Hackers target biomanufacturing facilities using the Tardigrade malware

Two facilities have been hit already with others likely to be targeted

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Biomanufacturing facilities in the US are being actively targeted by an unknown hacking group leveraging a newmalwarestrain.

In a newthreat advisory, the Bioeconomy Information Sharing and Analysis Center (BIO-ISAC) revealed that the first attack believed to be launched using this new malware dubbed “Tardigrade” occurred in the spring of this year. At that time, Tardigrade was used in a cyberattack on a large biomanufacturing facility though a second facility was hit using the same malware just last month.

According to BIO-ISAC, both biomanufacturing sites and their partners are “encouraged to assume that they are targets” and should take the necessary steps to review their security and response postures.

Tardigrade malware

Tardigrade malware

AsreportedbySiliconANGLE, Tardigrade is primarily used for espionage though the malware also causes other issues on the systems it infects including network outages.

In aseparate report,Wirednoted that these recent attacks may be linked toCovid-19 researchas the pandemic has shown just how important biomanufacturing research is when developing vaccines and other medicines.

The origins of the code used in Tardigrade is also up for debate as BIO-ISAC believes the malware is based onSmoke Loaderthough security researchers that spoke withBleeping Computerclaim that it is a form of the Cobalt Strike HTTP beacon as opposed to an entirely new malware strain.

Due to Tardigrade’s advanced characteristics, the malware could have been developed by an advanced threat detection group or even by a nation-state intelligence service.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Regardless of its origin, Tardigrade is quite dangerous and we’ll likely find out more regarding this new malware as security researchers and even government agencies delve deeper into its code in an attempt to discover its true origins.

We’ve also featured thebest endpoint protection softwareandbest firewall

ViaSiliconANGLE

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics

This new phishing strategy utilizes GitHub comments to distribute malware

Smeg Combi Steam Oven review: a multi-functional countertop oven that looks stunning and cooks well