Menu
BlackEnergy cyberespionage group targets Linux systems and Cisco routers

BlackEnergy cyberespionage group targets Linux systems and Cisco routers

Kaspersky Lab researchers found BlackEnergy malware modules designed for ARM and MIPS systems running Linux

A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.

Security researchers from antivirus vendor Kaspersky Lab released a report Monday detailing some of the custom modules that the group has developed for BlackEnergy, a tool originally created and used by cybercriminals to launch distributed denial-of-service attacks.

Variants of the BlackEnergy plug-ins developed by the cyberespionage group were discovered for both Windows and Linux systems. They enhance the malware program with capabilities like port scanning, password stealing, system information gathering, digital certificate theft, remote desktop connectivity and even hard disk wiping.

Different selections of plug-ins are deployed from command-and-control servers for every victim, depending on the group's goals and the victim's systems, the Kaspersky researchers said.

In one case, attackers downloaded and executed a BlackEnergy plug-in called dstr that destroyed data on an organization's Windows computers.

"By all appearances, the attackers pushed the 'dstr' module when they understood that they were revealed, and wanted to hide their presence on the machines," the Kaspersky Lab researchers said. "Some machines already launched the plugin, lost their data and became unbootable."

In another incident, an organization that also had data from some of its Windows machines destroyed found that it was no longer able to access its Cisco routers via telnet. When they investigated, they found several "farewell" scripts left on the routers by the BlackEnergy group, the Kaspersky researchers said.

Those scripts had been used to clean traces of what the attackers did on the compromised routers. One script had the description "Cisc0 API Tcl extension for B1ack En3rgy b0t" and contained a vulgar message for Kaspersky researchers.

The group seems particularly interested in targeting organizations that run industrial control systems, especially from the energy sector. Victims identified by Kaspersky include power generation operators, power facilities construction companies, suppliers and manufacturers of heavy power-related materials, and energy sector investors.

This matches recent findings by the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a division of the U.S. Department of Homeland Security. In a security alert last week, ICS-CERT warned that multiple companies running HMI (human-machine interface) products from General Electric, Siemens and BroadWin/Advantech had their systems infected with BlackEnergy. HMIs are software applications that provide a graphical user interface for monitoring and interacting with industrial control systems.

Aside from its apparent interest in ICS operators, the group has been known to target high-level government organizations, municipal offices, federal emergency services, national standards bodies, banks, academic research institutions, property holdings and other organizations. Victims were identified in at least 20 countries.

On Oct. 14 researchers from security firm iSight Partners released a report about one of the group's recent attack campaigns that targeted the Ukrainian government and a U.S.-based organization by leveraging a zero-day -- unpatched -- vulnerability in Microsoft Windows.

The iSight researchers dubbed the cyberespionage group the Sandworm team and believe that it's operating out of Russia. However, the Kaspersky researchers said that it's unclear whose interests the group serves, noting that a DDoS attack launched by the group targeted an IP address that belongs to the Russian Ministry of Defense.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwarespywareintrusionkaspersky labICS-CERTiSight Partners

Featured

Slideshows

Reseller News Innovation Awards 2018: meet the top performing partners

Reseller News Innovation Awards 2018: meet the top performing partners

Reseller News honoured the industry’s finest on a standout evening for the New Zealand channel, recognising the achievements of established partners, emerging players and innovative start-ups, in front of over 460 technology leaders in Auckland.

Reseller News Innovation Awards 2018: meet the top performing partners
Champagne Reception kicks off Reseller News Innovation Awards 2018

Champagne Reception kicks off Reseller News Innovation Awards 2018

More than 460 channel leaders came together to toast the top performers of the New Zealand industry, during the opening Champagne Reception at the Reseller News Innovation Awards 2018 - in association with Techbuyer.

Champagne Reception kicks off Reseller News Innovation Awards 2018
Chasing innovation: how Kiwi partners can create a new customer agenda

Chasing innovation: how Kiwi partners can create a new customer agenda

This exclusive Reseller News Roundtable - in association with Rhipe and Microsoft - detailed a blueprint for customer success, outlining the new role of the modern-day partner and wider network in New Zealand.

Chasing innovation: how Kiwi partners can create a new customer agenda
Show Comments