AGL 40.74 Increased By ▲ 0.71 (1.77%)
AIRLINK 128.34 Increased By ▲ 0.64 (0.5%)
BOP 6.68 Increased By ▲ 0.07 (1.06%)
CNERGY 4.54 Decreased By ▼ -0.06 (-1.3%)
DCL 9.18 Increased By ▲ 0.39 (4.44%)
DFML 41.70 Increased By ▲ 0.12 (0.29%)
DGKC 87.00 Increased By ▲ 1.21 (1.41%)
FCCL 32.68 Increased By ▲ 0.19 (0.58%)
FFBL 64.56 Increased By ▲ 0.53 (0.83%)
FFL 11.61 Increased By ▲ 1.06 (10.05%)
HUBC 112.49 Increased By ▲ 1.72 (1.55%)
HUMNL 14.95 Decreased By ▼ -0.12 (-0.8%)
KEL 5.03 Increased By ▲ 0.15 (3.07%)
KOSM 7.30 Decreased By ▼ -0.15 (-2.01%)
MLCF 40.70 Increased By ▲ 0.18 (0.44%)
NBP 61.60 Increased By ▲ 0.55 (0.9%)
OGDC 196.50 Increased By ▲ 1.63 (0.84%)
PAEL 27.56 Increased By ▲ 0.05 (0.18%)
PIBTL 7.71 Decreased By ▼ -0.10 (-1.28%)
PPL 154.20 Increased By ▲ 1.67 (1.09%)
PRL 26.87 Increased By ▲ 0.29 (1.09%)
PTC 16.40 Increased By ▲ 0.14 (0.86%)
SEARL 83.88 Decreased By ▼ -0.26 (-0.31%)
TELE 7.84 Decreased By ▼ -0.12 (-1.51%)
TOMCL 36.45 Decreased By ▼ -0.15 (-0.41%)
TPLP 8.93 Increased By ▲ 0.27 (3.12%)
TREET 17.10 Decreased By ▼ -0.56 (-3.17%)
TRG 59.20 Increased By ▲ 0.58 (0.99%)
UNITY 27.90 Increased By ▲ 1.04 (3.87%)
WTL 1.33 Decreased By ▼ -0.05 (-3.62%)
BR100 10,000 No Change 0 (0%)
BR30 31,002 No Change 0 (0%)
KSE100 94,960 Increased By 768 (0.82%)
KSE30 29,500 Increased By 298.4 (1.02%)

imageWASHINGTON: Cyberattackers, probably state sponsored, have been targeting energy operations in the United States and Europe since 2011 and were capable of causing significant damage, security researchers said Monday.

The US security firm Symantec said it identified malware targeting industrial control systems which could sabotage electric grids, power generators and pipelines.

"The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes," Symantec said in a blog post.

"If they had used the sabotage capabilities open to them, (they) could have caused damage or disruption to energy supplies in affected countries," it added.

The researchers said this malware is similar to Stuxnet, a virus believed to have been developed by the United States or Israel to contain threats from Iran.

"Dragonfly bears the hallmarks of a state-sponsored operation, displaying a high degree of technical capability," Symantec said.

"Its current main motive appears to be cyberespionage, with potential for sabotage a definite secondary capability."

Symantec said the Dragonfly, also known as Energetic Bear, appeared to be an operation based in Eastern Europe based on the hours of activity of those involved.

It said one of the tools was a Trojan that appeared to have originated in Russia.

Officials in the US and elsewhere in recent months have expressed growing concerns about cyberattacks which could cripple critical infrastructure systems such as power grids, dams or transportation systems.

The Dragonfly group has used several infection tactics including spam email with malicious attachments, and browser tools which can install malware.

Once installed on a victim's computer, the malware gathers system information and can extract data from the computer's address book and other directories.

"The Dragonfly group is technically adept and able to think strategically," Symantec said.

"Given the size of some of its targets, the group found a 'soft underbelly' by compromising their suppliers, which are invariably smaller, less protected companies."

Symantec said it had notified victims of the attacks as well as relevant national authorities, such as the US Computer Emergency Response Team.

The affected companies were not named, but Symantec said targets of Dragonfly included energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers.

Most targets were located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.

Comments

Comments are closed.