Original Release Date: 1/7/2016
TLP: WHITE
Intelligence agencies and cybersecurity researchers are investigating a power outage that occurred in Western Ukraine on December 23, specifically whether or not malware discovered on the targeted utility’s network played a direct role in impacting the electric grid. If malware is confirmed to have caused the outage, as opposed to human error or equipment failure, this would mark the first documented power disruption resulting from a cyber attack. While attribution, motive, and technical details of this incident remain unclear, Ukraine’s intelligence service was quick to publicly blame the Kremlin, and ongoing tensions with Russia further speculation of state-sponsorship. International media sources have identified the malware as BlackEnergy, a trojan previously discovered on critical infrastructure systems throughout the United States and linked to an advanced persistent threat (APT) group known as Sandworm, widely reported as a Moscow-backed actor. Though this incident was likely targeted, posing no direct threat to US infrastructure, it underscores the susceptibility of industrial control systems (ICS) that distribute critical resources such as energy, water, transportation, and communications. Moreover, it demonstrates the willingness of sophisticated threat actors, whether state-sponsored or inspired, to conduct attacks which can impose significant consequences on civilian populations, as well as governments.
The NJCCIC advises all New Jersey critical infrastructure asset owners and operators to implement defense-in-depth strategies as outlined by ICS-CERT, which provides detailed best practices for securing ICS networks, including, but not limited to: Seven Steps to Effectively Defend ICS, Improving ICS Cybersecurity, Guide for Firewall Deployment, Patch Management for Control Systems, and Developing an Incident Response Capability.
Traffic Light Protocol: WHITE information may be distributed without restriction.