Industroyer: A cyber-weapon that brought down a power grid

DUBAI, UNITED ARAB EMIRATES, June 16, 2022 /EINPresswire.com/ -- Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
Authored by Andrรฉ Lameiras, security writer at ESET

On June 12thย 2017,ย ESET researchers published their findingsย about unique malware that was capable of causing a widespread blackout. Industroyer, as they named it, was the first known piece of malware that was developed specifically to target a power grid.

Indeed, Industroyer had been deployed to considerable effect a few months earlier โ€“ it caused thousands of homes in parts of Kyiv, Ukraine to lose power supplies for about an hour on December 17th, 2016, after the malware struck a local electrical substation. A few days later, ESET malware researcherย Anton Cherepanovย would start dissecting Industroyer.

A ticking bomb
Once planted, Industroyer spread throughout the substationโ€™s network looking for specific industrial control devices whose communication protocols it could speak. Then, like a time bomb going off, it apparently opened every circuit breaker at once, while defying any attempts of the substation operators to regain easy control: if an operator tried to close a breaker, the malware opened it back up.

To clean up its footprint, the malware unleashed a data wiper that was designed to leave the substationโ€™s computers inoperable and delayed the return to normal operations. Indeed, the wiper often failed, but had it been more successful, the consequences could have been much worse โ€“ especially in wintertime when a power outage can allow pipes filled with water to crack when they freeze.

A final malicious act was made by the malware to disable some of the protective relays at the substation, but that failed too. Without functioning protective relays in place, the substation equipment could have been at high risk of damage when the operators eventually reestablished electric transmission.

As Cherepanov and fellow ESET researcherย Robert Lipovskyย said at the time, the sophistication of Industroyer makes it possible to adapt the malware to any similar environment. In fact, the industrial communication protocols that Industroyer speaks are used not only in Kyiv, but also โ€œworldwide in power supply infrastructure, transportation control systems, and other critical infrastructure systems (such as water and gas)โ€.
On the other hand, considering how sophisticated Industroyer was, its impact was ultimately rather underwhelming, asย ESET researchers noted themselvesย back in 2017. Perhaps it was only a test for future attacks, or perhaps it was a sign of what the group behind it could do.

The work of Sandworm
The shenanigans of the malware, ESET researchers noted, mirror the malicious intentions of the people who created it. At aย Virus Bulletin conference in 2017, Lipovsky highlighted that the โ€œattackers had to understand the architecture of a power grid, what commands to send, and how that will be achievedโ€. Its creators went a long way to create this malware, and their objective was not just a power outage. โ€œSome clues in the Industroyer configuration suggest they wanted to cause equipment damage and malfunctionโ€.

At Black Hat 2017, Cherepanov also pointed out that it โ€œseems very unlikely anyone could write and test such malware without access to the specialized equipment used in the specific, targeted industrial environmentโ€.

In October 2020, theย United States attributed the attackย to six officers belonging toย Unit 74455, akaย Sandworm, a unit within Russiaโ€™s military intelligence agency GRU.

A comeback for Industroyer
Fast forward to 2022 and itโ€™s no surprise that in the weeks just before and afterย Russiaโ€™s invasionย on February 24th,ย ESET telemetry showedย an increase in cyberattacks targeting Ukraine.

On April 12th, together with CERT-UA, ESET researchers announced they had identified a new variant of Industroyer that targeted an energy supplier in Ukraine.ย Industroyer2ย had been scheduled to cut power for a region in Ukraine on April 8th; fortunately, the attack was thwarted before it could wreak further havoc on the war-torn country. ESET researchers assessed with high confidence that Sandworm was again responsible for this new attack.

A harbinger of things to come
In recent years, itโ€™s become more than clear that the worldโ€™s critical infrastructure services are at major risk for disruptions. The string ofย incidents that have impacted critical infrastructureย in Ukraine (and, indeed, other parts of the world) have awakened much of the public to the risks of cyberattack-induced power outages, water supply interruptions, fuel distribution disruptions, loss of medical data and many other consequences that can do far more than just disrupt our daily routines โ€“ they can be truly life-threatening.

Back in 2017, both Cherepanov and Lipovsky concluded theirย research blogย with a warning that, five years later, still holds true: โ€œRegardless of whether or not the recent attack on the Ukrainian power grid was a test, it should serve as a wake-up call for those responsible for security of critical systems around the worldโ€.

Sanjeev Kant
Vistar Communications
+971 55 972 4623
email us here

Recent Quotes

View More
Symbol Price Change (%)
AMZN  210.32
-12.37 (-5.55%)
AAPL  278.03
+2.12 (0.77%)
AMD  208.44
+15.94 (8.28%)
BAC  56.53
+1.59 (2.89%)
GOOG  323.10
-8.23 (-2.48%)
META  661.46
-8.75 (-1.31%)
MSFT  400.78
+7.11 (1.81%)
NVDA  185.41
+13.53 (7.87%)
ORCL  142.82
+6.34 (4.65%)
TSLA  411.11
+13.90 (3.50%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.

Gift this article