Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Campaigns
  3. 2015 Ukraine Electric Power Attack

2015 Ukraine Electric Power Attack

2015 Ukraine Electric Power Attack was aSandworm Team campaign during which they usedBlackEnergy (specifically BlackEnergy3) andKillDisk to target and disrupt transmission and distribution substations within the Ukrainian power grid. This campaign was the first major public attack conducted against the Ukrainian power grid by Sandworm Team.

ID: C0028
First Seen: December 2015[1]
Last Seen: January 2016[1]
Version: 1.0
Created: 27 September 2023
Last Modified: 18 December 2024

Groups

IDNameDescription
G0034Sandworm Team

[2][3]

Enterprise Layer
downloadview
ICS Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

During the2015 Ukraine Electric Power Attack,Sandworm Team usedBlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests.[1]

EnterpriseT1059.005Command and Scripting Interpreter:Visual Basic

During the2015 Ukraine Electric Power Attack,Sandworm Team installed a VBA script calledvba_macro.exe. This macro droppedFONTCACHE.DAT, the primaryBlackEnergy implant;rundll32.exe, for executing the malware;NTUSER.log, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines.[1]

EnterpriseT1136.002Create Account:Domain Account

During the2015 Ukraine Electric Power Attack,Sandworm Team created privileged domain accounts to be used for further exploitation and lateral movement.[1]

EnterpriseT1133External Remote Services

During the2015 Ukraine Electric Power Attack,Sandworm Team installed a modified Dropbear SSH client as the backdoor to target systems.[1]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

During the2015 Ukraine Electric Power Attack,Sandworm Team modified in-registry internet settings to lower internet security.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

During the2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself afterFONTCACHE.DAT,rundll32.exe, and the associated .lnk file is delivered.[1]

EnterpriseT1105Ingress Tool Transfer

During the2015 Ukraine Electric Power Attack,Sandworm Team pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data.[1]

EnterpriseT1056.001Input Capture:Keylogging

During the2015 Ukraine Electric Power Attack,Sandworm Team gathered account credentials via aBlackEnergy keylogger plugin.[1][4]

EnterpriseT1570Lateral Tool Transfer

During the2015 Ukraine Electric Power Attack,Sandworm Team moved their tools laterally within the corporate network and between the ICS and corporate network.[1]

EnterpriseT1112Modify Registry

During the2015 Ukraine Electric Power Attack,Sandworm Team modified in-registry Internet settings to lower internet security before launchingrundll32.exe, which in-turn launches the malware and communicates with C2 servers over the Internet.[1].

EnterpriseT1040Network Sniffing

During the2015 Ukraine Electric Power Attack,Sandworm Team usedBlackEnergy’s network sniffer module to discover user credentials being sent over the network between the local LAN and the power grid’s industrial control systems.[5]

EnterpriseT1566.001Phishing:Spearphishing Attachment

During the2015 Ukraine Electric Power Attack,Sandworm Team obtained their initial foothold into many IT systems using Microsoft Office attachments delivered through phishing emails.[4]

EnterpriseT1055Process Injection

During the2015 Ukraine Electric Power Attack,Sandworm Team loadedBlackEnergy into svchost.exe, which then launched iexplore.exe for their C2.[1]

EnterpriseT1018Remote System Discovery

During the2015 Ukraine Electric Power Attack,Sandworm Team remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets.[5]

EnterpriseT1218.011System Binary Proxy Execution:Rundll32

During the2015 Ukraine Electric Power Attack,Sandworm Team used a backdoor which could execute a supplied DLL usingrundll32.exe.[1]

EnterpriseT1204.002User Execution:Malicious File

During the2015 Ukraine Electric Power Attack,Sandworm Team leveraged Microsoft Office attachments which contained malicious macros that were automatically executed once the user permitted them.[4]

EnterpriseT1078Valid Accounts

During the2015 Ukraine Electric Power Attack,Sandworm Team used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network.[4]

ICST0803Block Command Message

During the2015 Ukraine Electric Power Attack,Sandworm Team blocked command messages by using malicious firmware to render serial-to-ethernet converters inoperable.[4]

