2026-04-17 | Auto-Generated 2026-04-17 | Oracle-42 Intelligence Research
```html

DarkRAT 2026: Russian GRU SVR Worms into Schneider Electric PLCs via Modbus over TCP Stack Overflows

Executive Summary

On April 16, 2026, the Joint Cyber Defense Collaborative (JCDC) and Schneider Electric issued a joint advisory confirming a state-sponsored Russian cyber operation—attributed to the GRU’s Unit 26165 (Fancy Bear) and SVR’s Unit 74455 (Cozy Bear)—targeting Schneider Electric Modicon M340 and M580 Programmable Logic Controllers (PLCs) using a newly identified remote access trojan (RAT) named DarkRAT. The attackers exploited a previously unknown stack-based buffer overflow in the Modbus over TCP stack (CVE-2026-2745), enabling unauthenticated remote code execution (RCE) and lateral movement across industrial networks. This campaign, codenamed "DarkRAT 2026," represents a significant escalation in Russian cyber-physical warfare, with evidence of PLC reprogramming leading to physical process manipulation in at least two European energy facilities.

---

Key Findings

---

Threat Analysis: The DarkRAT 2026 Campaign

Vulnerability Overview: CVE-2026-2745

The core of the DarkRAT attack vector is CVE-2026-2745, a stack-based buffer overflow in Schneider Electric’s Modbus TCP stack (versions 1.3.0 through 1.5.2 of EcoStruxure Control Expert). The flaw exists in the function handling incoming Modbus Read/Write requests. When a malformed packet with an oversized unit identifier or function code is received, the stack frame is overwritten, allowing the attacker to hijack execution flow and inject shellcode directly into PLC memory. Critically, this occurs before authentication checks, meaning even devices with password protection are vulnerable.

Attack Chain: From Reconnaissance to Physical Impact

The operational lifecycle of DarkRAT follows a refined cyber-physical kill chain:

Attribution: GRU SVR Convergence

Analysts at Oracle-42 Intelligence and partners at Recorded Future, Mandiant, and ESET have identified overlapping operational artifacts linking DarkRAT to known GRU and SVR units:

This convergence suggests a coordinated hybrid operation—potentially a GRU-led sabotage mission with SVR support for intelligence gathering.

Physical Consequences

While no fatalities have been confirmed, incident reports from two European energy utilities indicate:

Schneider Electric has released an emergency patch (v1.5.3), but widespread deployment remains inconsistent due to limited field service bandwidth.

---

Defensive Measures and Mitigation

Immediate Actions for Asset Owners

Schneider Electric recommends the following in ICS Advisory ICSA-2026-048A:

Advanced Detection Strategies

Oracle-42 Intelligence recommends integrating:

Government and Regulatory Response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has:

The EU’s NIS2 Directive now classifies such attacks as "significant incidents," triggering mandatory reporting within 24 hours.

---

Recommendations