September 7, 2017 By Mark Samuels 2 min read

A group of cybercriminals is targeting energy facilities in Europe and North America as part of a fresh wave of cybersecurity attacks that could lead to the disruption or sabotage of operational systems.

Though the group — called “Dragonfly” — has been at work since 2011, it became quiet after its operations were exposed by researchers in 2014. However, a new report by security specialist Symantec suggested the group has been active again since 2015 and has increased its operations through 2017.

The report presented more evidence of the threat facing executives who run critical infrastructure, such as energy facilities. IT managers in these organizations should take note of the risks highlighted by Symantec and look to reduce the threat through security best practices.

What Is Dragonfly?

According to SecurityWeek, the Dragonfly group is also known as Energetic Bear, Crouching Yeti and Iron Liberty. During its two-year lull, the group did not stop operations and instead worked to update its activities, according to Bleeping Computer.

In a blog post detailing its new analysis, Symantec suggested the group now aims to sabotage or gain control of operational systems in energy facilities. The researchers noted a distinct increase in activity through 2017 and suggested Dragonfly launched attacks in the U.S., Turkey and Switzerland. Symanetc also detected signs of action outside these nations.

Dissecting Dragonfly’s Techniques

The first activity of the renewed campaign, referred to as “Dragonfly 2.0,” came in the form of a malicious email campaign to the energy sector through December 2015. According to Symanetc, Dragonfly 2.0 relies on a range of other attack vectors, including watering hole attacks used to harvest network credentials and Trojanized software.

The attackers often use widely available malware via administration tools such as PowerShell, PsExec and BITSAdmin. Symantec suggested this use of standard malware might be part of a strategy to mask the group’s identity. The attackers typically install backdoors onto a victim’s computer to provide remote access to systems.

Researchers suggested the most concerning evidence centers on screen captures. Some of these captures included sensitive details such as the location of the infected machine and the name of the host organization. Many of these descriptions included the string cntrl, which is a potential indication that these machines have operational system access.

Symantec reported the amount of conflicting evidence about Dragonfly activities makes it difficult to state the origins of the group and the individuals involved. However, the firm referred to Dragonfly as a highly experienced threat actor with the capability to materially disrupt utility organizations. The long-term plans of the group remain uncertain.

Protecting the Energy Sector From Cybersecurity Attacks

An increasing number of experts recognize that energy and utilities organizations worldwide are focusing on cybersecurity attacks. The FBI and Department of Homeland Security issued a joint report earlier this year warning about the risk to nuclear power stations and other energy facilities, The New York Times reported.

Last month, the National Infrastructure Advisory Council (NIAC) published a draft report detailing the complex risks associated with critical infrastructure sectors. NIAC made 11 specific recommendations, including the establishment of specific network paths and reserved spectrum for backup communications during emergencies.

News of this ever-increasing threat represents a significant warning signal to executives running utility facilities and other elements of critical infrastructure. The Symantec researchers ended their report with several security recommendations, such as using strong passwords, implementing multiple protection systems and establishing an enforceable security policy with an emphasis on employee education programs.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today