CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Visionary CIO

Sandworm rolls out Industroyer2 malware against Ukraine

admin by admin
April 12, 2022
in Visionary CIO
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


A new variant of the Industroyer malware, used to great effect against the Ukrainian energy sector by Russia’s Sandworm or Voodoo Bear advanced persistent threat (APT) group in 2016, has been identified by researchers from ESET, working in tandem with Ukraine’s national Computer Emergency Response Team, CERT-UA.

Predictably dubbed Industroyer2, it was used in an attempted cyber attack on a Ukraine-based energy company on the evening of Friday 8 April 2022. The attack used an ICS-capable malware and disk wipers against Windows, Linux and Solaris operating systems at the target’s high-voltage electrical substations.

The Industroyer2 malware was compiled on 23 March, suggesting the attack had been planned for some time, and the initial compromise took place in February according to CERT-UA.

Sandworm also used a number of other destructive malwares in its attack, including the recently identified CaddyWiper, Orcshred, Soloshred and Awfulshred.

“Ukraine is once again at the centre of cyber attacks targeting their critical infrastructure,” said ESET’s research team in a disclosure notice. “This new Industroyer campaign follows multiple waves of wipers that have been targeting various sectors in Ukraine. ESET researchers will continue to monitor the threat landscape in order to better protect organisations from these types of destructive attacks.”

ESET said it had been unable to establish how the victim was compromised, nor how Sandworm, which is part of the Russian GRU intelligence service’s Main Centre for Special Technologies, or GTsST, moved laterally from the victim’s IT network to the separate ICS network.  

Industroyer2 differs from its parent because it uses only a single protocol – IEC-104 – to communicate with industrial equipment, and incorporates a detailed, hardcoded configuration to drive its actions, which makes it highly specific and means it must be recompiled by its operators for any new victim or environment they wish to attack.

It does, however, share multiple code similarities with the previous Industroyer payload, enabling the analysts to assess with high confidence that both malwares stem from the same source code.

More details on how the malware works, along with new information on the CaddyWiper malware used alongside it, is available from ESET.

A parallel cyber war

Industroyer2 is the latest in a string of new malwares that have been deployed by Russia in its parallel cyber war against Ukraine, many of them also discovered by ESET.

Moscow’s campaign of destructive data wiper attacks began in the month prior to the initial kinetic invasion of Ukraine, with the use of the new WhisperGate malware against government targets in Kyiv.

As the invasion began, these initial attacks were followed by the use of other new wipers, including HermeticWiper, IsaacWiper, and in mid-March, CaddyWiper.

In addition to its use of destructive wiper malwares, Russia also deployed the new Cyclops Blink malware as a means of accessing target networks through vulnerable firewall devices and coopting them into a botnet – although this was neutralised earlier in April by American and German authorities.

Meanwhile, an actor linked to Russia’s European puppet state, Belarus, targeted organisations involved in supporting Ukrainian refugees with a malware called SunSeed.



Source link

Previous Post

Disney combines digital, data and creativity to win advertising opportunities

Next Post

Multiple arrests made in RaidForums takedown

Related Posts

Visionary CIO

JPMorgan’s UK digital retail bank reaches half-million customer mark

by admin
May 24, 2022
Visionary CIO

Set innovation free and make great ideas a reality

by admin
May 24, 2022
Visionary CIO

Japan Airlines: digitally re-imagining the air passenger experience

by admin
May 24, 2022
Visionary CIO

Learn to work with the Office 365 unified audit log

by admin
May 23, 2022
Visionary CIO

Ukrainian startup offers financial cloud, business advice

by admin
May 23, 2022
Next Post

Multiple arrests made in RaidForums takedown

Leave Comment

Recommended

JPMorgan’s UK digital retail bank reaches half-million customer mark

May 24, 2022

Set innovation free and make great ideas a reality

May 24, 2022

Japan Airlines: digitally re-imagining the air passenger experience

May 24, 2022

Yes, Containers Are Terrific, But Watch the Security Risks

May 24, 2022

Learn to work with the Office 365 unified audit log

May 23, 2022

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.