p>\n<p>The news has rightfully garnered significant attention within the cybersecurity community, as attacks like the one where the malware was reportedly used are far reaching and could result in significant disruptions to business, financial loss, and in some cases a danger to human lives, depending on the critical nature of the targeted infrastructure.<\/p>\n<p>Reports by <a href=\"\/compare\/forescout-vs-dragos\/\">Dragos<\/a> and other industry leaders emphasize the uniqueness of this threat as something new. Yet, upon further investigation, the underlying techniques used are far from unique. In fact, FrostyGoop\/BUSTLEBERM is a variation or continuation of well-documented tactics, techniques and procedures (TTPs) that we and other researchers have observed in previous cyber incidents.<\/p>\n<h2>Examining the ICS Malware FrostyGoop\/BUSTLEBERM News: Should You Care?<\/h2>\n<p>The potential for widespread disruption and the real risk to human lives make it imperative for businesses and organizations to stay ahead of OT-specific malware and threats, but also to ensure that they are not caught off guard by what may appear to be new but is, in fact, a well-established method of attack that could be detected or prevented.<\/p>\n<p>Although FrostyGoop\/BUSTLEBERM is a real threat, well-known <a href=\"http:\/\/scadamag.infracritical.com\/index.php\/2024\/07\/31\/report-of-another-plc-compromised-using-cyber-means\/\" target=\"_blank\" rel=\"noopener\">researchers<\/a> have raised some questions about the malware and reported incident. Here\u2019s why:<\/p>\n<ol>\n<li><strong>The impact of the attack was probably different than what has been widely stated in the media. <\/strong><\/li>\n<\/ol>\n<p>While there were reports of 600 households with no hot water and heating for a couple of days, the actual incident in Ukraine \u2013 based on public information shared by <a href=\"http:\/\/scadamag.infracritical.com\/index.php\/2024\/07\/31\/report-of-another-plc-compromised-using-cyber-means\/\" target=\"_blank\" rel=\"noopener\">Marina Krotofil<\/a> \u2013 may have affected fewer homes for a shorter period of time.<\/p>\n<ol start=\"2\">\n<li><strong>There is a discrepancy between the technical capabilities of the actual malware and what happened in the stated incident.<\/strong><\/li>\n<\/ol>\n<p>The incident report mentions things like firmware downgrade and exploiting routers for initial access that are not part of the malware capability and that are not detailed at all. Overall, it is challenging to connect the publicly available piece of malware \u2013 found on VirusTotal as described below \u2013 to the described incident.<\/p>\n<p>Organizations should be aware of and take action to mitigate attacks abusing OT protocols, but understanding real impacts and capabilities is important to take appropriate decisions on which controls to prioritize and which risks to mitigate.<\/p>\n<h2>FrostyGoop\/BUSTLEBERM: Under the Hood<\/h2>\n<p>While FrostyGoop\/BUSTLEBERM is reported as the first malware intentionally crafted to exploit the Modbus protocol for destructive purposes, this is not the whole story. The use of Modbus in cyber-attacks is far from new. Historically, hacktivist groups including GhostSec have leveraged tools, such as Metasploit and custom scripts (<a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/hacktivists-targeting-ot-systems\" target=\"_blank\" rel=\"noopener\">KillBus<\/a> and <a href=\"https:\/\/www.forescout.com\/resources\/threat-report-the-increasing-threat-posed-by-hacktivist-attacks\/\" target=\"_blank\" rel=\"noopener\">theComposer.py<\/a>) to target OT environments, including in Russia as early as 2022.<\/p>\n<p>Additionally, <strong>Forescout Research \u2013 Vedere Labs research has consistently highlighted Modbus as the most scanned and attacked OT protocol we observe<\/strong>. In 2023, 33% of OT protocol interactions observed on our <a href=\"\/research-labs\/threat-intelligence\/\">Adversary Engagement Environment<\/a> targeted Modbus, underscoring its appeal to threat actors. This makes the Modbus-related capabilities of FrostyGoop\/BUSTLEBERM less groundbreaking and more a natural evolution of existing threats.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-89286\" src=\"\/wp-content\/uploads\/2024\/08\/attacks-protocol.png\" alt=\"\" width=\"1200\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/attacks-protocol.png 1910w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/attacks-protocol-300x105.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/attacks-protocol-1024x357.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/attacks-protocol-768x268.png 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/attacks-protocol-1536x536.png 1536w\" sizes=\"(max-width: 1910px) 100vw, 1910px\" \/><br \/>\n<small>Figure 1 \u2013 Attacks to OT protocols on Forescout\u2019s <a href=\"\/research-labs\/threat-intelligence\/\">Adversary Engagement Environment (AEE)<\/a>. From our <a href=\"\/research-labs\/2023-threat-roundup\/\">Threat Roundup 2023<\/a>.