Wassonite
Description
(Dragos) Dragos identified the WASSONITE activity group following a malware intrusion at the Kudankulam Nuclear Power Plant (KKNPP) nuclear facility in India. After further investigation, Dragos observed WASSONITE tools and behaviors targeting multiple industrial control system (ICS) entities including electric generation, nuclear energy, manufacturing, and organizations involved in space-centric research. WASSONITE has been active since at least 2018.
WASSONITE targeting focuses on Asian entities, largely in India, as well as possibly Japan and South Korea. At this time, WASSONITE does not appear to have an ICS-specific disruptive or destructive capability. All the activity represents Stage 1 ICS kill-chain: access operations within IT networks.
WASSONITE operations rely on deploying DTrack malware for remote access to victim machines, capturing credentials via Mimikatz and publicly available tools, and utilizing system tools to transfer files and move laterally within the enterprise system. Researchers first disclosed DTrack in late September 2019, and identified the tool targeting Indian financial institutions and research centers. DTrack is loosely connected to an earlier observed malware family, ATMDTrack, used for robbing ATM machines.
Third-party security firms associate DTrack and its related malware to the Lazarus Group, Hidden Cobra, Labyrinth Chollima. Dragos also associates the activity group Covellite to Lazarus Group. However, while COVELLITE is also linked to broader Lazarus activity, this group leveraged substantially different capabilities and infrastructure to pursue a target set that does not overlap with observed WASSONITE activity.
Names
Name | Name-Giver |
---|---|
Wassonite | Dragos |
Country
Motivation
- Information theft and espionage
First Seen
2018
Observed Sectors
Observed Countries
Tools
Operations
- 2019-10: Breach of the Kudankulam Nuclear Power Plant https://www.zdnet.com/article/confirmed-north-korean-malware-found-on-indian-nuclear-plants-network/
Information
Other Information
Uuid
7ff50a06-a05b-4871-b2d5-1a49dcab389b
Last Card Change
2020-04-15