AST Magazine February 2018 final-feb-2018 | Page 23
Volume 20
February 2018 Edition
Those in the West may believe that the Ukraine was simply a victim
of bad luck, however, the 2014 Dragonfly cyber attack targeted
multiple global industrial control system locations at over 2,000
sites.
The motivation behind the attack was electrical power and petro-
chemical facility espionage.
The result: 225,000 customers were without power for six hours af-
ter the substations had been remotely disconnected from the grid.
This particular ransomware attack locked up computers that main-
tained Ukrainian critical infrastructure.
Cyber criminals injected a virus into the utility network to map and
learn the operations.
The malware infected critical infrastructure in the United States,
Spain, France, Italy, Germany, Turkey, and Poland.
Dragonfly also mapped out utility computer networks, ostensibly
for future breaches.
The 2015 hack was the first global cyber attack targeted
at denying electrical service to a location.
The attack completely wiped data on computers running Microsoft
Windows OS.
The result: 225,000 customers were without power for six hours
after the substations had been remotely disconnected from the
grid.
This particular ransomware attack locked up computers that main-
tained Ukrainian critical infrastructure.
Through their malware, the actors not only demanded computer us-
ers pay a ransom, but even forced Chernobyl power plant operators
switch radiation-sensing systems over to manual operation.
Ready for Prime Time
Power grid attacks emphasize an important characteristic of the
terrorists: they know their way around power plants.
The most dramatic evidence of cyber criminal sophistication is
revealed by the 2016 Ukrainian attack, which crippled electricity
distribution for the nation’s capital.
Cyber security firms dubbed the malware “Industroyer”.
(The automatic radiation monitoring system at the Chernobyl nuclear power plant
was the target of a cyberattack, causing monitoring to be carried out manually,
according to a Ukrainian federal agency.)
The media, though, picked up on the moniker “CrashOverride”,
which refers to the malware “Crash” framework upon which the
attack was based.
21