2015 Ukraine Electric Power Attack was a Sandworm Team campaign during which they used BlackEnergy (specifically BlackEnergy3) and KillDisk to target and disrupt transmission and distribution substations within the Ukrainian power grid. This campaign was the first major public attack conducted against the Ukrainian power grid by Sandworm Team.
| ID | Name | Description |
|---|---|---|
| G0034 | Sandworm Team |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1112 | 修改注册表 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry Internet settings to lower internet security before launching |
|
| Enterprise | T1136 | .002 | 创建账户: Domain Account |
During the 2015 Ukraine Electric Power Attack, Sandworm Team created privileged domain accounts to be used for further exploitation and lateral movement. [1] |
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic |
During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a VBA script called |
| Enterprise | T1133 | 外部远程服务 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a modified Dropbear SSH client as the backdoor to target systems. [1] |
|
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry internet settings to lower internet security. [1] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests. [1] |
| Enterprise | T1078 | 有效账户 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. [4] |
|
| Enterprise | T1570 | 横向工具传输 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team moved their tools laterally within the corporate network and between the ICS and corporate network. [1] |
|
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
During the 2015 Ukraine Electric Power Attack, Sandworm Team leveraged Microsoft Office attachments which contained malicious macros that were automatically executed once the user permitted them. [4] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used a backdoor which could execute a supplied DLL using |
| Enterprise | T1040 | 网络嗅探 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy’s network sniffer module to discover user credentials being sent over the network between the local LAN and the power grid’s industrial control systems. [5] |
|
| Enterprise | T1105 | 输入工具传输 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data. [1] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
During the 2015 Ukraine Electric Power Attack, Sandworm Team gathered account credentials via a BlackEnergy keylogger plugin. [1][4] |
| Enterprise | T1055 | 进程注入 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team loaded BlackEnergy into svchost.exe, which then launched iexplore.exe for their C2. [1] |
|
| Enterprise | T1018 | 远程系统发现 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets. [5] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
During the 2015 Ukraine Electric Power Attack, Sandworm Team obtained their initial foothold into many IT systems using Microsoft Office attachments delivered through phishing emails. [4] |
| ICS | T0803 | Block Command Message |
During the 2015 Ukraine Electric Power Attack, Sandworm Team blocked command messages by using malicious firmware to render serial-to-ethernet converters inoperable. [4] |
|
| ICS | T0804 | Block Reporting Message |
During the 2015 Ukraine Electric Power Attack, Sandworm Team blocked reporting messages by using malicious firmware to render serial-to-ethernet converters inoperable. [4] |
|
| ICS | T0805 | Block Serial COM |
During the 2015 Ukraine Electric Power Attack, Sandworm Team overwrote the serial-to-ethernet converter firmware, rendering the devices not operational. This meant that communication to the downstream serial devices was either not possible or more difficult. [1] |
|
| ICS | T0885 | Commonly Used Port |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used port 443 to communicate with their C2 servers. [1] |
|
| ICS | T0884 | Connection Proxy |
During the 2015 Ukraine Electric Power Attack, Sandworm Team established an internal proxy prior to the installation of backdoors within the network. [1] |
|
| ICS | T0813 | Denial of Control |
During the 2015 Ukraine Electric Power Attack, KillDisk rendered devices that were necessary for remote recovery unusable, including at least one RTU. Additionally, Sandworm Team overwrote the firmware for serial-to-ethernet converters, denying operators control of the downstream devices. [1][4] |
|
| ICS | T0814 | Denial of Service |
During the 2015 Ukraine Electric Power Attack, power company phone line operators were hit with a denial of service attack so that they couldn’t field customers’ calls about outages. Operators were also denied service to their downstream devices when their serial-to-ethernet converters had their firmware overwritten, which bricked the devices. [4] |
|
| ICS | T0816 | Device Restart/Shutdown |
During the 2015 Ukraine Electric Power Attack, Sandworm Team scheduled the uninterruptable power supplies (UPS) to shutdown data and telephone servers via the UPS management interface. [4][1] |
|
| ICS | T0822 | External Remote Services |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used Valid Accounts taken from the Windows Domain Controller to access the control system Virtual Private Network (VPN) used by grid operators. [1] |
|
| ICS | T0823 | Graphical User Interface |
During the 2015 Ukraine Electric Power Attack, Sandworm Team utilized HMI GUIs in the SCADA environment to open breakers. [4] |
|
| ICS | T0867 | Lateral Tool Transfer |
During the 2015 Ukraine Electric Power Attack, Sandworm Team moved their tools laterally within the ICS network. [1] |
|
| ICS | T0826 | Loss of Availability |
During the 2015 Ukraine Electric Power Attack, Sandworm Team opened the breakers at the infected sites, shutting the power off for thousands of businesses and households for around 6 hours. [4][1] |
|
| ICS | T0827 | Loss of Control |
During the 2015 Ukraine Electric Power Attack, operators were shut out of their equipment either through the denial of peripheral use or the degradation of equipment. Operators were therefore unable to recover from the incident through their traditional means. Much of the power was restored manually. [4] |
|
| ICS | T0828 | Loss of Productivity and Revenue |
During the 2015 Ukraine Electric Power Attack, power breakers were opened which caused the operating companies to be unable to deliver power, and left thousands of businesses and households without power for around 6 hours. [4][1] |
|
| ICS | T0831 | Manipulation of Control |
During the 2015 Ukraine Electric Power Attack, Sandworm Team opened live breakers via remote commands to the HMI, causing blackouts. [4] |
|
| ICS | T0886 | Remote Services |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used an IT helpdesk software to move the mouse on ICS control devices to maliciously release electricity breakers. [2] |
|
| ICS | T0846 | Remote System Discovery |
During the 2015 Ukraine Electric Power Attack, Sandworm Team remotely discovered operational assets once on the OT network. [5] [1] |
|
| ICS | T0857 | System Firmware |
During the 2015 Ukraine Electric Power Attack, Sandworm Team overwrote the serial-to-ethernet gateways with custom firmware to make systems either disabled, shutdown, and/or unrecoverable. [4] |
|
| ICS | T0855 | Unauthorized Command Message |
During the 2015 Ukraine Electric Power Attack, Sandworm Team issued unauthorized commands to substation breaks after gaining control of operator workstations and accessing a distribution management system (DMS) application. [4] |
|
| ICS | T0859 | Valid Accounts |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used valid accounts to laterally move through VPN connections and dual-homed systems. Sandworm Team used the credentials of valid accounts to interact with client applications and access employee workstations hosting HMI applications. [4][1] |
|