• COVID-19
  • About Us
  • Contact Us
  • Events
  • Industries
  • Partners
  • Products & Services
  • Contribute
  • Webinars

Aerospace

  • Québec’s CloudOps Will Build Telesat LightSpeed’s Cloud Network
  • Myriota and Goanna Ag Team Up on IoT Agriculture Solutions
  • Fleet Picks Swissto12 to Deliver Additively Manufactured All-Metal Patch Antennas

Chemical

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Evonik deepens partnership with IBM to accelerate AI implementation
  • Achieving Plant Efficiency – the Digital Way

Cybersecurity

  • House Passes Eight Bipartisan Cyber, Homeland Security Bills
  • Biden Administration Targets Electric Utilities For Cybersecurity Protections
  • White House Attributes SolarWinds Hack To Russian Agency

Healthcare

  • CISA Services In High Demand Related To COVID Vaccine Response
  • AI tool detects COVID-19 by listening to patients’ coughs
  • Printing Wearable Sensors Directly onto Skin

Oil & Gas

  • Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
  • Cybersecurity: Continuous Vigilance Required
  • Repsol and Microsoft renew partnership developing AI-powered digital solutions

Power

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Self-Tuning Artificial Intelligence Improves Plant Efficiency and Flexibility
  • How to Put the Power Grid to Work to Prevent Wildfires

Transportation

  • Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
  • Trump Issues Cyber Security Plan For Maritime Transportation System
  • Sabic Launches New Compounds for Automotive Radar Sensors

Webinars

  • Anticipating the Unknowns: Accelerating Incident Response Without Losing Control
  • Industrial Endpoint Protection in Operational Technology
  • Known and Unknown: Putting a Stop to OT and IT Threats Before they Act

Sign up today for our free weekly e-letter

sign up
CONNECTING INNOVATIONS
WITH INSIGHT
SIGN UP
LOG IN
  • Aerospace
    Québec's CloudOps Will Build Telesat LightSpeed's Cloud Network
    Read story View all articles
  • Chemical
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Cybersecurity
    House Passes Eight Bipartisan Cyber, Homeland Security Bills
    Read story View all articles
  • Healthcare
    CISA Services In High Demand Related To COVID Vaccine Response
    Read story View all articles
  • Oil & Gas
    Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
    Read story View all articles
  • Power
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Transportation
    Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
    Read story View all articles
Cybersecurity
October 18 2018 1:18 pm

BlackEnergy, Grid-Disrupting Malware, Has a Successor, Researchers Warn

S

Sonal Patel

BlackEnergy, the malware used in a cyberattack that prompted a large-scale blackout in Ukraine in December 2015, has a successor–GreyEnergy. A group is using the malware to target industrial networks outside Ukraine, researchers  from Slovakian cybersecurity firm ESET warn. 

The researchers said in an October 17–released white paper that analysis of the previously undocumented GreyEnergy group's malware shows it has been used in targeted attacks against critical infrastructure organizations in Central and Eastern Europe. 

From Black to Grey

ESET was the firm that first tied the December 2015 attack–the world's first malware-prompted blackout incident, which affected about 1.4 million Ukrainians living in the Ivano-Frankivsk region–to BlackEnergy. The sophisticated malware campaign had compromised several industrial control systems (ICS) using variants since at least 2011, the U.S. Department of Homeland Security's ICS-Cyber Emergency Response Team (CERT) reported in 2014. ESET experts noted in a September 2015 paper that the malware is a trojan that evolved from a simple DDoS trojan since it was first analyzed by Arbor Networks in 2007. It was used in the December 2015 attack to plant a KillDisk component onto the targeted computers that would render them unbootable.

But while the Ukraine attack turned out to be "the last known use of the BlackEnergy malware in the wild," the BlackEnergy group has since evolved into at least two subgroups: TeleBots and GreyEnergy, the researchers warned on Wednesday.

 The TeleBots group's primary objective appears focused on cybersabotage attacks in Ukraine, and it has been successful. In December 2016, the group launched a series of attacks using an updated version of the KillDisk malware designed for Windows and LinucOSes against high-value targets in the Ukrainian financial sector. ESET also points to TeleBots for the notorious NotPetya attack in June 2017, which was carried out using a sophisticated backdoor that was embedded into financial software M.E.Doc, which is popular in Ukraine. In October 2017, the group deployed a new variant of NotPetya, BadRabbit, to execute new widespread cyberattacks on several transportation organizations in Ukraine, as well as computer systems in the Kiev Metro, Odessa airport, and also a number of organizations in Russia.  

