WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships EKANS Ransomware Has Direct Implications for ICS Operations, and It May Not Be the First
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

EKANS Ransomware Has Direct Implications for ICS Operations, and It May Not Be the First

Author: Jennifer Walker

Created: Tuesday, February 4, 2020 - 18:22

Categories: Cybersecurity, General Security and Resilience

Until mid-2019, previous ICS-impacting ransomware had been limited to only IT-based mechanisms that enabled the propagation into control system environments. ICS cybersecurity firm Dragos assesses the newly disclosed EKANS ransomware (also reported as SNAKE) is not the first sample with direct ICS-impacting implications. Dragos believes EKANS is not new ransomware as previously suggested, but instead represents an obfuscated, hardened ransomware variant based on MEGACORTEX version 2 behavior identified in mid-2019 by cybersecurity firm Accenture. Dragos also points out that EKANS (and its presumed parent MEGACORTEX variant) represent a notable shift in the specific risk to industrial operations not previously observed in ransomware. As originally reported in the Security & Resilience Update for January 28, 2020, EKANS does have a mechanism for terminating various ICS-related processes on victim machines. However, EKANS is not currently capable of self-propagation or further manipulating or injecting commands into the named ICS-related processes, thus limiting its destructive capabilities. Nonetheless, with the inclusion of HMI software, historian clients, and additional items, EKANS indicates at least a minimal awareness of control system environment processes and functionality, and a deeply concerning evolution in ICS-targeting malware. Read the report at Dragos

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar