Story image

ESET to take on Industroyer malware & 'post-truth plague' at Black Hat

13 Jul 2017

ESET is set to reveal the underside of the notorious Industroyer malware and the “post-truth plague” that muddies the waters of cybersecurity advice at the upcoming Black Hat information security conference in Las Vegas later this month.

The global security firm originally discovered Win32/Industroyer, a powerful malware that targets industrial control systems such as switches and circuit breakers.

The Industroyer malware is probably behind the December 2016 power outages in Ukraine, but so far this has not been confirmed by ESET researchers, but already this particular malware is much more powerful.

Researchers speculate that unlike the BlackEnergy and Killdisk malware that hit Ukraine in 2015, the Industroyer malware is much more advanced as it directly targeted switches and circuit breakers.

Anton Cherepanov, ESET senior malware researcher, says that the malware creators display highly specialised knowledge and could not have been made by amateurs.

“These switches and circuit breakers are digital equivalents of analogue switches; technically they can be engineered to perform various functions. Thus, the potential impact may range from simply turning off power distribution, to cascading failures and more serious damage to equipment,” he states in a blog post.

In a further research report, he says that, “It seems very unlikely anyone could write and test such malware without access to the specialized equipment used in the specific, targeted industrial environment”.

Cherepanov’s talk at Black Hat will also feature fellow ESET senior malware researcher Robert Lipovsky, Dragos senior threat analyst Joe Slowik, Dragos threat operations center director Ben Miller and Dragos CEO Robert Lee.

ESET will also host a session on evaluating ‘bold claims’ from security vendors that are a little too eager to capitalise on the burgeoning cybersecurity industry as it explodes.

With widely-publicised attacks such as WannaCry, NotPetya and nation-state hacking dominating the threat space, ESET says businesses and consumers need to know how to take action to protect themselves.

That may be easier said than done, with myths and marketing surrounding cybersecurity products at every turn.

“Is it really possible to defend networks with 'machine learning' and 'artificial intelligence' alone? Why can't we always stop new threats? Is there still honesty in the cyber-security industry,” the company puts forth.

At the Black Hat event, ESET CTO Juraj Malcho will talk about what he calls the ‘post-truth plague’ that confuses businesses and consumers alike, and ultimately how it does more harm than good.

Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
The impact of bringing biometrics to the door
"Despite the benefits of biometrics, there have been impediments to its broader enterprise adoption."