Главная
Study mode:
on
1
Introduction
2
Indicators of Compromise
3
Pyramid of Pain
4
Tools Used
5
The Incident
6
Why
7
ICS
8
HMI
9
Tools
10
KillDisk
11
IP Address
12
Proxy Server
13
ICS Kill Chain
14
Stage 1 Microsoft Office
15
Stage 2 Spearfishing
16
BlackEnergy Installer
17
Driver
18
Main DLL
19
Stealing Files
20
Firmware Development
21
Attack
22
Sandworm
23
Why Ukraine
24
Timeline
25
Similarities
26
How can we solve that
27
Other vectors
28
The sleeper must awaken
29
Another pyramid
30
Power Grid Policies
31
Security Gap
32
Summary
33
Questions
Description:
Explore a comprehensive threat intelligence analysis of the Ukrainian power grid hack in this 43-minute conference talk from BSides Philly 2016. Delve into the Indicators of Compromise, Pyramid of Pain, and tools used in the incident. Examine the ICS Kill Chain, including stages involving Microsoft Office, spearphishing, and the BlackEnergy installer. Investigate the attacker's techniques for stealing files and firmware development. Learn about the Sandworm group, their motivations for targeting Ukraine, and the attack timeline. Discuss similarities with other attacks, potential solutions, and alternative attack vectors. Analyze power grid policies, security gaps, and strategies for improving critical infrastructure protection. Gain valuable insights into cyber threats targeting industrial control systems and the complexities of defending against sophisticated adversaries.

Threat Intel Analysis of Ukrainians Power Grid Hack

Add to list
0:00 / 0:00