sommai - Fotolia
According to reports, threat actors used the BlackEnergy malware to assist with an attack on Ukrainian utility and media companies, though some question these reports. How big of a role did BlackEnergy play in this attack and what was it used for specifically? Is this a threat U.S. utility companies should be concerned about?
It is difficult to know if or how big of a role BlackEnergy malware played in the attacks on Ukrainian utility and media companies. Attribution is very difficult, and it is easy for a skilled attacker to leave clues that would lead an investigator of a specific incident to misattribute an attack to a particular party or piece of malware. Knowing Ukrainian utility and media companies were targeted could help similar companies in different countries identify types of attacks for which they could be at risk. Participating in a national sector Information Sharing and Analysis Center (ISAC) or Computer Emergency Readiness Team (CERT) could help identify more specific attacks.
In these attacks, BlackEnergy was used as the framework for the attack malware, where plug-ins for deleting data via the KillDisk component and a backdoor SSH server were present. The BlackEnergy dropper, malware config and command-and-control functionality were used in the attack. ESET did not say specifically how the utility or media companies were initially compromised in this attack to have BlackEnergy installed, but had previously stated BlackEnergy used phishing and social engineering for the initial access to the network.
Other than serving as an example of a possible attack, BlackEnergy malware is probably not something U.S. utility companies should be concerned about, if they are already addressing phishing, social engineering, incident response, supervisory control and data acquisition, industrial control system security and other best practices. BlackEnergy malware might be used in an attack targeting U.S. organizations, but monitoring for indicators of compromise from an ISAC or CERT could be very useful in stopping or detecting the initial infection vector.
Learn about a technique used to attribute malware attacks
Find out how a malicious C&C server can remain undetected
Read about the ongoing trend of long-duration APT attacks
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Sophos researchers believe the SamSam ransomware campaign could be the work of one or a few threat actors using manual techniques. Learn how it works... Continue Reading
The hacking group Magecart was recently found to have run a card skimming campaign that put customer information at risk. Learn how this attack ... Continue Reading
A new version of GandCrab was discovered by researchers in July 2018 and involves the use of legacy systems. Learn how this version differs and who ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.