Menu
Ukrainian power companies are getting hit with more cyberattacks

Ukrainian power companies are getting hit with more cyberattacks

These attacks use different malware than those in December did, Eset says

A number of Ukrainian power companies are seeing fresh cyberattacks following ones in December that briefly knocked out power for tens of thousands of customers.

Security vendor, Eset, said on Wednesday that the attacks use a different kind of malware, prompting questions about whether the same group or groups are involved.

"The malware is based on a freely available open-source backdoor – something no one would expect from an alleged state-sponsored malware operator," wrote Robert Lipovsky, a senior malware researcher with Eset.

The new finding deepens the mystery over who is targeting the Ukrainian companies.

"The current discovery suggests that the possibility of false flag operations should also be considered," Lipovsky wrote. "To sum it up, the current discovery does not bring us any closer to uncovering the origins of the attacks in Ukraine. On the contrary, it reminds us to avoid jumping to rash conclusions."

The December attacks against two service providers, Prykarpattyaoblenergo and Kyivoblenergo, are the most well-documented incidents to date of a threat against critical infrastructure that experts have long warned was on the way.

Kyivoblenergo said in a statement that 80,000 customers were briefly affected after 30 substations went offline. A study of the incident showed operators quickly switched to manually operating the stations to restore service.

The malware used in the attacks, known as Black Energy, has been linked by the security firm iSight Partners to a group with strong Russian interests nicknamed the Sandworm Team.

But experts have cautioned against attributing the attacks to the Russian government, which has been an odds with Ukraine since it annexed Crimea in 2014. Attribution of cyberattacks is difficult because attackers can take a variety of steps to obscure of origin of their activity.

The SANS Industrial Control Systems (ICS) team published a blog post on Jan. 1 saying the malware probably gave the attackers access to the systems but didn’t alone cause the outages.

Lipovsky wrote that the latest attacks started with targeted spear phishing emails sent to victims. The emails contained a malicious Microsoft Excel file, which if executed starts a macro that launches a trojan downloader. That code then pulls malware from another remote server.

ukrainian spear phishing email Eset

A sample of a spear phishing email sent recently to employees of Ukrainian power companies.

The malware is a modified version of the gcat backdoor, Lipovsky wrote.

"The backdoor is controlled by attackers using a Gmail account, which makes it difficult to detect such traffic in the network," he wrote.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags cyberattacksESET. securityUkraine

Featured

Slideshows

Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Veritas honours top performing trans-Tasman partners

Veritas honours top performing trans-Tasman partners

Veritas honoured its top performing partners across the channel in Australia and New Zealand, recognising innovation and excellence on both sides of the Tasman. Revealed under the Vivid lights in Sydney, Intalock claimed the coveted Partner of the Year 2017 (Pacific) award, with Data#3 acknowledged for 12 months of strong growth across the market. Meanwhile, Datacom took home the New Zealand honours, with Global Storage and Insentra winning service provider and consulting awards respectively. Dicker Data was recognised as the standout distributor of the year, while Hitachi Data Systems claimed the alliance partner award. Photos by Bob Seary.

Veritas honours top performing trans-Tasman partners
Show Comments