Russia’s notorious Sandworm superior persistent risk (APT) group used living-off-the-land (LotL) strategies to precipitate an influence outage in a Ukrainian metropolis in October 2022, coinciding with a barrage of missile strikes.
Sandworm, linked to Russia’s Foremost Heart for Particular Applied sciences, has a storied historical past of cyberattacks in Ukraine: BlackEnergy-induced blackouts in 2015 and 2016, the notorious NotPetya wiper, and newer campaigns overlapping with the Ukraine warfare. To some extent, the warfare has supplied a smokescreen for its newer, comparably sized cyberattacks.
Take one occasion from October 2022, described at this time in a report by Mandiant. Throughout a downpour of 84 cruise missiles and 24 drone assaults throughout 20 Ukrainian cities, Sandworm cashed in on two months of preparation and compelled an surprising energy outage in a single affected metropolis.
In contrast to with earlier Sandworm grid assaults, this one wasn’t notable for some piece of superior cyber weaponry. As an alternative, the group took benefit of LotL binaries to undermine Ukraine’s more and more subtle essential infrastructure cyber defenses.
To Mandiant chief analyst John Hultquist, it units a worrying precedent. “We will should ask ourselves some powerful questions on whether or not or not we are able to defend in opposition to one thing like this,” he says.
But One other Sandworm Energy Outage
Although the precise methodology of intrusion continues to be unknown researchers dated Sandworm’s preliminary breach of the Ukrainian substation to at the very least June 2022.
Quickly after, the group was capable of breach the divide between the IT and operational expertise (OT) networks, and entry a hypervisor internet hosting a supervisory management and information acquisition (SCADA) administration occasion (the place plant operators handle their equipment and processes).
After as much as three months of SCADA entry, Sandworm picked its second. Coinciding (coincidentally or in any other case) with an onslaught of kinetic warfare the identical day, it used an optical disc (ISO) picture file to execute a binary native to the MicroSCADA management system. The exact instructions are unknown, however the group seemingly used an contaminated MicroSCADA server to ship instructions to the substation’s distant terminal items (RTUs), instructing them to open circuit breakers and thereby reduce energy.
Two days after the outage, Sandworm got here again for seconds, deploying a brand new model of its CaddyWiper wiper malware. This assault didn’t contact industrial programs — solely the IT community — and should have been meant to wipe forensic proof of their first assault, or just trigger additional disruption.
Russia vs. Ukraine Is Changing into Extra Even
Sandworm’s BlackEnergy and NotPetya assaults had been seminal occasions in cybersecurity, Ukrainian, and army historical past, affecting each how world powers view mixture kinetic-cyber warfare, and the way cybersecurity defenders defend industrial programs.
Because of this heightened consciousness, in years since, related assaults by the identical group have fallen some methods wanting its early customary. There was, for instance, the second Industroyer assault, not lengthy after the invasion — although the malware was equally highly effective, if no more so, than that which took down Ukraine’s energy in 2016, the assault total didn’t trigger any critical penalties.
“You possibly can take a look at the historical past of this actor making an attempt to leverage instruments like Industroyer and finally failing as a result of they had been found,” Hultquist says, whereas pondering whether or not this newest case was a turning level.
“I believe that this incident demonstrates that there is one other manner, and, sadly, that different manner goes to actually problem us as defenders as a result of that is one thing that we’re not going to essentially be capable to use signatures in opposition to and seek for en masse,” he says. “We will should work actually arduous to seek out these things.”
He additionally provides one other manner to take a look at Russian-Ukrainian cyber historical past: much less that Russia’s assaults have change into tamer and extra that Ukraine’s defenses have change into extra sturdy.
“If Ukraine’s networks had been below the identical strain that they’re below now, with the identical defenses that had been in place possibly a decade in the past, this case would have been a lot totally different,” Hultquist concludes. “They’re extra skilled than anybody defending in opposition to cyberwar, and we have now so much to be taught from them.”