Tag: ukraine

  • VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

    At VB2017 in Madrid, ESET researchers Anton Cherepanov and Robert Lipovsky presented a last-minute paper on Industroyer, a malware framework that was responsible for the December 2016 blackout in Ukraine. The attack was perhaps less noteworthy for what it achieved (a relatively short blackout) than for the potential it signalled. Such was the premise of…

  • VB2018 paper: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

    At VB2017 in Madrid, ESET researchers Anton Cherepanov and Robert Lipovsky presented a last-minute paper on Industroyer, a malware framework that was responsible for the December 2016 blackout in Ukraine. The attack was perhaps less noteworthy for what it achieved (a relatively short blackout) than for the potential it signalled. Such was the premise of…

  • VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

    One of the many highlights of last year’s Virus Bulletin Conference was a last-minute paper by ESET researchers Anton Cherepanov and Robert Lipovsky on Industroyer, ‘the first ever malware specifically designed to attack power grids’ and which was behind a December 2016 blackout in Ukraine. This year, the VB2018 conference programme includes a paper by…

  • VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

    One of the many highlights of last year’s Virus Bulletin Conference was a last-minute paper by ESET researchers Anton Cherepanov and Robert Lipovsky on Industroyer, ‘the first ever malware specifically designed to attack power grids’ and which was behind a December 2016 blackout in Ukraine. This year, the VB2018 conference programme includes a paper by…

  • VB2017 videos on attacks against Ukraine

    (In)security is a global problem that affects every country in the world, but in recent years, none has been as badly hit as Ukraine. The most well known malware that affected the country is (Not)Petya, a ransomware/wiper threat that had global impact (it cost shipping firm Maersk alone $300m in lost revenues ), but which…

  • VB2017 videos on attacks against Ukraine

    (In)security is a global problem that affects every country in the world, but in recent years, none has been as badly hit as Ukraine. The most well known malware that affected the country is (Not)Petya, a ransomware/wiper threat that had global impact (it cost shipping firm Maersk alone $300m in lost revenues ), but which…

  • VB2017: nine last-minute papers announced

    At Virus Bulletin we try not to follow the daily security hype, focusing instead on the bigger trends. This means that the topics covered on the VB2017 conference programme – the majority of which was published in April – are still as relevant now as they were five months ago. Still, security is constantly evolving, and…

  • VB2017: nine last-minute papers announced

    At Virus Bulletin we try not to follow the daily security hype, focusing instead on the bigger trends. This means that the topics covered on the VB2017 conference programme – the majority of which was published in April – are still as relevant now as they were five months ago. Still, security is constantly evolving, and…

  • VB2016 paper: BlackEnergy – what we really know about the notorious cyber attacks

    In a blog post published on Friday, ESET researcher Anton Cherepanov provides evidence linking last week’s (Not)Petya attacks to the BlackEnergy group; Kaspersky researchers also believe there is some evidence the two are linked, though they say there are only low confidence indicators. Going back at least a decade, and likely cybercriminal in origin, the…

  • VB2016 paper: BlackEnergy – what we really know about the notorious cyber attacks

    In a blog post published on Friday, ESET researcher Anton Cherepanov provides evidence linking last week’s (Not)Petya attacks to the BlackEnergy group; Kaspersky researchers also believe there is some evidence the two are linked, though they say there are only low confidence indicators. Going back at least a decade, and likely cybercriminal in origin, the…