Modular and Dangerous

GreyEnergy, whose design and architecture is "very similar" to BlackEnergy malware, has meanwhile, also been active. "We should say the GreyEnergy group has different goals than the TeleBots group: this group is mostly interested in industrial networks belonging to various critical infrastructure organizations," primarily in the energy sector, followed by transportation, ESET said. "And unlike TeleBots, the GreyEnergy group is not limited to Ukrainian targets."  

The firm said it first spotted GreyEnergy malware targeting an energy company in Poland. "At least one organization that had previously been targeted by BlackEnergy [in Ukraine] has more recently been under attack by GreyEnergy The most recently observed use of the GreyEnergy malware was in mid-2018," mostly in Ukraine. 

The researchers noted GreyEnergy is modular like Industroyer, the malware linked to the December 2016 cyber attack on Kiev's power grid, which resulted a second power outage that affected 200 MW of capacity. Modularity is of specific concern because threat actors can design and combine modules to disrupt targeted victim systems, for example, backdoor, file extraction, taking screenshots, keylogging, password, and credential stealing. 

They also said they have not seen GreyEnergy incorporate any module that is capable of affecting ICS systems. "However, the operators of this malware have, on at least one occasion, deployed a disk-wiping component to disrupt operating processes in the affected organization and to cover their tracks," they said. 

Additionally, research showed that GreyEnergy operators have been "strategically targeting ICS control workstations running SCADA software and servers, which tend to be mission-critical systems never meant to go offline except for periodic maintenance."

Research also showed that at least one GreyEnergy sample was signed with a valid digital certificate that had likely been stolen from Advantech, a Taiwanese company that makes ICS equipment. "In this respect, the GreyEnergy group has literally followed in Stuxnet's footsteps," the researchers said. Stuxnet's infamy grew after implication in one of the world's  first high-profile cyber attacks specifically targeting ICS, during the 2010 attack at Iran's Bushehr nuclear plant.

A Stealthy Threat

In a blog post, ESET Senior Malware Researchers Anton Cherepanov and Robert Lipovsky noted that despite malware activity over the last three years, GreyEnergy–which they described as an "advanced persistent threat" (APT) group–hasn't been documented before, likely because attacks haven't been as destructive as TeleBot ransomware campaigns, BlackEnergy's 2015 Ukraine grid attack, and Industroyer's December 2016 Ukraine grid attack. They noted ESET only last week established a connection between TeleBots, BlackEnergy, Industroyer, and NotPetya.

MalwareSimilarities_ESET

The malware connection. Courtesy: ESET

"Instead, the threat actors behind GreyEnergy have tried to stay under the radar, focusing on espionage and reconnaissance, quite possibly in preparation of future cyber-sabotage attacks or laying the groundwork for an operation run by some other APT group," they warned. 

Of specific concern is that GreyEnergy's malware framework bears many similarities to BlackEnergy. Along with modularity, both employ a "mini", or light, backdoor deployed before administrative rights are obtained and the full version is deployed. Also, all remote command and control (C&C) servers used by GreyEnergy malware were active "Tor relays," or routers on an open network designed to help users defend against traffic analysis. "This has also been the case with BlackEnergy and Industroyer. We hypothesize that this is an operational security technique used by the group so that the operators can connect to these servers in a covert manner," the researchers said. 

However, GreyEnergy is even more sophisticated than BlackEnergy. While both use a basic stealth technique to "push only selected modules to selected targets, and only when needed," some GreyEnergy modules are partially encrypted using AES-256 and some remain fileless–running only in memory–with the intention of hindering analysis and detection. "To cover their tracks, typically, GreyEnergy's operators securely wipe the malware components from the victims' hard drives," they added.

Modus Operandi

The researchers said they observed that GreyEnergy employs two distinct infection vectors: "traditional" spearfishing and compromise of public-facing web servers. 

