Ukraine Blackout – The Future Of War

For a look at how cyber will play into armed conflict, look at the Dec. 23 attack on the Ukrainian energy sector. This was no simple hack involving celebrity emails or embarrassing personal information, but a highly coordinated and complex cyber-physical assault that knocked out power to more than 225,000 people, in a war-torn country, in the dead of winter.

Recently, the head of Southern Company, one of America’s larger regional electricity producers, said that the United States was well protected against a similar attack. But that doesn’t mean that a repeat, or a similar event, couldn’t trigger a larger conflict even if it doesn’t shut off the lights.

Cyber security researchers have pointed the finger at pro-Russian hacktivist groups. US-based iSight Partners specifically accused the Moscow-based Sandworm. But a wide variety of pro-Russian groups are working against Ukraine and Western forces; one is Cyberberkut, which has taken credit for attacks on German media and NATO sites.

So how do these groups operate? History suggests: with stealth and subtlety.  Remember 2014, when masked gunmen, not officially affiliated with any larger nation-state, began waging war in Eastern Ukraine? The so-called “green men” completed their invasion before anyone was able to figure out that they were, in fact, invading.

The specific culprit in the Ukraine blackout is almost less important than the broader trend: the rise of cyber militias that work on behalf of state interests but whose veneer of independence gives governments plausible deniability.

Tom Kellermann, the CEO of Strategic Cyber Ventures, put it this way at the recent Suits and Spooks conference in Washington, DC. “There’s a cult of personality, particularly in the East. The greatest hackers in the world, the Russian-speaking blackhat community in the former Soviet bloc, are beholden to that cult of personality. They’re beholden to that cult of personality for a number of reasons. They’ve been allowed to act with impunity when hacking the US financial sector for more than 17 years in exchange for paying tribute or homage to the regime. The examples are Estonia, South Ossetia, and now Ukraine.”

But to read the way US outlets covered the Ukrainian outage, you might think that the cyber attack and the blackout occurred almost randomly. In fact, utilities and central services have emerged as a new front in the war in the Eastern part of the country. Less than a month before the Ukrainian energy outage, one occurred on the disputed Crimea peninsula. Ukrainian police blamed saboteurs.

Russian President Vladimir Putin reportedly reacted by promising to construct power lines into the region; Russian newspapers have reported that German company Siemens has a contract with the Russian government to build gas turbine powered-plants in the Crimean cities of Sevastopol and Simferopol. Siemens reportedly refuted the claims, as building the plants would be a violation of international sanctions). Not long after that denial, Siemens became one of the key targets in the Ukraine blackout.  

The primary piece of software implicated in the attack was called BlackEnergy, according to DHS’s recently released report on the incident. It’s less of a weapon than a vehicle carrying a weapon.

The BlackEnergy malware was reportedly delivered via spear phishing emails with malicious Microsoft Office attachments. It is suspected that BlackEnergy may have been used as an initial access vector to acquire legitimate credentials, the report said.

BlackEnergy is still around in 2016 because it has a modular architecture, allowing people to write different plug-ins. By itself, it’s not the sort of software that could take down a power station. Rather, it would work in concert with an add-on, a very specifically designed package; in this case, one designed to attack the control equipment of the targeted Siemens power plants.

Still, recent attacks against US power entities are even more sophisticated than the one against Ukraine. Fanning pointed to a March 2015 attack on a Pacific Gas and Electric substation. The assailants broke into the station physically and then disabled the supervisory control and data acquisition, or SCADA system, before trying to damage other things.

The use of a self-destruct booby trap is the difference between an act of espionage—something that virtually every nation engages in—and an act of serious consequence, possibly requiring international sanctions or a response from US Cyber Command.

Think back to the Sony hack: the attackers not only took data but also destroyed it. “This is why I think many of us worry about Sony, the destructive nature of it. It wasn’t just the fun and games of, you know, what rich Hollywood executives were saying about rich Hollywood starlets, right?” Mike Rogers, the Michigan Republican who used to chair the House Intelligence Committee, said last year. “…That is equally possible in our electric grid.”

If lawmakers decide that the use of software like KillDisk is tantamount to an act of war that could put the military in a difficult position. Adm. Michael Rogers, the head of Cyber Command has said that offensive cyber weapons would be used proportionally and in line with the rules of conflict.

DefenseOne:      The Conversation

« Now Surveillance 'aggressive-invasive': Snowden
Google's AI Wins Final Go Challenge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.