New Wave of Cyber Attacks Hits Ukrainian Power Industry

Next story

ESET®, a global pioneer in IT security for more than two decades, has uncovered a new wave of attacks against electricity distribution companies in Ukraine. Previously, the attackers have managed to cause massive power outages in several regions in Ukraine in late December 2015. Interestingly, the malware that was used this time is not the infamous BlackEnergy.
The attack scenario itself hasn’t changed much from previous campaigns. The attackers sent spear-phishing emails to potential victims. The emails contained an attachment with a malicious XLS file, and also HTML content with a link to a .PNG file located on a remote server, so that the attackers would get a notification that the email had been delivered and opened by the target.

“We expected to see the BlackEnergy malware as the final payload, but a different malware was used this time. The attackers used modified versions of an open-source backdoor,” explains Robert Lipovsky, Malware Researcher at ESET.


This backdoor is able to download executables and execute shell-commands. Other backdoor functionality of the malware used - such as making screenshots, keylogging, or uploading files - was removed from the source code. The backdoor is controlled by attackers using a Gmail account, which makes it difficult to detect such traffic in the network.
The malware attacks on the Ukrainian energy sector have gained a lot of publicity as they caused or enabled (the role of the malware remains to be figured out in detail) a massive power outage, probably the world’s first as the result of such an attack.

“We currently have no evidence that would indicate who is behind these attacks and to attempt attribution by simple deduction based on the current political situation might bring us to the correct answer, or it might not. The current discovery does not bring us any closer to uncovering the origins of the attacks in Ukraine. On the contrary, it reminds us to avoid jumping to rash conclusions,” concludes Lipovsky. 


Read more at ESET’s WeLiveSecurity blog about this recent non-BlackEnergy attack and about the malware attack that left hundreds of thousand people in Ukraine without electricity: here is a technical blogpost and here is an interview with ESET’s Robert Lipovsky putting the event in context.


About ESET

Since 1987, ESET® has been developing award-winning security software that now helps over 100 million users to Enjoy Safer Technology. Its broad security product portfolio covers all popular platforms and provides businesses and consumers around the world with the perfect balance of performance and proactive protection. The company has a global sales network covering 180 countries, and regional offices in Bratislava, San Diego, Singapore and Buenos Aires. For more information visit www.eset.com or follow us on LinkedInFacebook and Twitter.