sommai - Fotolia
According to reports, threat actors used the BlackEnergy malware to assist with an attack on Ukrainian utility and media companies, though some question these reports. How big of a role did BlackEnergy play in this attack and what was it used for specifically? Is this a threat U.S. utility companies should be concerned about?
It is difficult to know if or how big of a role BlackEnergy malware played in the attacks on Ukrainian utility and media companies. Attribution is very difficult, and it is easy for a skilled attacker to leave clues that would lead an investigator of a specific incident to misattribute an attack to a particular party or piece of malware. Knowing Ukrainian utility and media companies were targeted could help similar companies in different countries identify types of attacks for which they could be at risk. Participating in a national sector Information Sharing and Analysis Center (ISAC) or Computer Emergency Readiness Team (CERT) could help identify more specific attacks.
In these attacks, BlackEnergy was used as the framework for the attack malware, where plug-ins for deleting data via the KillDisk component and a backdoor SSH server were present. The BlackEnergy dropper, malware config and command-and-control functionality were used in the attack. ESET did not say specifically how the utility or media companies were initially compromised in this attack to have BlackEnergy installed, but had previously stated BlackEnergy used phishing and social engineering for the initial access to the network.
Other than serving as an example of a possible attack, BlackEnergy malware is probably not something U.S. utility companies should be concerned about, if they are already addressing phishing, social engineering, incident response, supervisory control and data acquisition, industrial control system security and other best practices. BlackEnergy malware might be used in an attack targeting U.S. organizations, but monitoring for indicators of compromise from an ISAC or CERT could be very useful in stopping or detecting the initial infection vector.
Learn about a technique used to attribute malware attacks
Find out how a malicious C&C server can remain undetected
Read about the ongoing trend of long-duration APT attacks
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Port scans provide data on how networks operate. In the wrong hands, this info could be part of a larger malicious scheme. Learn how to detect and ... Continue Reading
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading