text
stringlengths 4
429
|
---|
partially destroyed the cascaded high frequency gas centrifuges. The early version of Stuxnet targeted the S7-
|
417 PLCs and modified its valve settings. Closing the valves at certain points in time would lead to an increase
|
of pressure that could damage the equipment. The later version of the threat focused on the S7-315 PLCs,
|
manipulating the spinning frequency of the rotating motors. By speeding the centrifuges up and slowing them
|
down repeatedly, the output quality could be spoiled and the centrifuges themselves could be damaged. The
|
payload would only become active if the fingerprint in the found PLC setup matched a given configuration setup.
|
This minimized the collateral damage at other facilities and showed that the attackers had in-depth knowledge
|
of the targeted uranium enrichment facilities. To avoid detection by personnel monitoring the human machine
|
interface (HMI) of the plant, the threat recorded measurement readings during normal operation and played
|
those back in a loop.
|
Night Dragon
|
Operation Night Dragon, which was uncovered in 2010, is a typical example of global oil companies being
|
targeted, but this time not with the aim of disruption in mind. The attacks started in late 2009 and were directed
|
at finding project details and financial information about oil and gas field exploration and bids.
|
The attackers started by compromising public facing Web servers through SQL injection and installing Web
|
shells on them. Once they had control over the server they used common hacking tools to harvest local
|
Page 11
|
Targeted Attacks Against the Energy Sector
|
passwords, dump password hashes, sniff authentication messages and exploit internal active directory
|
configuration. This allowed them to move on to other internal computers using the gathered passwords. In
|
addition, spear phishing messages were used to compromise additional computers. The attackers did not use
|
any zero-day vulnerabilities during their attacks. Rather they used publicly available tools for each individual job.
|
On compromised computers a common Backdoor.Trojan was installed that communicated back to the
|
C&C server, allowing remote access to the computer. This allowed the attacker to find and extract valuable
|
information.
|
Shamoon/Disttrack
|
In August 2012 an extremely destructive cyberattack hit an estimated 30,000 computers at one of the largest oil
|
producers of the world in Saudi Arabia. The W32.Disttrack malware used in this attack, also known as Shamoon,
|
consists of three components: a dropper, a wiper and a reporter module.
|
The dropper component is responsible for creating all the required files on the system, registering a service
|
called
|
TrkSvr
|
in order to start itself with Windows. It also attempts to copy itself to accessible network shares
|
and execute itself remotely if successfully copied.
|
The wiper component is only activated when a hardcoded configuration date has been passed. This enables a
|
coordinated,
|
time bomb
|
scenario. The module then drops a legitimate and digitally signed device driver that
|
provides low level disk access from user space. The malware collects file names and starts overwriting them
|
with a JPEG image or 192KB blocks of random data. At the end Disttrack finishes the computer off by wiping the
|
master boot record with the same data.
|
The reporter component is responsible for sending back a HTTP GET request to the C&C server. It reports the
|
domain name, IP address and number of files overwritten.
|
By acquiring user credentials and gaining access to the domain controller the attackers were able to push the
|
malware on to many systems before they triggered the destructive payload. Disttrack
|
s secondary goal may have
|
been to steal valuable information from infected computers, but the main intent was to render the computers
|
unusable by wiping the operating system and master boot record, causing disruption and downtime at the
|
targeted company. Although wiping is also frequently used to destroy evidence of the attack and make forensics
|
more difficult. The malware does not contain any payload against ICS, like Stuxnet does for PLCs, and is not as
|
sophisticated. According to the company, no computer related with the production or distribution of oil was
|
affected, since the operational network is separated and specially protected.
|
One group that claimed responsibility for the attack posted on Pastebin that it was an anti-oppression hacker
|
group. The attack was prompted by disappointment with some of the regimes in the Middle East, the group said.
|
True or not, this shows that it is not necessarily only state-sponsored attackers who are carrying out disruptive
|
attacks. Sabotage attacks usually fall into the orbit of hacktivists, who seek attention rather than profit. Some
|
sources reported that the attackers had help from insiders, which would explain the so far unclear infection
|
vector.
|
Soon after this attack became known, a Qatari gas company was attacked in a similar way.
|
Page 12
|
SPEAR PHISHING ATTACKS
|
IN THE ENERGY SECTOR
|
A spear phishing
|
attack consists
|
of an email with
|
either a malicious
|
attachment or a
|
link to a malicious
|
website.
|
Targeted Attacks Against the Energy Sector
|
Spear phishing attacks in the energy sector
|
Spear phishing is, along with watering hole attacks, one of the most common attack vectors used to
|
attack companies. The attacks are simple to carry out. They often follow the same pattern, starting with a
|
reconnaissance phase to gather all publicly available information. This is followed by the incursion phase of
|
breaking in and compromising computers. After that comes the discovery phase, where the attacker gathers
|
passwords and maps the internal network. The final stage is capture and exfiltration, where the valuable
|
information is copied and sent back to the attacker. The last phase may also involve a disruption attack if the
|
goal is sabotage. For a more detailed analysis of the attack phases, see Appendix C.
|
A spear phishing attack consists of an email with either a malicious attachment or a link to a malicious website.
|
Such emails are sent in bulk to a handful of key users. These waves are often repeated till enough people fall for
|
the bait and compromise their computers. For analysis on the social engineering themes used, attack details and
|
attachment types used, see Appendix A.
|
New Year
|
s campaign
|
Some of the spear phishing campaigns are smaller in scale and are focused on specific targets. For example, on
|
January 1, 2013 a global energy research company was targeted.
|
A wave of spear phishing emails were sent from two Freemailer accounts to 291 individuals at the targeted
|
company. All receiving email addresses started with a letter between G and R, covering half of the alphabet.
|
Whether there was a second wave of emails using the other half of the alphabet or whether the attackers only
|
got their hands on part of the address book remains unknown.
|
All emails had either the subject line
|
2013,Obama QE4! Merry Christmas !
|
or
|
2013,Obama QE4!
|
. It is
|
common to see spear phishing attacks take place around holidays, as people are receiving more emails during
|
these times and are less likely to perform due diligence while opening them. All of the emails contained the same
|
Trojan.Dropper disguised as an attachment with the filename AVP.dll.
|
The malware itself drops a malicious Downloader
|
clbcatq.dll
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.