• COVID-19
  • About Us
  • Contact Us
  • Events
  • Industries
  • Partners
  • Products & Services
  • Contribute
  • Webinars

Aerospace

  • Québec’s CloudOps Will Build Telesat LightSpeed’s Cloud Network
  • Myriota and Goanna Ag Team Up on IoT Agriculture Solutions
  • Fleet Picks Swissto12 to Deliver Additively Manufactured All-Metal Patch Antennas

Chemical

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Evonik deepens partnership with IBM to accelerate AI implementation
  • Achieving Plant Efficiency – the Digital Way

Cybersecurity

  • House Passes Eight Bipartisan Cyber, Homeland Security Bills
  • Biden Administration Targets Electric Utilities For Cybersecurity Protections
  • White House Attributes SolarWinds Hack To Russian Agency

Healthcare

  • CISA Services In High Demand Related To COVID Vaccine Response
  • AI tool detects COVID-19 by listening to patients’ coughs
  • Printing Wearable Sensors Directly onto Skin

Oil & Gas

  • Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
  • Cybersecurity: Continuous Vigilance Required
  • Repsol and Microsoft renew partnership developing AI-powered digital solutions

Power

  • POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
  • Self-Tuning Artificial Intelligence Improves Plant Efficiency and Flexibility
  • How to Put the Power Grid to Work to Prevent Wildfires

Transportation

  • Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
  • Trump Issues Cyber Security Plan For Maritime Transportation System
  • Sabic Launches New Compounds for Automotive Radar Sensors

Webinars

  • Anticipating the Unknowns: Accelerating Incident Response Without Losing Control
  • Industrial Endpoint Protection in Operational Technology
  • Known and Unknown: Putting a Stop to OT and IT Threats Before they Act

Sign up today for our free weekly e-letter

sign up
CONNECTING INNOVATIONS
WITH INSIGHT
SIGN UP
LOG IN
  • Aerospace
    Québec's CloudOps Will Build Telesat LightSpeed's Cloud Network
    Read story View all articles
  • Chemical
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Cybersecurity
    House Passes Eight Bipartisan Cyber, Homeland Security Bills
    Read story View all articles
  • Healthcare
    CISA Services In High Demand Related To COVID Vaccine Response
    Read story View all articles
  • Oil & Gas
    Globalstar Wins Asset Tracking Order from Brazilian Oil and Gas Company
    Read story View all articles
  • Power
    POWER magazine and Chemical Engineering magazine announce Eastman Chemical as the Host Chemical Process Industries (CPI) Sponsor for the 5th annual Connected Plant Conference
    Read story View all articles
  • Transportation
    Swarm CEO Sara Spangelo Sets Disruptive Pricing on New Satellite IoT Service
    Read story View all articles
Cybersecurity
September 7 2017 10:19 am

Cyberattack Campaign Is Aimed at Disrupting Energy Sector Operations, Security Firm Warns

S

Sonal Patel

A group has launched a new wave of cyberattacks aimed at severely disrupting operations in the European and North American energy sectors, IT security firm Symantec warns.

Dragonfly, a group that has been in operation since at least 2011, has re-emerged over the past two years, the firm said in an official blog posting on September 6. "The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so," it said.

Symantec said the renewed campaign, which it calls "Dragonfly 2.0," has been underway since December 2015. But the firm has seen a "distinct increase in activity in 2017," it said.

Be Aware

The warning comes amid heightened concerns about cyber vulnerabilities in the power sector worldwide. A cyberattack in December 2015 prompted a swathe of unscheduled power outages afflicting three regional power distribution companies in Ukraine. It was caused by remote cyber intrusions, a U.S. interagency team confirmed last year. A modified version of the Petya ransomware attack at the end of June, meanwhile, shut down radiation monitoring at Ukraine's Chernobyl nuclear site.

A joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation last July warned that hackers have been penetrating computer networks of companies that operate nuclear power plants. Among companies targeted was the Wolf Creek Nuclear Operating Corp. The breaches reportedly originated through spear-phishing, a hacking method that uses legitimate-looking emails to seek unauthorized access to sensitive information. In that case, fake resumes reportedly sent to plant engineers delivered malware to their devices.

The power sector's concerns are rooted in vulnerabilities in their overarching industrial control systems (ICS) network. ICS encompasses several different control systems, including supervisory control and data acquisition (SCADA) systems and other smaller control system configurations.

According to Omer Schneider, CEO and co-founder of CyberX, an ICS threat intelligence firm, the renewed campaign by Dragonfly shouldn't come as a surprise. "It's well-known that there are at least two Russian groups that have been targeting the energy industry for several years, including Sandworm and Energetic Bear (Dragonfly)," he said in a statement to POWER on September 7.

