|Cybersecurity Lecture Series
|Analyzing PIPEDREAM: Challenges in testing an ICS attack toolkit
|Jimmy Wylie, Dragos, Inc.
|Principal Malware Analyst II
|Hybrid: Digital Media Center/Zoom Theatre/Zoom
October 10, 2022 - 03:30 pm
Zoom link: httos://lsu.zoom.us/i/98612180731
Identified early in 2022, PIPEDREAM is the seventh-known ICS-specific malware and the fifth malware specifically developed to disrupt industrial processes. PIPEDREAM demonstrates significant adversary research and development focused on the disruption, degradation, and potentially, the destruction of industrial environments and physical processes. PIPEDREAM can impact a wide variety of PLCs including Omron and Schneider Electric controllers. PIPEDREAM can also execute attacks that take advantage of ubiquitous industrial protocols, including
Jimmy Wylie is a Principal Malware Analyst at Dragos, Inc. who spends his days (and nights) searching for and analyzing threats to critical infrastructure. He was the lead analyst on PIPEDREAM, the first ICS attack "utility belt", TRISIS, the first malware to target a safety instrumented system, and analysis of historical artifacts of the CRASHOVERRIDE attack, the first attack featuring malware specifically tailored to disrupt breakers and switchgear in an electric transmission substation.