<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">
  • On-Demand Webinar

    PIPEDREAM Malware and the CHERNOVITE Threat Group

    Dragos Intelligence Briefing

    Original Air Date: April 26, 2022 | View the April 27 session here.

    PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and is capable of disruption, degradation, and potentially destruction of industrial environments. It was developed by the Dragos-designated Activity Group (AG) CHERNOVITE. PIPEDREAM can impact a wide variety of Programmable Logic Controllers (PLCs) and industrial software, including specific Omron and Schneider Electric PLCs, and improperly configured Open Platform Communications Unified Architecture (OPC UA) servers.


    In this briefing, Dragos Intelligence experts provide a detailed analysis of the PIPEDREAM components, their capabilities, the impacted devices, potential usage scenarios that highlight the impact the malware can have, and recommendations for mitigation.

    Pipedream-Chernovite-Socials2-LinkedIn-1200x628

    Want More on PIPEDREAM?

    Get our complete analysis on CHERNOVITE and the PIPEDREAM malware, and actionable guidance on what you can do to mitigate risk from cyber attacks.

    Get the Whitepaper

    The latest ICS/OT cybersecurity news

    from the Dragos blog

    Dragos_GeneralUseIcons_Teal_Threat_intel@2x