 

Schneider said that as early as 2014, the Industrial Control Systems Cyber Emergency Response Team, an entity under the Department of Homeland Security, warned that adversaries had penetrated control networks "to perform cyber-espionage."

"Over time the adversaries have gotten even more sophisticated and now they've stolen credentials that give them direct access to control systems in our energy sector," he said. "If I were a foreign power, this would be a great way to threaten the US while I invade other countries or engage in other aggressive actions against US allies."

Dragonfly 2.0 uses a variety of infection vectors to gain access to vulnerable networks, including malicious emails, watering hole attacks, and Trojanized software, Symantec said.

"The earliest activity identified by Symantec in this renewed campaign was a malicious email campaign that sent emails disguised as an invitation to a New Year's Eve party to targets in the energy sector in December 2015," it said. "The group conducted further targeted malicious email campaigns during 2016 and into 2017. The emails contained very specific content related to the energy sector, as well as some related to general business concerns. Once opened, the attached malicious document would attempt to leak victims' network credentials to a server outside of the targeted organization."

Varying Attempts

IT firm Cisco in July called attention to an email based attack targeting the energy sector using a toolkit called Phishery. That toolkit steals victim's credentials via a template injection attack.

The Dragonfly group's renewed campaign has moved beyond compromising legitimate software to deliver malware to employing an evasion framework to develop Trojanized applications, Symantec warned.

"Symantec also has evidence to suggest that files masquerading as Flash updates may be used to install malicious backdoors onto target networks–perhaps by using social engineering to convince a victim they needed to download an update for their Flash player."

Of more concern is that the Dragonfly 2.0 campaigns show that the attackers may be entering into a new phase, "with recent campaigns potentially providing them with access to operational systems, access that could be used for more disruptive purposes in [the] future," it said.

Best Practices

Symantec advised that because Dragonfly relies heavily on stolen credentials to compromise a network, users, especially those with high privileges, should use passwords of at least eight to 10 characters long.

Other measures should "emphasize multiple, overlapping, and mutually supportive defensive systems to guard against single point failures in any specific technology or protection method." This should include the deployment of regularly updated firewalls as well as gateway antivirus, intrusion detection or protection systems (IPS), website vulnerability with malware protection, and web security gateway solutions throughout the network.

IT departments should also implement and enforce a security policy to encrypt sensitive data, and educate employees on dangers posed by spear-phishing.

"Understanding the tools, techniques, and procedures (TTP) of adversaries through services like  DeepSight Adversary Intelligence fuels effective defense from advanced adversaries like Dragonfly 2.0," it added. "Beyond technical understanding of the group, strategic intelligence that informs the motivation, capability, and likely next moves of the adversaries ensures more timely and effective decisions in proactively safeguarding your environment from these threats."

–Sonal Patel is a POWER associate editor (@sonalcpatel, @POWERmagazine)

 

Sign up today for our free weekly e-letter

sign up

Aerospace

Chemical

Cybersecurity

Healthcare

Oil & Gas

Power

Quiz

Transportation

Webinars

About Us

IIoT Connection delivers the latest news, trends, insights, events and research surrounding the dynamic and disruptive Industrial Internet of Things (IIoT) marketplace. Brought to you by the publisher of must-read publications Defense Daily, OR Manager, POWER and Chemical Engineering, as well as the conference producers of SATELLITE, Global Connected Aircraft Summit, Connected Plant Conference and ELECTRIC POWER, IIoT Connection is committed to providing the most comprehensive compilation of products and services dedicated to the Industrial Internet of Things. Key verticals with associated products and services include: aerospace, chemical, cybersecurity, healthcare, oil & gas, power, and transportation.


Advertise

  • Privacy Policy
© 2021 Access Intelligence, LLC - All Rights Reserved.
  • × UPS Partners with Wingcopter to Develop, Certify Drone Delivery Fleet
    Read story View all articles
  • × How Industrial Managers Can Identify and Prevent Failures in Facilities
    Read story View all articles
  • × Federal Agencies Partner To Improve Cyber Security Cooperation In Energy Sector
    Read story View all articles
  • × New service lines can create opportunities for ORs
    Read story View all articles
  • × Equinor and Shell to collaborate on digital solutions
    Read story View all articles
  • × Dobroflot to Manage Fuel Savings With IOT Solution By Orange Business Services
    Read story View all articles
  • × The Future of 5G & IoT Technologies in the Transportation Industry
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles
  • ×
    Read story View all articles