Security researchers at Mandiant have identified a targeted cyber-espionage campaign against the geothermal energy sector attributed to the nation-state actor SteelHydra (APT47). The campaign targets organizations in the US, Canada, and Iceland to steal intellectual property and sensitive operational technology (OT) data. The attackers are using a novel malware framework, GeoShifter, which is custom-built for Industrial Control System (ICS) environments and can interact with Siemens and Schneider Electric equipment. Initial access is gained via spear-phishing emails that deliver a first-stage backdoor called PipeDreamer. This backdoor is used for reconnaissance before deploying GeoShifter into the OT network. The campaign demonstrates the actor's advanced capabilities and strategic focus on acquiring sensitive technology from the renewable energy sector.
The campaign is highly targeted and sophisticated. SteelHydra) initiates the attack with a well-crafted spear-phishing email containing a malicious document disguised as a Request for Proposal (RFP). When the victim opens the document and enables macros, the PipeDreamer backdoor is installed. This provides the attackers with a persistent foothold in the victim's IT network. From there, they perform extensive reconnaissance to identify and understand the target environment before making a move into the highly sensitive OT network. Once in the OT network, they deploy GeoShifter to specific engineering workstations and controllers to exfiltrate proprietary data without disrupting industrial processes.
The attack chain showcases a multi-stage, patient approach characteristic of nation-state actors:
T1566.001 - Spearphishing Attachment). The document uses macros to execute malicious code (T1204.002 - Malicious File).T1105 - Ingress Tool Transfer).T1057 - Process Discovery).T1021 - Remote Services).T1005 - Data from Local System). The stolen data is then exfiltrated back through the compromised IT network (T1041 - Exfiltration Over C2 Channel).T0862 - Screen Capture, T0851 - Project File Infection).The primary impact is economic espionage. The theft of proprietary geothermal technology, including turbine designs and drilling methods, could provide a significant competitive advantage to the nation-state sponsoring SteelHydra, allowing them to save billions in R&D costs and leapfrog competitors. While the current campaign is focused on espionage, the presence of ICS-aware malware like GeoShifter in an OT network is deeply concerning. The same access and capabilities used for spying could be repurposed in the future to conduct disruptive or destructive attacks against geothermal power plants, posing a threat to energy infrastructure.
ICS and IT security teams should hunt for the following:
| Type | Value | Description | Context |
|---|---|---|---|
log_source |
Email Gateway Logs | Look for incoming emails with attachments from unknown sources, especially those with RFP-related subjects targeting engineers. | Email security gateway |
process_name |
WINWORD.EXE or EXCEL.EXE |
Monitor Office applications for spawning suspicious child processes like powershell.exe or cmd.exe. |
EDR logs, Windows Event ID 4688 |
network_traffic_pattern |
Anomalous traffic between IT and OT network segments. | Any unexpected communication from the corporate network to the industrial control network is a major red flag. | Firewall logs, network segmentation gateway logs |
file_name |
*.s7p, *.mcp, *.pro |
GeoShifter targets specific ICS project file extensions for exfiltration. Monitor for unusual access to these files. | File Integrity Monitoring (FIM), EDR |
Network Traffic Analysis (D3-NTA).Sender Reputation Analysis (D3-SRA).Process Analysis (D3-PA).The most critical defense in an ICS environment. Strictly segmenting IT from OT prevents attackers from pivoting to control systems.
Educating targeted personnel about spear-phishing can prevent the initial compromise.
On fixed-function ICS assets like HMIs, application allowlisting can prevent unauthorized malware like GeoShifter from executing.
Logging process data to a secure historian can help detect anomalous behavior and provide data for forensic analysis.
The cornerstone of defending against threats like SteelHydra is establishing and enforcing a rigid network architecture based on the Purdue Model for ICS. A properly implemented IT/OT segmentation strategy, utilizing a DMZ as a buffer zone, is paramount. All traffic between the IT and OT networks must be explicitly denied by default and only allowed through specific, monitored conduits for legitimate business purposes. For the highest level of security, consider deploying unidirectional gateways (data diodes) to ensure that data can only flow from the OT network to the IT network, making it physically impossible for an attacker to send commands or exfiltrate data from a compromised IT host into the control environment. This architectural control is the most effective way to contain threats and protect physical processes from cyber-attacks originating in the corporate network.
To defeat the initial access vector, organizations must harden endpoints against macro-based attacks. Configure Microsoft Office applications via Group Policy to block macros from running in documents downloaded from the internet. This setting should be the default for all users. For the small number of users with a legitimate business need for macros, they should be placed in a separate group with additional monitoring and training. This simple configuration change neutralizes a vast number of phishing attacks, including the one used by SteelHydra to deliver the PipeDreamer backdoor. This hardening measure should be a top priority for all organizations, especially those in critical infrastructure sectors.
On critical systems within the OT network, such as Human-Machine Interfaces (HMIs) and Engineering Workstations, implement application allowlisting. These systems typically have a fixed and predictable set of required software. By creating a 'golden image' and an allowlist of known-good executables, libraries, and scripts, organizations can prevent any unauthorized code, such as the GeoShifter malware, from running. This 'default-deny' posture is one of the most effective security controls for static environments like ICS. While initial setup requires effort to build the baseline, the security payoff is immense, as it effectively blocks the execution of novel malware for which no signatures exist.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats