Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Ukraine Says Potent Russian Hack Against Power Grid Thwarted

Russian military hackers attempted to knock out power to millions of Ukrainians last week in a long-planned attack but were foiled, Ukrainian government officials said Tuesday.

Russian military hackers attempted to knock out power to millions of Ukrainians last week in a long-planned attack but were foiled, Ukrainian government officials said Tuesday.

At one targeted high-voltage power station, the hackers succeeded in penetrating and disrupting part of the industrial control system, but people defending the station were able to prevent electrical outages, the Ukrainians said.

“The threat was serious, but it was prevented in a timely manner,” a top Ukrainian cybersecurity official, Victor Zhora, told reporters through an interpreter. “It looks that we were very lucky.”

The hackers from Russia’s GRU military intelligence agency used an upgraded version of malware first seen in its successful 2016 attack that caused blackouts in Kyiv, officials said, that was customized to target multiple substations. They simultaneously seeded malware designed to wipe out computer operating systems, hindering recovery.

Authorities did not specify how many substations were targeted or their location, citing security concerns, but a deputy energy minister, Farid Safarov, said “2 million people would have been without electricity supply if it was successful.”

Zhora, the deputy chair of the State Service of Special Communications, said the malware was programmed to knock out power on Friday evening just as people returned home from work and switched on news reports.

He said that power grid networks were penetrated before the end of February, when Russia invaded, and that the attackers later uploaded the malware, dubbed Industroyer2. The malware succeeded in disrupting one component of the impacted power station’s management systems, also known as SCADA systems.

[ Read: Energy Provider in Ukraine Targeted With Industroyer2 ICS Malware ]

Advertisement. Scroll to continue reading.

Zhora would not offer further details or explain how the attack was defeated or which partners may have assisted directly in defeating it. He did acknowledge the depth of international assistance Ukraine has received in identifying intrusions and the challenges of trying to rid government, power grid and telecommunications networks of attackers. The helpers include keyboard warriors from U.S. Cybercommand, which declined comment.

The Computer Emergency Response Team of Ukraine thanked Microsoft and the cybersecurity firm ESET for their assistance in dealing with the power grid attack in a bulletin posted online.

Officials said the destructive attacks had been planned at least since March 23, and Zhora speculated it was timed by Russia to “invigorate” its soldiers after they took heavy losses in a failed bid to capture Kyiv, the capital.

Zhora stressed that Russian cyberattacks have not successfully knocked out any power to Ukrainians since this invasion began.

GRU hackers from a group that researchers call Sandworm twice successfully attacked Ukraine’s power grid — in the winters of 2015 and 2016. U.S. prosecutors indicted six GRU officials in 2020 for using a previous version of the Industroyer malware to attack Ukraine’s power grid by gaining control of electrical substation switches and circuit breakers.

In the 2016 attack, Sandworm hackers used Industroyer to turn circuit breakers on and off in a sequence designed to create a blackout, said Jean-Ian Boutin, director of threat research at ESET.

“We know that Industroyer still has the capability to turn off circuit breakers,” he said.

Working closely with Ukrainian responders, ESET also determined that the attackers had infected networks at the targeted plants with disk-wiping software.

Successfully activating the malware would have rendered plant systems in operable, seriously hindering remediation and recovery and destroying the attackers’ digital footprints, Boutin said.

One of the destructive malware varieties used in the attack, dubbed CaddyWiper, was first discovered by ESET in mid-March being used against a Ukrainian bank, he said.

Western prosecutors blame Sandworm for a series of high-profile cyberattacks including the most destructive, the 2017 NotPetya wiper virus that caused more than $10 billion in damage globally by destroying data on entire networks of computers of companies doing business in Ukraine including those belonging to the shipper Maersk and the pharmaceutical company Merck.

Russia’s use of cyberattacks against Ukrainian infrastructure during its invasion has been limited compared with experts’ pre-war expectations. In the early hours of the war, however, an attack Ukraine blames on Russia knocked offline an important satellite communications link that also impacted tens of thousands of Europeans from France to Poland.

In another serious cyberattack of the war, hackers knocked offline the internet and cellular service of a major telecommunications company that serves the military, Ukretelecom, for most of the day on March 28.

Zhora said “the potential of Russian (state-backed) hackers has been overestimated” and cited a number of reasons why he believes cyberattacks have not played a major role in the conflict:

● When the aggressor is pummeling civilian targets with bombs and rockets there is little need to hide behind covert cyberactivity.

● Ukraine has significantly upped its cyber defenses with the help of volunteers from sympathetic countries.

● Attacks as sophisticated as this effort to knock out power are complex and tend to require a lot of time.

“This is not an easy thing to do,” Zhora said.

Ukraine has been under steady Russian cyberattack for the past eight years, with Zhora noting that the attacks have tripled since the invasion when compared with the same period last year.

Russia has said its invasion was needed to protect civilians in eastern Ukraine, a false claim the U.S. had predicted Russia would make as a pretext for the invasion. Ukraine has called Russia’s assault a “war of aggression,” saying it “will defend itself and will win.”

RelatedRussia, Ukraine and the Danger of a Global Cyberwar

RelatedRussia vs Ukraine – The War in Cyberspace

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...