Triton/Trisis Malware Attack (2017)

Targeting Safety Instrumented Systems (SIS)

Victim:

Saudi Petrochemical Plant

Attacker/Malware:

Russian Central Scientific Research Institute of Chemistry and Mechanics’s Triton/Trisis/HatMan malware

Industry:

Oil and Gas

Estimated Cost:

Unknown, forced shutdown

Primary Attack Vector:

Remote Access / Phishing

Prevention Failure:

Lateral Movement to SIS Network

BlastWave Solution:

Network Cloaking, Passwordless Secure Access, and Segmentation

Kill Chain Analysis:

Targeting Critical Control Protocols

The Triton (also known as Trisis or HatMan) incident marked a pivotal escalationin industrial cyber warfare by specifically targeting Safety Instrumented Systems(SIS), which are designed to protect human life and prevent plant disasters.

Discovered at a Saudi Arabian petrochemical plant in 2017, the malware washighly sophisticated, leveraging proprietary protocol knowledge (TriStation) tocommunicate with and manipulate Schneider Electric’s Triconex SIS controllers.

While the exact initial vector remains unknown, it is suspected to have begunwith a remote access breach or a phishing campaign that enabled the attacker tomove laterally from the IT or general access network into the highly sensitive SISnetwork. The malware was designed to inject shellcode and manipulate systemmemory, giving the attackers complete control over safety mechanisms.

Fortunately, the attack was thwarted when an accidental shutdown triggered aninvestigation, but the intent was clear: to bypass safety controls and potentiallycause physical destruction or explosion.

BlastWave Prevention Analysis:

Cloaking and Policy-Based Protocol Enforcement

The Triton attack underscores that specialized, proprietary protocols operatingon sensitive networks must be safeguarded beyond simple segmentation. Thevulnerability was the implicit trust within the OT network, which allowed theattacker, once lateral access was achieved, to map and communicate with theSIS controllers.

BlastWave implements a network overlay that ensures the critical Triconexcontroller ports are invisible and entirely unreachable to any endpoint that doesnot meet the precise, identity-defined policy. This means that even if an attackergains internal network access, they cannot perform the necessary reconnaissance or establish the communication link required to deploy the Triton malwareor communicate via the TriStation protocol.

Zero Trust enforces that communication is only possible between the authorized engineering workstation (with the correct user identity and verified posture) and the SIS, effectively segmenting critical safety components down to the application layer.

Download Hackopedia Volume 1 Now – It's Free

Our Privacy Policy applies.

Take the Next Step

Reading about past failures is only useful if it changes future outcomes. If attackers can see your OT network, they can target it. If they can target it, compliance, safety, and uptime are already at risk.

BlastWave eliminates reconnaissance, initial access, and lateral movement — without agents, without downtime, and without changing IPs, protocols, or PLCs.

Secure Your OT Network