Friday, July 4, 2014

Russian 'Energetic Bear' Virus Hits U.S. and European Firms .. Lets Hackers Take Control of Power Plants

Over 1,000 energy firms were infected with a sophisticated cyber weapon that gave hackers access to power plant control systems, it has been revealed. 
Called 'Energetic Bear', the malware was unmasked by security firm Symantec.
It said the software allows operators to monitor energy consumption in real time - and to cripple physical systems such as wind turbines, gas pipelines and power plants at the click of a mouse. 
The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries.
The attack is believed to have compromised the computer systems of more than 1,000 organisations in 84 countries in a campaign spanning 18 months. 
'Among the targets of Dragonfly were energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers,' Symantec said. 
'The majority of the victims were located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.'
HOW IT WORKS 
The most ambitious attack campaign saw it compromise a number of industrial control system (ICS) equipment providers, infecting their software with a remote access-type Trojan. 
This caused companies to install the malware when downloading software updates for computers running ICS equipment.
These infections not only gave the attackers a beachhead in the targeted organizations’ networks, but also gave them the means to mount sabotage operations against infected ICS computers. 
Dragonfly uses two main pieces of malware in its attacks. 
Both are remote access tool (RAT) type malware which provide the attackers with access and control of compromised computers.
Read the full story HERE.

If you like what you see, please "Like" us on Facebook either here or here. Please follow us on Twitter here.


No comments: