{"id":5091,"date":"2016-01-28T12:48:38","date_gmt":"2016-01-28T12:48:38","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5091"},"modified":"2020-12-17T11:44:33","modified_gmt":"2020-12-17T16:44:33","slug":"black-energy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/black-energy\/5091\/","title":{"rendered":"Black Energy: The Committed Destructors Strike Again"},"content":{"rendered":"<h2>More Than Espionage<\/h2>\n<p>The majority of targeted attacks hitting businesses nowadays are conducted with cyberespionage in mind, harvesting precious business secrets or confidential personal data. But from time to time attackers get up to something completely different \u2013 like sabotage.\u00a0 This mode of attack is especially alarming because IT departments tend to focus on data loss\/leaks, leaving them unprepared for the cyberattack-induced disruption of their whole business process, involving many different systems. Sometimes even physical consequences can result \u2013 particularly if the targeted business makes extensive use of ICS\/SCADA which can be reached (a dangerous design flaw!) through general purpose networks.<\/p>\n<h2>Damage Incorporated<\/h2>\n<p>The<strong> BlackEnergy <\/strong>targeted attack group is a threat actor with a taste for destruction. The group has been around for some time, making a name for itself in the late 2000s with extensive <a href=\"https:\/\/securelist.com\/analysis\/publications\/36309\/black-ddos\/\" target=\"_blank\" rel=\"noopener\">DDoS attacks<\/a> conducted using its namesake Trojan. Since 2014, it has attracted special attention by showing an interest in ICS\/SCADA users and producers worldwide. The group\u2019s tools and operations demonstrate their considerable skills, well above those of the average DDoS botnet masters, as well as their cyberespionage and sabotage performance capabilities.<\/p>\n<p>Ukrainian companies have long been among their preferred targets; particularly ICS\/SCADA companies, energy suppliers, and also the media. As though deliberately working against the tide; rather than favoring Java and Adobe Flash exploits like most of today\u2019s attackers, the attackers prefer to deliver their infections into the confines of the targets\u2019 defensive perimeter using Microsoft Office files.<\/p>\n<p>A typical specimen of their .docx lure, for example, referred to a popular news topic \u2013 \u00a0the \u2018Pravii Sektor\u2019 (the Right Sector) political party \u2013 and appeared to be targeting a specific TV\/media company.<\/p>\n<p>The file contained an embedded macro, which puts together and runs a typical BlackEnergy dropper. To successfully execute this script in the files, the macros execution in MS Word must be enabled. So once the file was clicked on, a Microsoft Word dialogue prompted the user to enable macros in order to open it. This, the dialog stated, was because the file had been created using a later version of MS Office. This makes for a particularly successful lure in geographic regions where adoption rates for the latest software versions are low.<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-5093 aligncenter\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/01\/06020428\/2.png\" alt=\"2\" width=\"1000\" height=\"798\"><\/p>\n<p>After successful execution, the dropper would unpack the final payload, which was launched and set for autorun.<\/p>\n<p>At this stage, after receiving commands from the Command &amp; Control server, the main module, serving mostly as a downloader, would start downloading the appropriate auxiliary modules, capable of searching and syphoning off data and\/or wreaking havoc within the target\u2019s infrastructure.<\/p>\n<p>One of BlackEnergy\u2019s most popular methods of inflicting damage is extensive data wiping. For this, they have added to their arsenal a new wiper \u2013 much more advanced than their previous disk level model \u2013 which can selectively wipe different types of data without needing administrative privileges.<\/p>\n<h2>Say \u2018No\u2019 to Destruction!<\/h2>\n<p>The malware used by BlackEnergy seems particularly well-tested against their targets\u2019 security systems, so their operations have a relatively high success rate. Hence the necessity to be especially thorough yourself when building \u2013 or adjusting \u2013 your IT security Strategy.<\/p>\n<p>Clearly, employing a standard anti-malware solution is not enough. To significantly reduce the risk of serious damage to your business, you must implement a multi-layered system. The well-known <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/strategies-for-mitigating-advanced-persistent-threats-apts\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">Mitigation Strategies<\/a> Rankings issued by the Australian Signal Directorate (ASD) specifically state that a complex approach is needed. Such an approach would combine administrative, OS and network-based measures \u2013 as well as specialized technological measures addressing individual layers of your IT infrastructure.<\/p>\n<p>And, of course, with a serious adversary like BlackEnergy, you need to leverage leading-edge technologies backed by proven Security Intelligence. Kaspersky Lab\u2019s portfolio of solutions helps implement 19 of the 35 Mitigation Strategies suggested by the ASD. And the majority of these can be covered by one feature-rich product \u2013 <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business Advanced<\/a>.<\/p>\n<p>This security platform provides not only a web of pioneering detection technologies \u2013 but also additional security layers, including Security Controls and Vulnerability Assessment\/Patch Management. <a href=\"https:\/\/securelist.com\/analysis\/publications\/36746\/application-control-the-key-to-a-secure-network-part-1\/\" target=\"_blank\" rel=\"noopener\">Application Control<\/a> features, powered by our cloud-based dynamic allowlists and supporting a Default Deny scenario, are particularly applicable to the industrial sector, preventing the launch of untrusted applications (including malware) while leaving the working environment unchanged. Such controls are listed, along with Vulnerability\/Patch Management, as among the Top 4 Mitigation Strategies responsible for prevention of 85% of Incidents connected with Targeted Attacks.<\/p>\n<p>Given the BlackEnergy\u2019s habit of using email-based spear-phishing, deployment of <a href=\"https:\/\/www.kaspersky.com\/business-security\/mail-server\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mail Server<\/a> would create an additional powerful barrier to infection. And educating your staff, through <a href=\"https:\/\/www.kaspersky.com\/business-security\/entrp\/solutions\/security-intelligence-services\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Cybersecurity Awareness training<\/a>, not to open every interesting-looking document they receive, can protect against a vast number of threats, as well as those posed by those committed destructors.<\/p>\n<p>While the attackers may be inventive and highly experienced, planning your IT security Strategy proactively\u00a0 can clearly give you the upper hand against them \u2013 with the help of ever-inventive cybersecurity pioneers: Kaspersky Lab.<\/p>\n<p>If you want to know more about BlackEnergy, read <a href=\"https:\/\/securelist.com\/blog\/research\/73440\/blackenergy-apt-attacks-in-ukraine-employ-spearphishing-with-word-documents\/\" target=\"_blank\" rel=\"noopener\">this article on SecureList<\/a>!<\/p>\n<p>Kaspersky Lab\u2019s products detect BlackEnergy components under the following verdicts:<\/p>\n<ul>\n<li>Backdoor.Win32.Blakken<\/li>\n<li>Backdoor.Win64.Blakken<\/li>\n<li>Backdoor.Win32.Fonten<\/li>\n<li>Heur:Trojan.Win32.Generic<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The majority of targeted attacks hitting businesses nowadays are conducted with cyberespionage in mind, harvesting precious business secrets or confidential personal data. But from time to time attackers get up to something completely different \u2013 like sabotage. <\/p>\n","protected":false},"author":610,"featured_media":15484,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[101,2384,2385],"class_list":{"0":"post-5091","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-application-control","10":"tag-blackenergy","11":"tag-microsoft-office"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/black-energy\/5091\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/black-energy\/10363\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/black-energy\/5091\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/black-energy\/5091\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/application-control\/","name":"application control"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5091"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5091\/revisions"}],"predecessor-version":[{"id":38115,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5091\/revisions\/38115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15484"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}