The assault continues

The assault continues

Ukraine's beleaguered energy companies have continued to be hammered by cyber attacks from an unknown (but no prizes for correct guesses) source. The attackers, who may or may not be the same as the attacks pre-Christmas (see my previous post), are using gcat to conduct their attacks.

If this is the same attacker as the pre-Christmas attacks, this shows a decent level of tradecraft sophistication, as it is likely BlackEnergy2 and 3 will have been quite heavily signatured and will be actively hunted by Ukranian sysadmins (and hopefully other CNI network administrators worldwide), so changing toolset before re-engaging is a sensible way for the poachers to stay one step ahead of the gamekeepers.

But most reports are claiming that the attackers yet again used spear phishing attacks to exploit and gain code execution; this time using macros embedded microsoft excel files (which EVERY email client and Excel itself warns in flashing neon lights). Again, this demonstrates the immense power of well-crafted, socially-engineered content delivery to a specific target. But one has to ask: given content delivery was the likely exploit mechanism in the pre-Christmas attacks (and is easily the most publicised exploitation vector), why haven't the employees of these energy companies been warned HEAVILY about the perils of trusting non-plaintext emails from unknown or even suspicious sources. And it's not like these attack vectors are doing really innovative exploitation of running Windows services -- they are embedding exploits in Excel macros; one of the most recognised weaknesses in modern computing. This isn't rocket science.

Correlation doesn't equal causation, and so assuming national attribution simply based on who's in the crosshairs is a fool's errand. But whatever the case, the energy sector isn't the only Ukrainian critical national infrastructure system under cyber attack right now:

Given the scale, synchronisation, tradecraft sophistication and technical expertise being used here, this rings of nation-state level coordination to me. If it isn't, then is one hell of a coincidence.

I feel for the Ukrainian power companies right now, as this is a well-coordinated and sustained campaign of cyber activity against them. But they have to get their act together if they want to stem this flow of malicious activity on their networks. Step #1 - stop opening dodgy emails!

Ian R

Strategy - Intelligence - Leadership. Joining the dots to make the right things happen.

9 年

Another example which reinforces why Cyber security needs to become a integral part of operational management. It needs to be broken out of the IT/security department, to become a part of the consciousness of the organisation. Woven into the very fabric of processes and procedures and not simply consigned to a monthly meeting/ series of missives. Managers at all levels and in all areas of business should be including Cyber behaviour, security updates as a part of all meets, team call overs and review processes.

回复

要查看或添加评论,请登录

Steve Mason的更多文章

  • Indonesia's Future Capital

    Indonesia's Future Capital

    As I sit on the tarmac at Soekarno–Hatta International Airport taxiing to the runway, I can't help but reflect on the…

    1 条评论
  • The Role of Virtue in a Business

    The Role of Virtue in a Business

    Matt Collamer on Unsplash In this first in a series of four blog posts exploring Nova Blue’s core values, I am going to…

    4 条评论
  • Advanced Persistent Security

    Advanced Persistent Security

    It’s an amazing time to be alive. The volume and availability of data and information is enormous and growing at an…

    4 条评论
  • Technical Due Diligence – Dogma Isn’t the Way

    Technical Due Diligence – Dogma Isn’t the Way

    Introduction Cyber and digital transformation are hot markets right now. The cyber security market is predicted by many…

  • Cyber is simple - it's just business risk

    Cyber is simple - it's just business risk

    As the volume, velocity and voracity of cyber attacks increases on a near-exponential scale, it's clear that every…

  • The art of not being an arse - Red Maple Technologies' "ways of working"

    The art of not being an arse - Red Maple Technologies' "ways of working"

    I've had a relatively varied career since I graduated from university way back in 2001; I've worked for the Canadian…

    6 条评论
  • Cyber through the lens of the 2015 Strategic Defence and Security Review

    Cyber through the lens of the 2015 Strategic Defence and Security Review

    Every five years, the government reviews and evaluates its previous and current expenditure of public funds towards the…

    1 条评论
  • 5th Decade Technology Leadership

    5th Decade Technology Leadership

    That's it. It's official.

    3 条评论
  • Cyber and EW Convergence

    Cyber and EW Convergence

    Knowledge wins wars. Look back through history and you’ll find evidence of many conflicts being decided when one…

    7 条评论
  • Ukrainian CNI Cyber Attack

    Ukrainian CNI Cyber Attack

    In the final few weeks of 2015, Ukraine's energy generation and distribution system came under a sophisticated cyber…

社区洞察

其他会员也浏览了