<\/small>\n<p>Soon after the publication of the FrostyGoop report, <a href=\"https:\/\/x.com\/cyb3rops\/status\/1815771782051237998\" target=\"_blank\" rel=\"noopener\">Florian Roth shared with the community<\/a> a YARA rule used to find the sample on VirusTotal. That rule currently matches two executable files:<\/p>\n<ul>\n<li>This file was first uploaded from Russia on October 30, 2023 with the filename \u201cmb.exe\u201d:<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.virustotal.com\/gui\/file\/5d2e4fd08f81e3b2eb2f3eaae16eb32ae02e760afc36fa17f4649322f6da53fb\" target=\"_blank\" rel=\"noopener\">https:\/\/www.virustotal.com\/gui\/file\/5d2e4fd08f81e3b2eb2f3eaae16eb32ae02e760afc36fa17f4649322f6da53fb<\/a><\/p>\n<ul>\n<li>This file was first uploaded from the United States on October 30, 2023 with the filename \u201cread-all-mb.exe\u201d:<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.virustotal.com\/gui\/file\/a63ba88ad869085f1625729708ba65e87f5b37d7be9153b3db1a1b0e3fed309c\" target=\"_blank\" rel=\"noopener\">https:\/\/www.virustotal.com\/gui\/file\/a63ba88ad869085f1625729708ba65e87f5b37d7be9153b3db1a1b0e3fed309c<\/a><strong> \u00a0<\/strong><\/p>\n<p>The two samples seem identical in behavior. \u00a0The difference? The second one included junk sections. The first sample was built with Golang 1.19 (released in 2022) while the second was built with Golang 1.20 (released in 2023). The malware does not implement obfuscation or static or dynamic analysis evasion techniques.<\/p>\n<p>The core functionality of the malware is to interact with machines using Modbus\/TCP over port 502. It can read holding registers (Modbus function code 0x03), write to a single register (Modbus function code 0x06) and write to multiple registers (Modbus function code 0x10). In essence, the malware can be used to directly interact with and potentially disrupt processes that incorporate Modbus, since the protocol does not require authentication. It can also read instructions from a JSON file. However, it has no capability to exploit vulnerabilities or modify firmware of any targets.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-89289\" src=\"\/wp-content\/uploads\/2024\/08\/Figure-2-Screenshot-of-the-malware-functionality-list.png\" alt=\"\" width=\"1200\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/Figure-2-Screenshot-of-the-malware-functionality-list.png 1432w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/Figure-2-Screenshot-of-the-malware-functionality-list-300x155.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/Figure-2-Screenshot-of-the-malware-functionality-list-1024x529.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/Figure-2-Screenshot-of-the-malware-functionality-list-768x397.png 768w\" sizes=\"(max-width: 1432px) 100vw, 1432px\" \/><br \/>\n<small>Figure 2 &#8211; Screenshot of the malware functionality list<\/small>\n<h2>The State of OT Security: A Broader Perspective<\/h2>\n<p>The emphasis on FrostyGoop\/BUSTLEBERM as a unique threat overlooks the broader context of OT security. The use of open-source components like the Go library for Modbus in FrostyGoop\/BUSTLEBERM mirrors earlier malware. \u00a0Industroyer2, for example, is a <a href=\"https:\/\/www.forescout.com\/resources\/industroyer2-and-incontroller-report\/\" target=\"_blank\" rel=\"noopener\">C++ library for IEC-104 communication that has been utilized<\/a>. This pattern of relying on open-source tools is a recurring theme in many OT-targeted attacks. The true innovation lies not in the exploitation of Modbus itself but in the ongoing refinement and application of these tools by cybercriminals and state-sponsored actors.<\/p>\n<p>Furthermore, the discovery of FrostyGoop\/BUSTLEBERM in a public repository is similar to the finding of <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/cosmicenergy-ot-malware-russian-response\/\" target=\"_blank\" rel=\"noopener\">COSMICENERGY in 2023<\/a>, which was identified more than a year after it was first uploaded. This recurring pattern hints that other, as-yet-undiscovered malware strains may be lurking in public repositories waiting to be exploited by malicious actors.<\/p>\n<h2>Looking Ahead: ICS Malware and OT Security<\/h2>\n<p>Raising awareness is always beneficial. FrostyGoop\/BUSTLEBERM is a noteworthy threat within the world of OT security. However, it is not as unprecedented as some reports might suggest. The TTPs employed by FrostyGoop\/BUSTLEBERM are familiar, rooted in numerous Modbus-related attacks and the use of open-source tools for OT protocol interactions.<\/p>\n<p>As the cybersecurity community works to mitigate the risks posed by FrostyGoop\/BUSTLEBERM, it\u2019s crucial to recognize that this malware is just one piece of a broader, evolving threat landscape. Rather than viewing FrostyGoop\/BUSTLEBERM as an isolated incident, we should consider it further proof of the need for increasingly resilient OT security measures in the future.<\/p>\n<h2>Mitigation Recommendations : How Forescout Helps<\/h2>\n<p>To mitigate the risks of attacks targeting operational technology, including those abusing Modbus, organizations should:<\/p>\n<ul>\n<li><strong>Identify every device<\/strong> on the network and their communications to understand what protocols are used and who those devices communicate with, which allows to assess the risk a specific device and protocol brings to the organization.<\/li>\n<li><strong>Segment the network<\/strong> to isolate IT, IoT and OT devices, limiting network connections to only specifically allowed management and engineering workstations or among unmanaged devices that need to communicate.<\/li>\n<li><strong>Monitor the network<\/strong> using an OT-aware, DPI-capable solution to alert on malicious indicators and behaviors, watching internal systems and communications for known hostile actions such as vulnerability exploitation and unauthorized use of OT protocols.