|  | 
| BlackEnergy Malware Targets Linux Systems and Cisco Routers | 
Cyberespionage Group, 
generally known for using the malware BlackEnergy for their cyber-crime 
activities has been compromising routers and Linux system based on ARM 
and MIPS architectures in addition to Windows Computers.
BlackEnergy was mainly developed by cybercriminals toperform DDos attacks. AV software vendor Kaspersky Lab reported the details of the modules which have been being used as plugins for this malicious malware.
The
 group behind these attacks target mainly high-profile private and 
government organizations such as municipal offices, federal emergency 
services, national 
standards bodies, banks, academic research institutions, property 
holdings and other organizations.The victims of these attacks belong to 
at least 20 countries. 
BlackEnergy plugins are 
available for both Windows and Linux systems. They mainly enhance the 
capabilities of the malware by offering some more additional features 
such as port scanning, password stealing, system information gathering, 
digital certificate theft, remote desktop connectivity and HDD wiping.
Different selections of plug-ins are deployed from command-and-control 
servers for every victim, depending on the group’s goals and the 
victim’s systems, the Kaspersky researchers said.
In one case, the attackers downloaded and executed one BlackEnergy plug-in called "dstr" to destroy data on the victim's windows machine.
Researcher said
By all appearances, the attacker pushed the "dstr" module when they understood that they were revealed, and wanted to hide their presence on machines. some machines already launched the plug-ins,lost their data and became unbootable
Another scene shows a 
organization who lost their data after installing the plug-in also could
 not access their Cisco router via telnet. When they investigated the 
matter they found several "farewell" scripts left for Kaspersky 
Researchers one of which named "Cisc0 API Tcl extension for B1ack En3rgy b0t" contained vulgar messages. Those scripts were used to delete the tracks of the attackers. 
Some
 days ago Industrial Control Systems Cyber Emergency Response Team 
(ICS-CERT), a division of the U.S. Department of Homeland Security said 
the same thing stating that many business organization who useed 
HMI(Human Machine Interface) products from products from General 
Electric, Siemens and BroadWin/Advantech got their systems infected with
 BlackEnergy. HMI are softwares which provide a GUI  for monitoring and 
interacting with industrial control systems. 
Alongside Kaspersky, 
security Firm iSight discovered a hacking campaign by this group, which 
they call the Sandworm Team, on Ukrainian Government and US Based 
Business organization. The group, suspected to be originating from 
Russia exploited a zero-day-vulnerability in Microsoft Windows.
Where as Kaspersky denies
 this Russia Fact as they say that the group recently launched a DDos 
attack against a IP address belonging to the Russian Ministry of 
Defense.   
  
 
No comments:
Post a Comment