Ukrainian CNI Cyber Attack

Ukrainian CNI Cyber Attack

In the final few weeks of 2015, Ukraine's energy generation and distribution system came under a sophisticated cyber attack. The attackers displayed worrying levels of technical sophistication (modified BlackEnergy2 and BlackEnergy3 implants) and operational tradecraft (spear phishing, lateral network exploitation, system administrator/operator machine targeting) to achieve the outcome they wanted, even going so far as to TDoS the call centres of the energy companies in question. Cyber attacks like this are becoming the new normal in cyberspace, and other Western critical national infrastructure companies should stand up and take notice; we are not immune.

Luckily, there are some products and services emerging that can help to harden CNI systems to cyber threats. There is no single solution to this problem; hardening your systems and networks to this type of threat can only be achieved by a concerted and holistic campaign of cyber security systems, policies and procedures. The upside is that you don't need to be perfect; you just need to be tough enough that the bad guys move off to an easier fish to fry...

要查看或添加评论,请登录

Steve Mason的更多文章

  • Indonesia's Future Capital

    Indonesia's Future Capital

    As I sit on the tarmac at Soekarno–Hatta International Airport taxiing to the runway, I can't help but reflect on the…

    1 条评论
  • The Role of Virtue in a Business

    The Role of Virtue in a Business

    Matt Collamer on Unsplash In this first in a series of four blog posts exploring Nova Blue’s core values, I am going to…

    4 条评论
  • Advanced Persistent Security

    Advanced Persistent Security

    It’s an amazing time to be alive. The volume and availability of data and information is enormous and growing at an…

    4 条评论
  • Technical Due Diligence – Dogma Isn’t the Way

    Technical Due Diligence – Dogma Isn’t the Way

    Introduction Cyber and digital transformation are hot markets right now. The cyber security market is predicted by many…

  • Cyber is simple - it's just business risk

    Cyber is simple - it's just business risk

    As the volume, velocity and voracity of cyber attacks increases on a near-exponential scale, it's clear that every…

  • The art of not being an arse - Red Maple Technologies' "ways of working"

    The art of not being an arse - Red Maple Technologies' "ways of working"

    I've had a relatively varied career since I graduated from university way back in 2001; I've worked for the Canadian…

    6 条评论
  • Cyber through the lens of the 2015 Strategic Defence and Security Review

    Cyber through the lens of the 2015 Strategic Defence and Security Review

    Every five years, the government reviews and evaluates its previous and current expenditure of public funds towards the…

    1 条评论
  • 5th Decade Technology Leadership

    5th Decade Technology Leadership

    That's it. It's official.

    3 条评论
  • Cyber and EW Convergence

    Cyber and EW Convergence

    Knowledge wins wars. Look back through history and you’ll find evidence of many conflicts being decided when one…

    7 条评论
  • The assault continues

    The assault continues

    Ukraine's beleaguered energy companies have continued to be hammered by cyber attacks from an unknown (but no prizes…

    2 条评论

社区洞察

其他会员也浏览了