A Peek Into the Toolkit of the Dangerous Triton Hackers

Two customers hired FireEye to investigate intrusions on their networks: the Petro Rabigh oil refinery, temporarily shut down by Triton in Saudi Arabia in 2017, and an anonymous, previously undisclosed victim whose breach FireEye investigated just this year. In those investigations, FireEye says it has identified a collection of custom, malicious software that the Triton hackers used: tools that allowed the hackers to patiently advance their intrusion as they worked to gain access to the victims’ industrial control systems.

Related links


Tags control systems fireeye hackers triton

1 Votes

You must log in to post a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.