Skip to main content

Weaponized Malware BlackEnergy Suspected to Have Hit Ukraine Power Company

PRNewswire

As detailed in SOCPRIME's report BlackEnergy was used again in the massive attack that hit the entire media industry in the Ukraine during
elections 2 months ago. Now it is also suspected to be the root cause of the Crimea power cut on the day before Christmas Eve.
The report provides details regarding the backdoor part of the malware, stating BlackEnergy was planted "months ahead before the elections date". The publication also credits the CyberX report published by DarkReading in May 2015 "warning that there might be more undiscovered BlackEnergy components". The report detailed exfiltration of data from ICS networks, which is considered highly valuable, and acts as a "necessary step before starting a large scale operation". The attack on the Ukraine media industry is considered an example of this type of large scale operation.
CyberX research of the attack on the Ukraine media has produced additional information on top of ESET's report, such as formatting of the drives and resetting of the host. Additional information, missing in ESET's report, is the potential method of operation used by the attacker of the Ukraine Power Company. This method, not yet authorized for publication, is in the process of proper disclosure.
As the research into this campaign is underway, involving security giants such as ESET and Kaspersky, additional discoveries are due to be published soon, shedding light on the attackers' motives and level of sophistication. But regardless of how this plays out, it is estimated that the damages resulting from the BlackEnergy ongoing campaigns have accrued to hundreds of millions of dollars, ranging from the latest sabotage during the Ukraine Elections to exfiltration of data from defense contractors and energy firms, and the alleged attack on the Ukraine Power Company.

Comments

Popular posts from this blog

International Community Comes Together at OASIS to Advance OpenC2 Standard for Automated Defense Against Cyber-Attacks

Anomali, Arbor Networks, Centripetal, Cisco, Cryptsoft, EclecticIQ, FireEye, ForeScout, Fornetix, FS-ISAC, G2, IBM, LookingGlass, McAfee, NC4, NEC, New Context, Phantom, Swimlane, Tanium, ThreatQuotient, U.S. DoD, U.S. NSA, U.S. NIST, and

New Next Generation X-Ray Inspection Technology for Pumped Food Inspection

Manufacturers of pumped food products can benefit from high detection sensitivity and improved Overall Equipment Effectiveness (OEE) with the X38 x-ray inspection system from

Security Protocol That Protects Majority of Wi-Fi Connections Has Been Hacked: How to Protect Yourself

Image ©  Real Business NordVPN  gives advice on and commentary due to major security protocol hack NEW YORK, October 18, 2017 ( Newswire .com) -  The security protocol currently used to protect