ESET: Industroyer the biggest threat since the Stuxnet era

ESET researchers analyzed samples of malware - detected by ESET as Win32 / Industroyer - that are capable of attacking power supply infrastructures. Industroyer

There is a high probability that this particular malware is involved in the attack against the electricity network of s in December 2016, which led to a power outage in the country's capital, Kyiv, for an hour.

"The attack on the Ukrainian electricity grid will have to alert everyone who is responsible for the security of critical systems at the global level, warns Anton Cherepanov, Senior Malware Researcher of ESET.

ESET researchers have discovered that Industroyer can directly control electrical substation switches and circuit breakers. It uses industrial communications protocols used worldwide for power supply, transport control systems and other critical infrastructures. Possible impacts may range from a single power failure, which will result in a series of failures, even to severe damage to the equipment.

 

Illustration of of Industroyer from ESET

"Industroyer's ability to remain in the system and be able to directly interfere with the operation of industrial infrastructure makes it the most dangerous malicious threat for industrial control systems from the famous ", which had managed to attack Iran's nuclear program and was discovered in 2010", says Anton Cherepanov.

Detailed information about malware, as well as IOC (Indicators of Compromise) indicators, can be found in the relevant article and an extensive whitepaper on ESET's blog, WeLiveSecurity.com.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).