Attacks may start with malicious documents, which drop "GreyEnergy mini", a lightweight first-stage backdoor that does not require administrative privileges. After compromising a computer with the mini-version, attackers map the network and collect passwords to obtain administrator privileges. ESET says the group uses "fairly standard tools" for these tasks: Nmap and Mimikatz. 

Once initial network mapping has been accomplished, the attackers can deploy their flagship backdoor–the main GreyEnergy malware. "According to our research, the GreyEnergy actors deploy this backdoor mainly on two types of endpoints: servers with high uptime, and workstations used to control ICS environments," they said. 

Stealth measures include deploying additional software on internal servers in compromised networks so they can act as a proxy, which could redirect requests from infected nodes inside the network to an external C&C server on the internet. All C&C servers have been Tor relays, the firm said. 

Professionals Weigh In on How to Thwart Attacks

According to Boston-based industrial cybersecurity firm CyberX, ESET's research is significant not only because it gives energy operators some awareness of how to protect themselves–but who the perpetrators are. Phil Neray, CyberX vice president of industrial cybersecurity, told POWER on October 18 that the research "credibly ties the sophisticated Ukrainian grid attacks of 2015 and 2016 to NotPetya and hence to the Russian GRU." 

Russia is now a prominent focus of the U.S. Department of Defense's (DoD's) newly released cyber strategy, owing to cyber-enabled information operations to influence U.S. democratic processes. However the DoD also points to other actors, such as North Korea and Iran for malicious cyber activities that harm U.S. citizens and threaten U.S. interests. 

"One easy takeaway from the research is that organizations should block all outbound access to TOR networks from their internal IT and OT networks, since this threat actor prefers using TOR for communication with its C&C servers," Neray noted. 

Moreno Carullo, co-Founder and chief technology officer of San Fransisco–headquartered ICS and SCADA cybersecurity firm Nozomi Networks, told POWER on October 18 that the discovery of yet another undocumented advanced malware was "inevitable." He added: "We are seeing a trend in ICS cybersecurity where this, and other malwares do exist, and they are threatening our world's most critical infrastructures."

Carullo said that an alarming  aspect of the trend is that "Each new malware our industry discovers is proving to be more and more advanced, like how this GreyEnergy malware extends its capabilities by receiving the module remotely." 

However, he noted the cybercriminals' main attack vectors–compromising public-facing web services and spear-phishing–could be "easily thwarted" with the right ICS solution and necessary training for employees. "With continuous visibility, advanced ICS security and constant education, industrial facilities worldwide can leverage their skills and tools to ensure they aren't at risk to be hit next at a time where industrial controls and critical infrastructure are priority cybersecurity targets," he said. 

–Sonal Patel is a POWER associate editor (@sonalcpatel, @POWERmagazine)

Editor's note: Updated on October 19 to add details from Nozomi Networks

Sign up today for our free weekly e-letter

sign up

Aerospace

Chemical

Cybersecurity

Healthcare

Oil & Gas

Power

Quiz

Transportation

Webinars

About Us

IIoT Connection delivers the latest news, trends, insights, events and research surrounding the dynamic and disruptive Industrial Internet of Things (IIoT) marketplace. Brought to you by the publisher of must-read publications Defense Daily, OR Manager, POWER and Chemical Engineering, as well as the conference producers of SATELLITE, Global Connected Aircraft Summit, Connected Plant Conference and ELECTRIC POWER, IIoT Connection is committed to providing the most comprehensive compilation of products and services dedicated to the Industrial Internet of Things. Key verticals with associated products and services include: aerospace, chemical, cybersecurity, healthcare, oil & gas, power, and transportation.


Advertise

  • Privacy Policy
© 2021 Access Intelligence, LLC - All Rights Reserved.
  • × UPS Partners with Wingcopter to Develop, Certify Drone Delivery Fleet
    Read story View all articles
  • × How Industrial Managers Can Identify and Prevent Failures in Facilities
    Read story View all articles
  • × Federal Agencies Partner To Improve Cyber Security Cooperation In Energy Sector
    Read story View all articles
  • × New service lines can create opportunities for ORs
    Read story View all articles
  • × Equinor and Shell to collaborate on digital solutions
    Read story View all articles
  • × Dobroflot to Manage Fuel Savings With IOT Solution By Orange Business Services
    Read story View all articles
  • × The Future of 5G & IoT Technologies in the Transportation Industry
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles