Energy providers unwittingly deploy malware through software updates
Eastern European-based attackers gained access to the networks of energy providers by tampering with software updates for industrial control systems (ICS), gaining a foothold that could be used for sabotage, Symantec has said.
The Dragonfly group, which appears to operate from Eastern Europe, compromised three ICS vendors, adding a piece of remote access malware to legitimate software updates, the security vendor has written in a blog post.
“Given the size of some of its targets, the group found a ‘soft underbelly’ by compromising their suppliers, which are invariably smaller, less protected companies,” wrote Symantec.
The companies unwittingly installed the malware by downloading the software updates from the ICS vendors. Symantec did not identify the vendors, but said it had notified the victims and various computer emergency response centres.
Those affected were energy grid operators, electricity generators and petroleum pipeline operators, with the majority of them in the US, Spain, France, Italy, Germany, Turkey and Poland, Symantec wrote.
On Friday, an agency that is part of the US Department of Homeland Security (DHS) issued an advisory on the attacks based on information it received from Symantec and the Finnish security company F-Secure.
The software updates from the three ICS vendors contained Havex, a remote access Trojan that can upload other malware to systems, according to the advisory, published by DHS’s Industrial Control Systems Emergency Response Team (ICS-CERT).
Havex, which is also known as Backdoor.Oldrea or Energetic Bear, also gathers a variety of network system information and uploads it to command-and-control servers controlled by the attackers.
Symantec identified a product that provided virtual-private-network (VPN) access to programmable-logic-controller (PLC) devices from one ICS vendor that had been modified by Dragonfly.
The group also modified a driver contained within a software package from a European manufacturer of PLC devices. The modified software was available for download for at least six weeks between June and July 2013, Symantec wrote.
A third European company that develops software for managing wind turbines and bio-gas plants also hosted compromised software for 10 days in April 2014, the vendor wrote.
The Dragonfly group has been around since at least 2011. At that time, it targeted defence and aviation companies in the US and Canada before shifting its attacks to energy companies in the same countries in early 2013, Symantec wrote.
Symantec identified a product that provided VPN access to PLC devices from one ICS vendor that had been modified by Dragonfly.
It likened Dragonfly’s campaign to that of Stuxnet, which was a stealthy malware attack believed to have been conceived by the US and Israel that destroyed centrifuges used by Iran to refine uranium.
“While Stuxnet was narrowly targeted at the Iranian nuclear programme and has sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required.”
Based on timestamps showing when the malware was compiled, it appears the attackers worked 09:00 to 18:00 Monday through Friday shifts in a time zone that places them in Eastern Europe, Symantec said.
Security analysts have said that such regular working patterns often indicate that a country may be sponsoring or sanctioning such attacks.
“Dragonfly bears the hallmarks of a state-sponsored operation, displaying a high degree of technical capability,” wrote Symantec.
Tampering with software updates is perhaps the cleverest of Dragonfly’s attacks, but the group also used a variety of other methods to compromise individuals close to the companies they targeted.
Those methods included sending spam emails with malicious PDF attachments and so-called “watering hole” attacks, where spam emails with malicious links aim to lead people to websites that probe computers for software vulnerabilities.
Dragonfly employed two exploit kits, called “Lightsout” and “Hello,” which are hacking platforms planted on legitimate websites that try to deliver malware to computers that visit the site, Symantec wrote.
Jeremy Kirk, IDG News Service
Subscribers 0
Fans 0
Followers 0
Followers