Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Security

Latest Ukrainian Power Outage Linked to Sandworm Cyber Group

Kyle by Kyle
November 9, 2023
in Security
Reading Time: 3 mins read
0
Sandworm APT attack causes Ukrainian power outage
21
SHARES
357
VIEWS
Share on FacebookShare on Twitter

In October 2022, Russia’s notorious Sandworm cyber group orchestrated a power outage in a Ukrainian city using clever techniques, coinciding with a barrage of missile strikes. Sandworm, associated with Russia’s Main Center for Special Technologies, has a history of cyberattacks in Ukraine, including BlackEnergy-induced blackouts in 2015 and 2016, the infamous NotPetya wiper, and recent campaigns during the Ukraine war. The ongoing conflict has provided cover for its recent cyberattacks.

You might also like

Meta Raises Privacy Bar: Messenger Embraces End-to-End Encryption Amidst Controversy and Commitment to User Safety

US Government Targets North Korea-Linked Cyber Threat, Lazarus, and Seizes Crypto Service

Researchers Expose Gaza Charity Crypto Scam

In a recent report by Mandiant, an incident from October 2022 is detailed. Amidst a downpour of 84 cruise missiles and 24 drone attacks across 20 Ukrainian cities, Sandworm leveraged two months of preparation to cause an unexpected power outage in one city. Unlike previous grid attacks, this one didn’t rely on advanced cyber weaponry but exploited living-off-the-land (LotL) techniques, undermining Ukraine’s sophisticated cyber defenses.

According to Mandiant chief analyst John Hultquist, this sets a concerning precedent, prompting questions about our ability to defend against such tactics.

The initial breach by Sandworm in June 2022 targeted a Ukrainian substation. After breaching the gap between IT and operational technology networks, the group accessed a hypervisor hosting a supervisory control and data acquisition (SCADA) management instance. SCADA is where plant operators oversee machinery and processes. After maintaining SCADA access for up to three months, Sandworm acted during a surge in kinetic warfare.

Using an optical disc (ISO) image file, Sandworm executed a binary native to the MicroSCADA control system, likely instructing infected MicroSCADA servers to command the substation’s remote terminal units (RTUs) to open circuit breakers, causing a deliberate power outage.

Two days later, Sandworm deployed a new version of its CaddyWiper malware, targeting only the IT network. This move may have aimed to erase forensic evidence of the initial attack or cause further disruption. The exact intrusion method remains unknown, leaving researchers to grapple with the complexity of defending against such sophisticated cyber tactics.

Russia vs. Ukraine Hacking

The conflict between Russia and Ukraine is seeing a shift towards a more balanced playing field. Sandworm’s impactful BlackEnergy and NotPetya attacks have left a lasting mark on cybersecurity, Ukrainian history, and military strategies. These events have influenced how global powers perceive the combination of kinetic-cyber warfare and how defenders secure industrial systems.

As awareness has grown, subsequent attacks by Sandworm have not matched the intensity of their earlier actions. Take, for instance, the second Industroyer attack that followed the invasion. Despite the malware being as powerful, if not more so, than the one that disrupted Ukraine’s power in 2016, it failed to inflict serious consequences.

Adam Hultquist, an expert in the field, points out the historical pattern of Sandworm’s attempts to utilize tools like Industroyer, often failing due to discovery. He suggests that this recent incident may mark a turning point, introducing new challenges for defenders. The evolving nature of the threat requires a more proactive approach, as traditional methods like using signatures may prove inadequate.

Hultquist also provides an alternative perspective on the cyber history between Russia and Ukraine. Rather than Russia’s attacks weakening, he suggests that Ukraine’s defenses have strengthened over time. Reflecting on Ukraine’s experience in handling cyber threats, Hultquist emphasizes that if faced with the same pressure and outdated defenses of a decade ago, the recent situation would have unfolded differently. He underscores the need for defenders to learn from Ukraine’s expertise in cyberwarfare, acknowledging that there is much to gain from their experience.

Tags: RussiaSandwormSCADA
Kyle

Kyle

Co-owner, writer, and editor at ZeroSecurity. Security, Blockchain, and SEO enthusiast. "Formal education will make you a living; self-education will make you a fortune."

Recommended For You

Meta revolutionizes Messenger with end-to-end encryption, prioritizing user privacy. Amidst acclaim and controversy, the move sparks debates on digital safety.

Meta Raises Privacy Bar: Messenger Embraces End-to-End Encryption Amidst Controversy and Commitment to User Safety

December 7, 2023
Cyber threat Lazarus, active for a decade, stole $2B+ in digital assets. Sinbad.io crypto mixer aids laundering. Despite sanctions, Lazarus remains resilient, evolving tactics for complex attacks.

US Government Targets North Korea-Linked Cyber Threat, Lazarus, and Seizes Crypto Service

November 30, 2023

Researchers Expose Gaza Charity Crypto Scam

November 20, 2023

Europol and Local Forces Disband Multi-Million Dollar Vishing Ring

November 19, 2023

Chinese Scammers Cloning Websites for Massive Gambling Scam in Asia-Pacific Region

November 15, 2023

Cybersecurity Breach Paralyzes Key Australian Ports: National Response Initiated

November 12, 2023
Next Post
Rising threat of data-stealing malware like Jupyter highlights the need for vigilance in the era of remote work, impacting organizations and individuals alike.

New Variant of Jupyter Malware On The Rise

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Iranian hacking group 'Cyber Av3ngers' targets Pennsylvania water authority in a cyberattack, highlighting vulnerabilities in critical infrastructure cybersecurity. Investigations underway by U.S. authorities.

Iranian Hacking Group Targets Pennsylvania Water Authority in Attack on Critical Infrastructure

November 28, 2023
Crisis at Ardent Health: Ransomware attack disrupts operations, forcing patient diversions. The Tennessee-based provider initiates cybersecurity measures.

Cybersecurity Crisis Hits Ardent Health Services

November 27, 2023
State-owned China Energy Engineering Corp (CEEC) hit by Rhysida ransomware; global alert issued. Insights into tactics and impact on #StopRansomware effort

China Energy Giant, CEEC, Falls Victim to Rhysida Ransomware Attack

November 26, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact us
  • Press
  • Writers
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Contact Us
    • Press
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.