Sandstorm Blocked From Taking Down Ukrainian Energy Provider

Share post:

The state-sponsored Russian hacking group, Sandstorm has tried unsuccessfully to take down a major Ukrainian energy supplier.

The attack was discovered by researchers from cybersecurity firm ESET in partnership with Ukraine’s Computer Emergency Response Team (CERT) before the hackers were able to complete the final phase of the attack on Friday, April 18.

CERT-UA says that “the implementation of [Sandstorm’s] malicious plan has so far been prevented”

According to the researchers, the attackers used a new variant of Industroyer malware for industrial control systems (ICS) and a new version of the CaddyWiper data destruction malware.

The ICS malware used in the attack is being tracked as Industroyer2, and researchers claimed that it was built with the source code of Industroyer, which was used in 2016 to disrupt electricity in Ukraine.

Other tools used in the attack include the PowerGap PowerShell script, which is used to add a Group Policy that downloads payload data and creates scheduled tasks, and Impacket, a tool used to remotely execute commands.

The researchers noted that it remains unknown how the attacker was able to compromise the environment and how they were able to move from the IT network into the ICS environment.

The sources for this piece include an article in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Cyber Security Today, Week in Review for week ending Friday, March 22, 2024

This episode features discussion on lessons learned from the ransomware attack on the British Library, advice for managing expectations of IT/security teams, why firms are leaving Google Firebase unprotecte

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways