DTX Manchester DTX Manchester
  • About Us
Thursday, 25 February, 2021
IT Security Guru
CTX Manchester 2020 banner ad
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

BlackEnergy APT Sabotages Ukrainian News Outlets and Power Stations

by The Gurus
January 4, 2016
in Top 10 Stories
Share on FacebookShare on Twitter

The BlackEnergy APT (Advanced Persistent Threat) group, once thought dormant as of 2014, was found to be still active in 2015, targeting electrical power stations and news outlets in Ukraine.

BlackEnergy, a group suspected to be of Russian origin, is a cyber-threat actor that has been active against various politically charged objectives, typical targets in cyber-espionage campaigns.

The group, named after the BlackEnergy trojan often used in their attacks, has a knack for attacking industrial control systems (ICS).

ESET researchers are confirming that, after going dormant in December 2014, new evidence has surfaced that shows that BlackEnergy was actually active in 2015 but used new tools, of which researchers had no previous knowledge.

Original source: Softpedia

View the full story here

0 0 vote
Article Rating
FacebookTweetLinkedIn
Tags: advanced persistent threatAPTblackenergycrimeaCyber Attackcyberattackdormantelectrical power stationESETHackHackerICSindustrial control systemmotivenews outletspolicsresearcherRussiastate sponsoredTargetTrojanUkraine
ShareTweetShare
Previous Post

A Visit from St. Malware

Next Post

Irked train hackers talk derailment flaws, drop SCADA password list

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

FedEx Van

DHL Express and FedEx targeted by phishing scam

February 24, 2021
How Security Culture Invokes Secure Behaviour

How Security Culture Invokes Secure Behaviour

February 24, 2021
Two aeroplane silhouettes seen flying across mountains

Bombardier suffers ransomware and data leak

February 24, 2021
Pharmacy cross in neon lights

Healthcare Organisations increasingly targeted in cyberattacks

February 24, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept