Pharmaceuticals, Not Energy, May Have Been True Target Of Dragonfly, Energetic Bear

  /     /     /  
Publicated : 22/11/2024   Category : security


Pharmaceuticals, Not Energy, May Have Been True Target Of Dragonfly, Energetic Bear


New research says the compromised companies were suppliers for OEMs that served pharma and biotech.



One of the biggest attack campaigns against critical infrastructure since Stuxnet might not actually have been aimed at critical infrastructure. New research on the Dragonfly, a.k.a. Energetic Bear, attacks that were
first reported
by F-Secure in June poses the theory that the groups true target was the pharmaceutical and biotechnology industry, not the energy sector.
In a report released today by the signal transmission solution company Belden, Joel Langill, an industrial control systems security expert at RedHat Cyber, explains why he thinks Dragonfly was attacking small companies that supply original equipment manufacturers, which in turn supply the pharma-biotech sector.
Though pharma has not been called out as a target before, researchers had warned against assumptions that the bulls eye was on energy companies. As Dark Readings Kelly Jackson Higgins
reported in June
:
[Sean Sullivan, a security adviser at F-Secure]
worries that the conclusions have been pointing too quickly to an energy sector attack only. This is a very broad-based campaign to cripple adversaries, including via manufacturers that supply their armies with food and other crucial items.
[Read what
Symantec and F-Secure had to say
about Dragonfly/Energetic Bear and why
Kaspersky thinks its a yeti, not a bear
, on Dark Reading.]
Langills research is not focused on reverse engineering and dissecting the malware. Rather, it concentrated on executing the malicious code on systems that would reflect real-world ICS configurations. The impacts on various host and network devices in a typical ICS were then observed.
As Langill describes it, the group first used spear phishing to collect data about targets suppliers. They used that information to focus their efforts on localizing and exploiting companies that supply the target sector, by Trojanizing those companies software, compromising their websites content management systems, and allowing visitors to download those Trojanized applications -- which included industrial control systems utilities and drivers.
The report reveals the identities of three such companies: Mesa, a manufacturer of industrial cameras and related software; MB Connect Line, a supplier of remote maintenance solutions for production facilities and packaging machines; and eWon, a producer of industrial security appliances and portal software.
eWon offers solutions for programmable logic solutions suppliers, including Siemens, Rockwell Automation, Omron, Schneider Electric, Mitsubishi Electric, and Hitachi. Some of these vendors were also targeted by Dragonflys industrial protocol scanner module that searched for devices on ports 44818, 102, and 502. From the report:
Notice that these specific products and protocols are not ones that dominate the energy industry. Instead the products from eWON appear to be targeted at machine builders that provide original equipment manufacturer (OEM) solutions to sectors such as pharmaceutical and food and beverage.
The report also points out that eWon is part of the ACTL Group, which includes BiiON, an industrial system integrator for the pharmaceutical and biotechnology industries, and KEOS, an environmental monitoring system common in pharmaceutical and life science facilities.
MB Connect Line supplies machine suppliers that supply to pharmaceuticals companies, and Mesa produces applications for automated guided vehicles that are common in pharmaceutical facilities.
All three companies are quite small -- Langill estimates fewer than 50 employees at each -- and use open-source content management systems on the websites that were compromised. He concludes:
Logic would suggest it is much easier to compromise a small business web servers than it would be to perform a similar attack against much larger corporations. Bigger organizations typically invest heavily in security for their public-facing cyber assets and normally do not depend on open-source software for their website CMS.
Though Dragonfly is now inactive, there is another operation,
Epic Turla
, which is still going and exhibits many of the same characteristics as Dragonfly -- spear phishing, watering holes, exploits of open-source content management systems, and downloads of Trojanized trusted software. From the report:
It seems likely that the Dragonfly and Epic Turla campaigns are being run by the same masters for the same primary motive, namely industrial espionage against pharmaceutical companies. It also appears that the attackers are not just looking for the intellectual property associated with the product, but also information related to building facilities... The potential damage could include the theft of proprietary recipes and production batch sequence steps, as well as network and device information that indicate manufacturing plant volumes and capabilities.
Download the full report at
http://info.belden.com/a-cyber-security-dragonfly-bc-lp
(registration required).

Last News

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Pharmaceuticals, Not Energy, May Have Been True Target Of Dragonfly, Energetic Bear