The 2022 Ukraine Electric Power Attack was a Sandworm Team campaign that used a combination of GOGETTER, Neo-REGEORG, CaddyWiper, and living of the land (LotL) techniques to gain access to a Ukrainian electric utility to send unauthorized commands from their SCADA system.[1][2]
| ID | Name | Description |
|---|---|---|
| G0034 | Sandworm Team |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Systemd service units to masquerade GOGETTER malware as legitimate or seemingly legitimate services.[1] |
| Enterprise | T1543 | .002 | 创建或修改系统进程: Systemd Service |
During the 2022 Ukraine Electric Power Attack, Sandworm Team configured Systemd to maintain persistence of GOGETTER, specifying the |
| Enterprise | T1572 | 协议隧道 |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the GOGETTER tunneler software to establish a "Yamux" TLS-based C2 channel with an external server(s).[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
During the 2022 Ukraine Electric Power Attack, Sandworm Team utilized a PowerShell utility called TANKTRAP to spread and launch a wiper using Windows Group Policy.[1] |
| Enterprise | T1484 | .001 | 域或租户策略修改: Group Policy Modification |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Group Policy Objects (GPOs) to deploy and execute malware.[1] |
| Enterprise | T1485 | 数据销毁 |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed CaddyWiper on the victim’s IT environment systems to wipe files related to the OT capabilities, along with mapped drives, and physical drive partitions.[1] |
|
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the Neo-REGEORG webshell on an internet-facing server.[1] |
| Enterprise | T1570 | 横向工具传输 |
During the 2022 Ukraine Electric Power Attack, Sandworm Team used a Group Policy Object (GPO) to copy CaddyWiper's executable |
|
| Enterprise | T1095 | 非应用层协议 |
During the 2022 Ukraine Electric Power Attack, Sandworm Team proxied C2 communications within a TLS-based tunnel.[1] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Scheduled Tasks through a Group Policy Object (GPO) to execute CaddyWiper at a predetermined time.[1] |
| ICS | T0895 | Autorun Image |
During the 2022 Ukraine Electric Power Attack, Sandworm Team used existing hypervisor access to map an ISO image named |
|
| ICS | T0807 | Command-Line Interface |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged the SCIL-API on the MicroSCADA platform to execute commands through the |
|
| ICS | T0853 | Scripting |
During the 2022 Ukraine Electric Power Attack, Sandworm Team utilizes a Visual Basic script |
|
| ICS | T0894 | System Binary Proxy Execution |
During the 2022 Ukraine Electric Power Attack, Sandworm Team executed a MicroSCADA application binary |
|
| ICS | T0855 | Unauthorized Command Message |
During the 2022 Ukraine Electric Power Attack, Sandworm Team used the MicroSCADA SCIL-API to specify a set of SCADA instructions, including the sending of unauthorized commands to substation devices.[1] |
|
| ID | Name | Description |
|---|---|---|
| S0693 | CaddyWiper |