Russian attempts to interrupt Ukraine’s Energy sector interuppted
The CERT-UA has disrupted an attempt by Sandworm, a hacking group known to work for Russia’s military intelligence, to take down a Ukrainian energy provider.
The Russia-backed hacking group attempted to disconnect the unnamed provider’s electrical substations using a new version of the infamous Industroyer malware. This malware was used by the Sandworm APT group to cut power in Ukraine in 2016, which left hundreds of thousands of customers without electricity two days before Christmas.
Researchers at cybersecurity company ESET, says that the industrial control system (ICS) malware was built using the source code of the malware deployed in 2016, which it branded at the time as the biggest threat to industrial control systems since Stuxnet.
The new variant, dubbed ‘Industroyer2’ was deployed by the hackers to cause damage to high voltage power substations. It was used alongside CaddyWiper destructive wiper malware first observed targeting a Ukrainian bank in March which was planted on systems running Windows to erase traces of the attack. The attackers also targeted the organization’s Linux servers using other variants of wiper malware dubbed Orcshred, Soloshred, and Awfulshred.
The attackers breached the energy provider’s network and had planned to cut power in a Ukrainian region on April 8. However, it’s been prevented. the initial intrusion and other details are still unknown.
Indicators of Compromise
- 91.245.255 [.] 243
- 195.230.23 [.] 19