Symantec: Energy Sector Targeted by Hacker Group Dragonfly
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Symantec: Energy Sector Targeted by Hacker Group Dragonfly

A report from Symantec claims the re-emergence of an old foe with a new target

According to a report by the cyber security company, Symantec, the energy sector in Europe and North America is being targeted by a wave of cyber attacks. The attacker is a group known as Dragonfly, which has the means to severely disrupt operations.

Dragonfly has been in operation since at least 2011. It was exposed back in 2014 and appeared to go dormant for a while. However, in the past couple of years, the group has re-emerged and is now operating freely again. Symantec has dubbed this second act “Dragonfly 2.0,” given that its tactics and tools are eerily similar to those used in the previous campaign.

A quick aside, what is it with the names of these hacker groups? Fancy Bear. Cozy Bear. Dragonfly. I guess I just always figured hacker collectives were far more metal than EDM.

Anyway, per Symantec:

The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.

The Energy Sector is a High-Value Target

Over the past few years, internationally, we’ve seen a number of incidents involving cyber attacks and cyber espionage and the energy sector. Most notably, Ukraine’s power system was victimized in 2015 and 2016, which left hundreds of thousands of people without power.

It’s not hard to see how knocking out a power grid could be advantageous, and – given the news over just the past few months – it’s obvious that many hackers and cyber groups are keenly aware of this.

While Dragonfly certainly isn’t the only group attempting to exploit the power grid, its efforts certainly provide us with some interesting insights into the issue.

Honing in on Dragonfly 2.0

Per Symantec, Dragonfly 2.0 has been active since “at least December 2015,” but its activity has really ramped up this past year. The majority of the attacks have been concentrated in the United States, Turkey, and Switzerland, with some light activity in other areas. The US and Turkey were targeted in Dragonfly’s previous campaign as well, though the amount of activity has definitely spiked in Turkey this time around.

Map of Dragonfly 2.0 activity

The group’s MO is fairly straightforward—it’s not like it’s reinventing the wheel. The campaign kicked off in December of 2015 with an email phishing campaign disguised as an invitation to a New Year’s Party. From that point, the emails were disguised to look like energy sector, and general business-related emails. After the emails were opened, the attached document attempted to leak the victim’s network credentials to a third-party server.

The group also compromised a number of other websites that were likely to be visited by employees of targeted organizations to conduct watering hole attacks and gather network credentials.

Dragonfly is now using those credentials to attack those organizations, specifically to install backdoors that could give it remote access to compromised machines. Symantec now believes that Dragonfly’s earlier exploits were merely part of an exploratory phase.

What is clear is that Dragonfly is a highly experienced threat actor, capable of compromising numerous organizations, stealing information, and gaining access to key systems. What it plans to do with all this intelligence has yet to become clear, but its capabilities do extend to materially disrupting targeted organizations should it choose to do so.

So, think about that the next time your power goes out.

What We Hashed Out (For the Skimmers)

Here are the key points from today’s discussion:

  • Symantec has released a report that outlines a current threat to western power systems
  • The threat comes from a group called Dragonfly that has been operational since 2011
  • This is Dragonfly’s second campaign, it appears that the group is now beginning to attack using network credentials it has harvested over the past several years.
1 comment
  • There needs to be a joint effort by law enforcement in North America and Europe to track and identify the ring leaders and have them jailed for, oh lets say 20 years, for attempted mass murder.

Leave a Reply

Your email address will not be published. We will only use your email address to respond to your comment and/or notify you of responses. Required fields are marked *

Captcha *

Author

Patrick Nohe

Patrick started his career as a beat reporter and columnist for the Miami Herald before moving into the cybersecurity industry a few years ago. Patrick covers encryption, hashing, browser UI/UX and general cyber security in a way that’s relatable for everyone.