<\/li>\n<\/ul>\n<p>Forescout eyeInspect includes more than 50 different checks for Modbus\/TCP communication that may be anomalous or potentially dangerous, including commands to restart communications, new connections from engineering stations and firmware replacement.<\/p>\n<p>A YARA rule used to detect FrostyGoop\/BUSTLEBERM was also added to the monthly release of eyeInspect\u2019s IoC database.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-89288\" src=\"\/wp-content\/uploads\/2024\/08\/A-YARA-rule-used-to-detect-FrostyGoopBUSTLEBERM-.png\" alt=\"\" width=\"1200\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/A-YARA-rule-used-to-detect-FrostyGoopBUSTLEBERM-.png 1418w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/A-YARA-rule-used-to-detect-FrostyGoopBUSTLEBERM--300x139.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/A-YARA-rule-used-to-detect-FrostyGoopBUSTLEBERM--1024x475.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/A-YARA-rule-used-to-detect-FrostyGoopBUSTLEBERM--768x356.png 768w\" sizes=\"(max-width: 1418px) 100vw, 1418px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>Go deeper: See <\/em><\/strong><a href=\"\/compare\/\"><strong><em>how Forescout stacks up against other OT security providers<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last few weeks, there have been a few announcements made about a new malware threat known as FrostyGoop or BUSTLEBERM (as it was originally tracked by Mandiant). It is being recognized as the first custom malware to integrate Modbus for the purpose of causing physical damage. An associated incident has been reported where [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":89292,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[542,757],"class_list":["post-89283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed - Forescout<\/title>\n<meta name=\"description\" content=\"Forescout Research takes a fresh look at ICS malware FrostyGoop and the Modbus protocol. Is the malware use as new as some are reporting?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed - Forescout\" \/>\n<meta property=\"og:description\" content=\"Forescout Research takes a fresh look at ICS malware FrostyGoop and the Modbus protocol. Is the malware use as new as some are reporting?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T16:54:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-05T14:04:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs, Michael Bacon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed\",\"datePublished\":\"2024-08-02T16:54:53+00:00\",\"dateModified\":\"2024-08-05T14:04:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/\"},\"wordCount\":1284,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/\",\"name\":\"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg\",\"datePublished\":\"2024-08-02T16:54:53+00:00\",\"dateModified\":\"2024-08-05T14:04:14+00:00\",\"description\":\"Forescout Research takes a fresh look at ICS malware FrostyGoop and the Modbus protocol. Is the malware use as new as some are reporting?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg\",\"width\":800,\"height\":419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed - Forescout","description":"Forescout Research takes a fresh look at ICS malware FrostyGoop and the Modbus protocol. Is the malware use as new as some are reporting?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/","og_locale":"en_US","og_type":"article","og_title":"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed - Forescout","og_description":"Forescout Research takes a fresh look at ICS malware FrostyGoop and the Modbus protocol. Is the malware use as new as some are reporting?","og_url":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2024-08-02T16:54:53+00:00","article_modified_time":"2024-08-05T14:04:14+00:00","og_image":[{"width":800,"height":419,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg","type":"image\/jpeg"}],"author":"Forescout Research - Vedere Labs, Michael Bacon","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed","datePublished":"2024-08-02T16:54:53+00:00","dateModified":"2024-08-05T14:04:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/"},"wordCount":1284,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/","url":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/","name":"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg","datePublished":"2024-08-02T16:54:53+00:00","dateModified":"2024-08-05T14:04:14+00:00","description":"Forescout Research takes a fresh look at ICS malware FrostyGoop and the Modbus protocol. Is the malware use as new as some are reporting?","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg","width":800,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/ics-malware-frostygoopbustleberm-insights-others-missed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"ICS Malware \u2018FrostyGoop\/BUSTLEBERM\u2019: Insights Others Missed"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/08\/FS-2024-ICS-Malware-FrostyGoop-Insights-Blog-Share-V1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/89283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=89283"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/89283\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/89292"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=89283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=89283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=89283"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=89283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}