Archived material. This page is preserved for historical and educational value. It reflects the threat landscape, available guidance, and research context at the time it was written or last updated. It should not be treated as a current security advisory or production remediation guidance. See the Threat Archive index for context and full listing.
ICS Attack Toolkit · OT · 2022

PIPEDREAM (INCONTROLLER)

State-sponsored modular attack framework targeting industrial control systems

Summary

PIPEDREAM (also known as INCONTROLLER) is a modular industrial control system (ICS) attack framework developed by state-sponsored actors, likely linked to Russia (CHERNOVITE activity group). It targets programmable logic controllers (PLCs) and other ICS components to enable reconnaissance, disruption, degradation, and potential destruction of industrial processes. Discovered in early 2022 before any known deployment, it represents a versatile toolset comparable to historical ICS malware like TRITON and STUXNET.

Key Facts:

Background

PIPEDREAM was discovered in early 2022 through independent research by Mandiant (now Google Cloud) and Dragos, in partnership with vendors like Schneider Electric. Analysis revealed a sophisticated, modular toolkit designed for ICS attacks. Notifications were made to affected vendors and U.S. government agencies (CISA, FBI, DOE, NSA), leading to a joint cybersecurity advisory on April 13, 2022. Vendors issued security bulletins and advisories (e.g., Schneider Electric SESB-2022-01, CODESYS advisory), but as it leverages native functionalities rather than vulnerabilities, no specific patches were required — instead, focus was on enhanced security configurations and monitoring.

Impact

What's Pipedream

Pipedream is a state-sponsored modular ICS attack framework (aka INCONTROLLER) consisting of multiple components designed to target and compromise industrial control systems. It includes tools like TAGRUN (OPC UA interactions), CODECALL (Modbus/CODESYS for Schneider PLCs), OMSHELL (Omron interactions), and others such as EVILSCHOLAR, BADOMEN, MOUSEHOLE for enumeration, exploitation, and control. Unlike traditional malware, it often uses legitimate protocols and native device functions rather than zero-day exploits, making it adaptable and hard to detect.

Implications

Pipedream underscores the evolving threat to operational technology (OT) environments, where state actors can deploy versatile tools for sabotage without needing specific vulnerabilities. It amplifies security risks in critical infrastructure, particularly during geopolitical tensions, potentially leading to widespread disruptions. Organizations face increased operational risks, including safety hazards and prolonged recovery, necessitating a shift from basic cybersecurity to comprehensive ICS-specific defenses, behavior-based monitoring, and cross-zone isolation to prevent lateral movement and process manipulation.

Mitigation

Immediate (0–7 days)

Short-Term (1–4 weeks)

Medium-Term (1–3 months)

Long-Term (3–6+ months)

Timeline

DateEvent
Early 2022Discovery and analysis by Mandiant, Dragos, and partners.
April 13, 2022Joint cybersecurity advisory released by CISA, FBI, DOE, NSA.
April 13, 2022Mandiant and Dragos publish detailed reports.
April 14, 2022Additional resources added to CISA advisory.
May 25, 2022Updated mitigations and resources in CISA advisory.

Key Takeaways

References

Identification Tool

Checklist for end users/technicians to confirm if a system may be affected by PIPEDREAM:

  1. Monitor network traffic for rapid scans on UDP port 27127 (Schneider PLC discovery) or 1740 (CODESYS brute-force attempts).
  2. Check for unusual brute-force login attempts on PLCs or OPC UA servers.
  3. Inspect Windows engineering workstations for the presence of AsrDrv103.sys driver (CVE-2020-15368 exploit).
  4. Look for unexpected PLC crashes or "packet of death" symptoms requiring power cycles.
  5. Review logs for unauthorized tag reads/writes in OPC UA or modifications to PLC logic.
  6. Verify if devices like Schneider Modicon or Omron Sysmac PLCs are present and exposed without proper segmentation.
  7. Scan for indicators of compromise (IOCs) from CISA advisory, such as unusual driver loads or connection severing.

If multiple items are checked, assume potential compromise and isolate the system immediately.

PowerShell Check Script

Single script block to detect the vulnerable ASRock driver (AsrDrv103.sys) on Windows engineering workstations and print patch status (green OK if not present / red update needed if present).

$driverPath = "C:\Windows\System32\drivers\AsrDrv103.sys"
$statusColor = "Green"
$statusMessage = "OK - No vulnerable driver detected."

if (Test-Path $driverPath) {
    $statusColor = "Red"
    $statusMessage = "Update Needed - Vulnerable ASRock driver (AsrDrv103.sys) detected. Mitigate CVE-2020-15368 immediately."
}

Write-Host -ForegroundColor $statusColor $statusMessage