Cyber firms warn of malware that could cause global power outages
TWO cybersecurity firms have uncovered a malicious software they believe caused a December 2016 Ukraine power outage, they said on Monday, warning the malware could be easily modified to harm critical infrastructure operations around the globe.
Slovakian anti-virus software maker ESET and US critical-infrastructure security firm Dragos Inc. released detailed analyses of the malware – known as “Industroyer” or “Crash Override” – and issued private alerts to governments and infrastructure operators to help them fend off the threat.
The US Department of Homeland Security said it was investigating the malware, though it had seen no evidence to suggest it has infected US critical infrastructure.
The two firms said they did not know who was behind the cyber attack. Ukraine has blamed Russia, though officials in Moscow have repeatedly denied blame.
— Anna Kanner (@annakanner) June 13, 2017
Still, the firms warned there could be more attacks using the same approach, either by the group that built the malware or copycats who modify the malicious software.
“The malware is really easy to re-purpose and use against other targets. That is definitely alarming,” said ESET malware researcher Robert Lipovsky said in a telephone interview. “This could cause wide-scale damage to infrastructure systems that are vital.”
The Department of Homeland Security corroborated that warning, saying it was working to better understand the threat.
“The tactics, techniques and procedures described as part of the Crash Override malware could be modified to target US critical information networks and systems,” the agency said in an alert posted on its website.
The alert posted some three dozen technical indicators a system had been compromised by Crash Override and asked firms to contact the agency if they suspected their systems were compromised by the malware.
Dragos founder Robert M. Lee said the malware was capable of attacking power systems across Europe and could be leveraged against the United States “with small modifications.”
It is able to cause outages of up to a few days in portions of a nation’s grid, but is not potent enough to bring down a country’s entire grid, Lee said.
With modifications, the malware could attack other types of infrastructure including local transportation providers, water and gas providers, Lipovsky said.
Power firms are concerned there will be more attacks, Alan Brill, a leader of Kroll’s cyber security practice, said in a telephone interview.
“You are dealing with very smart people who came up with something and deployed it.”
“It represents a risk to power distribution in organizations everywhere.”
Industroyer is only the second piece of malware uncovered to date that is capable of disrupting industrial processes without the need for hackers to manually intervene.
— The Hacker News (@TheHackersNews) June 12, 2017
The first – Stuxnet – was discovered in 2010 and is widely believed by security researchers to have been used by the US and Israel to attack Iran’s nuclear program.
A spokesman for Ukraine’s state cyber police said it was not clear whether the malware was used in the December 2016 attack. Ukraine’s state-run Computer Emergency Response Team did not immediately respond to requests for comment.
The Kremlin and Russia’s Federal Security Service did not reply to requests for comment.
Crash Override can be detected if a utility monitors its network for abnormal traffic, including signs the malware is searching for the location of substations or sending messages to switch breakers, according to Lee, a former US Air Force cyber warfare operations officer.
Malware has been used in other disruptive attacks on industrial targets, including the 2015 Ukraine power outage, but in those cases, human intervention was required.
ESET said it had been analyzing the malware for several months and had held off on going public to preserve the integrity of investigations into the power system hack.
ESET last week provided samples with Dragos, which said it was able to confirm the malware was used in the Ukraine grid attack. – Reuters
- How can e-commerce owners use the latest trends to their benefit?
- Weak business and technology security could cripple Asia Pacific
- Step aside Black Friday – it’s the 11.11 Global Shopping Festival
- Instagram’s new poll feature offers your brand strategy more options
- VR cinemas reimagines film theater experience for the masses