GreyEnergy group targeting critical infrastructure, possibly in preparation for damaging attacks
Source: Vistar Communications for ESET Middle East , Author: Posted by BI-ME staff
Posted: Fri October 19, 2018 1:12 pm

UAE.  ESET has uncovered details of a successor to the BlackEnergy APT group. Named GreyEnergy by ESET, this threat actor focuses on espionage and reconnaissance, quite possibly in preparation for future cybersabotage attacks.

BlackEnergy has been terrorizing Ukraine for years and rose to prominence in December 2015 when they caused a blackout that left 230 thousand people without electricity in the first-ever blackout caused by a cyberattack. Around the time of that breakthrough incident, ESET researchers started detecting another malware framework and named it GreyEnergy.

"We have seen GreyEnergy involved in attacks at energy companies and other high-value targets in Ukraine and Poland over the past three years," says Anton Cherepanov, ESET Senior Security Researcher who led the research.

The 2015 attack on Ukrainian energy infrastructure was the most recent known operation where the BlackEnergy toolset was used. Subsequently, ESET researchers documented a new APT subgroup, TeleBots.

TeleBots are most notable for the global outbreak of NotPetya, the disk-wiping malware that disrupted global business operations in 2017 and caused damages in the sum of billions of US dollars. As ESET researchers recently confirmed, TeleBots are also connected to Industroyer, the most powerful modern malware targeting industrial control systems and the culprit behind the second electrical blackout in Ukraine's capital, Kiev, in 2016. 

"GreyEnergy surfaced along with TeleBots, but unlike its better-known cousin, GreyEnergy's activities are not limited to Ukraine and so far, haven't been damaging. Clearly, they want to fly under the radar," comments Anton Cherepanov.

According to ESET's thorough analysis, GreyEnergy malware is closely related to both BlackEnergy and TeleBots malware. It is modular in construction, so its functionality is dependent on the particular combination of modules its operator uploads to the victim's systems.

The modules described in ESET's analysis were used for espionage and reconnaissance purposes and include: backdoor, file extraction, taking screenshots, keylogging, password and credential stealing, etc.

"We have not observed any modules that specifically target Industrial Control Systems software or devices. We have, however, observed that GreyEnergy operators have been strategically targeting ICS control workstations running SCADA software and servers," explains Anton Cherepanov.

ESET's disclosure and analysis of GreyEnergy is important for a successful defense against this particular threat actor as well as for better understanding the tactics, tools and procedures of the most advanced APT groups.
 
More details can be found in the WeLiveSecurity.com blogpost and the white paper.
 
ESET Note:  When ESET Research describes cyberattacks and tracks cybercriminal groups, it is drawing connections based on technical indicators such as code similarities, shared Command & Control infrastructure, malware execution chains and other evidence. Since ESET is not involved in on-the-ground law-enforcement or intelligence investigations, we are not speculating on any potential nation-state attribution for these attacks.

Photo: For illustration purpose only

About ESET

For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint and mobile security, to encryption and two-factor authentication, ESET's high-performing, easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology.

ESET unobtrusively protects and monitors 24/7, updating defenses in real-time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D centers worldwide, ESET becomes the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single "in-the-wild" malware without interruption since 2003. For more information visit www.eset.com or follow us on LinkedIn, Facebook and Twitter.

 

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: March 20, 2019
UAE. The tale of an Argentinian teenager now shows that sleuthing for security holes in code can be a lucrative pursuit; He has come a long way since winning his first reward of US$50 in 2016.
date:Posted: March 20, 2019
UAE. For M&A activity in the chemical industry to continue to be strong, there will be headwinds for organizations to navigate in the coming year.
date:Posted: March 19, 2019
UAE. With traditional security models alone proving insufficient, Help AG is set to host its Security Spotlight Forum in the UAE this March to help enterprises understand and adopt the Zero-Trust approach.
dhgate