# The BlackEnergy Attack Cyber-Attack on the Ukrainian Power Grid in 2015 --- # Introduction ![](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fisraelnoticias.com%2Fwp-content%2Fuploads%2F2020%2F07%2Fhacker-rusia.jpeg&f=1&nofb=1&ipt=4966e360e6749acd0b3d8031735315cc5a571445fa9d24412ccb64234490ea56&ipo=images) --- # Context ![](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Ftaylorholmes.com%2Fwp-content%2Fuploads%2F2016%2F03%2Fwinter-on-fire.jpg&f=1&nofb=1&ipt=19e43802631d9629163a6c5229411205f68e12181cc58020e0db1f20fb216c0c&ipo=images) --- # Attackers ![](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fwww.bleepstatic.com%2Fcontent%2Fhl-images%2F2020%2F10%2F19%2Fsandworms.jpg&f=1&nofb=1&ipt=a8cc8c7790b63973640a0fce74ebd22d7fc2c9fbf571cd806619968c48a490c8&ipo=images) --- # Target of Attack ![](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fik.imagekit.io%2Fpo8th4g4eqj%2Fprod%2Ftr%3Ah-630%2Cw-1200%2Fzaporizhzhia-nuclear-power-plant-1080x720px.jpg&f=1&nofb=1&ipt=dadedee42dfc9bf466c487d81160173c76f1027d16f457b6b51822859d26bff5&ipo=images) --- # Motivation of Attack - Destabilisation - Influence - Chaos - Smoke screen --- # Method of Attack - Spear phishing attacks - Malware (BlackEnergy V3) - Denial of service attack (DDos) --- # Attack Phase 1 - Surveillance of network - Spear phishing emails - Place sleeper malware in system - Locate user credentials and VPN --- # Attack Phase 2 - DDos attack on customer call center - Activate malware - Take-over system - Disrupt communication between system and network - Open circuit breaker - Overwrite critical firmware - Damage disk drives --- # Aftermath - Forced manual operation for months - Paved the way for similar, bigger attacks - Confirmed existence of cyberwarfare --- # Protective Measures - Firewall - VPN --- # Risks/Vulnerabilities - No Two-Factor-Authetification - Lack of training with Spear phishing attacks - Leaked insider knowledge --- # Mitigation Opportunities - Two-Factor-Authetification - Better training - Surveilance and monitoring - Security reviews --- # Preperation - Disaster recovery exercises - Defense strategies - Security tests --- # Aspects of Information Security - Authenticity: Access to Engineer Accounts - Integrity: Modification of Firmware - Availability: Use of KillDisk Malware --- # Resources [Who turned out the lights in the Ukraine? 2015 Black Energy attack](https://www.youtube.com/watch?v=I5SI-pUbq-g) [CYBER-ATTACK AGAINST UKRAINIAN POWER PLANTS](https://garylehman.net/wp-content/uploads/2016/01/Cyber-Attack-Against-Ukrainian-Power-Grid-Implications.pdf) [BlackEnergy](https://en.wikipedia.org/wiki/BlackEnergy)
{"title":"The BlackEnergy Attack - Presentation","description":"Cyber-Attack on the Ukrainian Power Grid in 2015","contributors":"[{\"id\":\"a4133efa-0293-4b74-b5c9-15368ca1d20e\",\"add\":4177,\"del\":1452}]"}
    168 views