Russian Hackers Targeted the U.S. and Europe Power Companies - BestCyberNews: Online News Presenter in the present world

BestCyberNews: Online News Presenter in the present world

Start knowing

test banner

Breaking

Russian Hackers Targeted the U.S. and Europe Power Companies

Russian hackers targeted and attacking the U.S. and Europe power companies, this hacker group is formally called as the "Energetic Bear".

Most of the attacks against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims.

According to Symantec, they are managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries.

Hacker are also known as the "Dragonfly", this campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems.

Dragonfly initially targeted defense and aviation companies in the US and Canada before shifting its focus mainly to US and European energy firms in early 2013. 

Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required.

Dragonfly has used spam email campaigns and watering hole attacks to infect targeted organizations. The group has used two main malware tools: Backdoor.Oldrea and Trojan.Karagany. The former appears to be a custom piece of malware.

Analysis of the compilation timestamps on the malware used by the attackers indicate that the group mostly worked between Monday and Friday, with activity mainly concentrated in a nine-hour period that corresponded to a 9am to 6pm working day in the UTC +4 time zone.

Dragonfly uses two main pieces of malware in its attacks. Both are remote access tool (RAT) type malware which provide the attackers with access and control of compromised computers. 

Dragonfly’s favored malware tool is Backdoor.Oldrea, which is also known as Havex or the Energetic Bear RAT. Oldrea acts as a back door for the attackers on to the victim’s computer, allowing them to extract data and install further malware. 





Author Venkatesh Yalagandula Follow us Google + and Facebook and Twitter