We presented our findings at Black Hat USA and in this article will offer a brief explanation of the steps our research team took to reverse engineer the attack. Our research found that the time, effort, financial resources and skill level needed to create the TRITON malware framework is not that high – certainly not at the level requiring nation state-sponsored resources. Any motivated hacker, equipped with reverse engineering skills and some understanding of industrial systems could create a TRITON-like malware framework.

Read More