ICST0804Block Reporting Message

During the2015 Ukraine Electric Power Attack,Sandworm Team blocked reporting messages by using malicious firmware to render serial-to-ethernet converters inoperable.[4]

ICST0805Block Serial COM

During the2015 Ukraine Electric Power Attack,Sandworm Team overwrote the serial-to-ethernet converter firmware, rendering the devices not operational. This meant that communication to the downstream serial devices was either not possible or more difficult.[1]

ICST0885Commonly Used Port

During the2015 Ukraine Electric Power Attack,Sandworm Team used port 443 to communicate with their C2 servers.[1]

ICST0884Connection Proxy

During the2015 Ukraine Electric Power Attack,Sandworm Team established an internal proxy prior to the installation of backdoors within the network.[1]

ICST0813Denial of Control

During the2015 Ukraine Electric Power Attack,KillDisk rendered devices that were necessary for remote recovery unusable, including at least one RTU. Additionally,Sandworm Team overwrote the firmware for serial-to-ethernet converters, denying operators control of the downstream devices.[1][4]

ICST0814Denial of Service

During the2015 Ukraine Electric Power Attack, power company phone line operators were hit with a denial of service attack so that they couldn’t field customers’ calls about outages. Operators were also denied service to their downstream devices when their serial-to-ethernet converters had their firmware overwritten, which bricked the devices.[4]

ICST0816Device Restart/Shutdown

During the2015 Ukraine Electric Power Attack,Sandworm Team scheduled the uninterruptable power supplies (UPS) to shutdown data and telephone servers via the UPS management interface.[4][1]

ICST0822External Remote Services

During the2015 Ukraine Electric Power Attack,Sandworm Team used Valid Accounts taken from the Windows Domain Controller to access the control system Virtual Private Network (VPN) used by grid operators.[1]

ICST0823Graphical User Interface

During the2015 Ukraine Electric Power Attack,Sandworm Team utilized HMI GUIs in the SCADA environment to open breakers.[4]

ICST0867Lateral Tool Transfer

During the2015 Ukraine Electric Power Attack,Sandworm Team moved their tools laterally within the ICS network.[1]

ICST0826Loss of Availability

During the2015 Ukraine Electric Power Attack,Sandworm Team opened the breakers at the infected sites, shutting the power off for thousands of businesses and households for around 6 hours.[4][1]

ICST0827Loss of Control

During the2015 Ukraine Electric Power Attack, operators were shut out of their equipment either through the denial of peripheral use or the degradation of equipment. Operators were therefore unable to recover from the incident through their traditional means. Much of the power was restored manually.[4]

ICST0828Loss of Productivity and Revenue

During the2015 Ukraine Electric Power Attack, power breakers were opened which caused the operating companies to be unable to deliver power, and left thousands of businesses and households without power for around 6 hours.[4][1]

ICST0831Manipulation of Control

During the2015 Ukraine Electric Power Attack,Sandworm Team opened live breakers via remote commands to the HMI, causing blackouts.[4]

ICST0886Remote Services

During the2015 Ukraine Electric Power Attack,Sandworm Team used an IT helpdesk software to move the mouse on ICS control devices to maliciously release electricity breakers.[2]

ICST0846Remote System Discovery

During the2015 Ukraine Electric Power Attack,Sandworm Team remotely discovered operational assets once on the OT network.[5][1]

ICST0857System Firmware

During the2015 Ukraine Electric Power Attack,Sandworm Team overwrote the serial-to-ethernet gateways with custom firmware to make systems either disabled, shutdown, and/or unrecoverable.[4]

ICST0855Unauthorized Command Message

During the2015 Ukraine Electric Power Attack,Sandworm Team issued unauthorized commands to substation breaks after gaining control of operator workstations and accessing a distribution management system (DMS) application.[4]

ICST0859Valid Accounts

During the2015 Ukraine Electric Power Attack,Sandworm Team used valid accounts to laterally move through VPN connections and dual-homed systems. Sandworm Team used the credentials of valid accounts to interact with client applications and access employee workstations hosting HMI applications.[4][1]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp