Cyberattacks Target Biomanufacturing Firms with Custom Malware “Tardigrade”
Recent investigations have uncovered a series of cyberattacks targeting biomanufacturing companies in the U.S., attributed to an advanced persistent threat (APT) utilizing bespoke malware known as “Tardigrade.” This information was disclosed in a recent advisory published by the Bioeconomy Information Sharing and Analysis Center (BIO-ISAC).
The first attack occurred earlier this spring, where an unnamed biomanufacturing facility experienced a ransomware incident that prompted a comprehensive investigation by BIO-ISAC. The advisory describes Tardigrade as a sophisticated malware variant that exhibits a high level of autonomy, including metamorphic capabilities that allow it to alter its form to evade detection. This malware was subsequently linked to another attack in October.
While the specific threat actor behind these intrusions has not yet been identified, BIO-ISAC noted that the methods used bear similarities to previous attacks attributed to hacking groups allegedly linked to Russia. This context underscores a growing concern among cybersecurity experts regarding the threat landscape faced by biomanufacturing firms.
Tardigrade spreads through phishing emails and compromised USB drives. It is an advanced evolution of the well-known SmokeLoader backdoor, known for its availability in underground markets since 2011. Tardigrade not only captures keystrokes and facilitates lateral movement across networks but also maintains persistence in infected systems, allowing it to execute further malicious activities without the need for continuous command and control.
This malware serves as a foothold for deploying additional payloads and is designed to function autonomously, making it particularly challenging to neutralize once established within a network. Organizations are encouraged to apply critical software updates, implement robust network segmentation, and ensure that backups of vital infrastructure are regularly tested and maintained.
The advisory emphasizes the importance of vigilance, particularly among personnel using connected corporate systems. Many organizations in the sector may still be operating on outdated systems, which can create vulnerabilities. The researchers recommend aggressive isolation of such machines and acceleration of upgrade timelines to enhance overall cybersecurity posture.
The tactics and techniques likely employed in these attacks align with several categories in the MITRE ATT&CK framework. Initial access may have been achieved through phishing, while persistence and privilege escalation tactics could have been employed using the malware’s autonomous capabilities. Furthermore, lateral movement within the network allows adversaries to expand their influence, posing increasing risks to sensitive data and operations.
As biomanufacturing continues to grow in importance, the security challenges facing the sector are becoming increasingly pronounced. Vigilance and proactive measures are essential for mitigating these sophisticated cyber threats.
For business owners who find this information pertinent, staying informed of the latest developments in cybersecurity is crucial. Engaging with credible sources, following cybersecurity news outlets, and enhancing organizational defenses are vital steps in protecting against evolving threats.