According to reports, threat actors used the BlackEnergy malware to assist with an attack on Ukrainian utility...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
and media companies, though some question these reports. How big of a role did BlackEnergy play in this attack and what was it used for specifically? Is this a threat U.S. utility companies should be concerned about?
It is difficult to know if or how big of a role BlackEnergy malware played in the attacks on Ukrainian utility and media companies. Attribution is very difficult, and it is easy for a skilled attacker to leave clues that would lead an investigator of a specific incident to misattribute an attack to a particular party or piece of malware. Knowing Ukrainian utility and media companies were targeted could help similar companies in different countries identify types of attacks for which they could be at risk. Participating in a national sector Information Sharing and Analysis Center (ISAC) or Computer Emergency Readiness Team (CERT) could help identify more specific attacks.
In these attacks, BlackEnergy was used as the framework for the attack malware, where plug-ins for deleting data via the KillDisk component and a backdoor SSH server were present. The BlackEnergy dropper, malware config and command-and-control functionality were used in the attack. ESET did not say specifically how the utility or media companies were initially compromised in this attack to have BlackEnergy installed, but had previously stated BlackEnergy used phishing and social engineering for the initial access to the network.
Other than serving as an example of a possible attack, BlackEnergy malware is probably not something U.S. utility companies should be concerned about, if they are already addressing phishing, social engineering, incident response, supervisory control and data acquisition, industrial control system security and other best practices. BlackEnergy malware might be used in an attack targeting U.S. organizations, but monitoring for indicators of compromise from an ISAC or CERT could be very useful in stopping or detecting the initial infection vector.
Learn about a technique used to attribute malware attacks
Find out how a malicious C&C server can remain undetected
Read about the ongoing trend of long-duration APT attacks
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks ...continue reading
How was the ATMitch malware able to loot cash machines, then delete itself? Expert Nick Lewis explains how the fileless malware works and how it ...continue reading
DoubleAgent malware is a proof of concept for a zero-day vulnerability that can turn antivirus tools into attack vectors. Expert Nick Lewis explains ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.