" />

Researchers Release Free Tool to Analyze ICS Malware

BLACK HAT USA – Las Vegas – The researchers who discovered the game-changing malware used against Ukraine’s power grid in 2016 that knocked out power for an hour in part of Kiev released a tool here this week for analyzing malicious code targeting industrial networks. ESET researchers Robert Lipovsky and Anton Cherepanov wrote an IDAPython script for IDA Pro that allows researchers and security team members to reverse-engineer binaries that employ the OPC Data Access industrial communications protocol, namely the CrashOverride/Industroyer malware that turned out the lights in Kiev in 2016, as well as Havex, a remote access Trojan used for cyber espionage against industrial control system environments.

Read full news article on dark READING