MIT Technology Review Subscribe

A Hack Used to Plunge Ukraine Into Darkness Could Still Do Way More Damage

Eight years after Stuxnet, hackers are testing another piece of malware designed to take down critical infrastructure.

Late last year, a cyberattack on Ukraine’s power grid plunged 20 percent of the nation’s capital, Kiev, into darkness. Now security researchers have published details of the malware that they believe may have been used to make that happen.

While the cybersecurity firm ESET won’t say that the piece of malware it calls Industroyer is definitely the software that was used to take down Ukraine’s power, it sure looks like the number one suspect: it’s designed to infiltrate a system and then control electricity substation switches and circuit breakers. 

Advertisement

It’s unclear how Industroyer finds its way on to infrastructure computers, but once there it scans the network to find hardware that it can take down. It also reports to its master rather cleverly, sending information to control servers that are hidden using the identify obfuscator known as Tor, and then only communicating outside of regular working hours.

This story is only available to subscribers.

Don’t settle for half the story.
Get paywall-free access to technology news for the here and now.

Subscribe now Already a subscriber? Sign in
You’ve read all your free stories.

MIT Technology Review provides an intelligent and independent filter for the flood of information about technology.

Subscribe now Already a subscriber? Sign in

Because the commands it leverages were developed decades ago, they were designed to work on computers that sat in isolation. They were never intended for use in a networked world where hackers could inject malware from a distance, so gaining access to the system makes an awful lot possible—and Wired describes in some detail how some of the potential attacks could work.

Perhaps the most worrying part of the research is the potential capability of the malware in the future. The commands it uses to switch off substations are actually used inside all kinds of infrastructure—not just electricity supply networks but traffic control systems, waterworks, and more—and ESET warns that the code could be repurposed to perform attacks on those kinds of systems, too.

That’s why, in an article describing the malware, ESET’s senior malware researcher, Anton Cherepanov, calls Industroyer the “biggest threat to industrial control systems since Stuxnet.” That piece of malware, you may recall, was famously used to sabotage an Iranian nuclear power plant back in 2009.

The bad news is that these kinds of problems look set to become more widespread. As aging energy systems are connected up to the Internet in a bid to modernize, they are becomingly newly vulnerable in much the same way as Kiev’s grid. The good news, though, as we recently reported, is that many companies are building new technologies to help overcome these problems. Hopefully, they’ll do that rather quickly.

(Read more: ESET, Wired, “Ukraine’s Power Grid Gets Hacked Again, a Worrying Sign for Infrastructure Attacks,” “A Way to Attack Nuclear Plants,” “Patching the Electric Grid”)

This is your last free story.
Sign in Subscribe now

Your daily newsletter about what’s up in emerging technology from MIT Technology Review.

Please, enter a valid email.
Privacy Policy
Submitting...
There was an error submitting the request.
Thanks for signing up!

Our most popular stories

Advertisement