SlideShare a Scribd company logo
1 of 8
I N T E L L I G E N C E A S S E S S M E N T
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
(U//FOUO) Damaging Cyber Attacks Possible
but Not Likely Against the US Energy Sector
27 January 2016
Office of Intelligence and Analysis
IA-0060-16
(U) Warning: This document is UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO). It contains information that may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552). It is to be controlled, stored, handled,
transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information and is not to be released to the public, the media, or other personnel who do not have a valid need to know without prior approval of an authorized
DHS official. State and local homeland security officials may share this document with authorized critical infrastructure and key resource personnel and private sector security officials without further approval from DHS
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
22 January 2016
(U//FOUO) Damaging Cyber Attacks Possible but Not Likely Against the
US Energy Sector
(U) Prepared by the Office of Intelligence and Analysis (I&A). Coordinated with the Industrial Control Systems Computer Emergency Response
Team (ICS-CERT).
(U) Key Judgments
(U//FOUO) We assess the threat of a damaging or disruptive cyber attack against the US energy sector is
low. We judge advanced persistent threat (APT) nation-state cyber actors are targeting US energy sector
enterprise networks primarily to conduct cyber espionage. The APT activity directed against sector
industrial control system (ICS) networks probably is focused on acquiring and maintaining persistent access
to facilitate the introduction of malware, and likely is part of nation-state contingency planning that would
only be implemented to conduct a damaging or disruptive attack in the event of hostilities with the United
States.
(U//FOUO) We assess the majority of malicious activity occurring against the US energy sector is low-level
cybercrime that is likely opportunistic in nature rather than specifically aimed at the sector, is financially or
ideologically motivated, and is not meant to be destructive.
(U//FOUO) We assess that imprecise use of the term “cyber attack” in open source media reporting and
throughout the private sector has led to misperceptions about the cyber threat to the US energy sector.
(U//FOUO) Advanced Persistent Threat Actors Not Likely To Conduct Damaging or Disruptive
Attack
(U//FOUO) We assess the threat of a damaging or disruptive cyber attack against the US energy sector is low. We judge
APT nation-state cyber actors are targeting US energy sector enterprise networks primarily to conduct cyber espionage.
The APT activity directed against sector ICS networks probably is focused on acquiring and maintaining persistent access to
facilitate the introduction of malware, and likely is part of nation-state contingency planning that would only be
implemented to conduct a damaging or disruptive attack in the event of hostilities with the United States.
(U) Scope
(U//FOUO) This Assessment establishes a baseline analysis of cyber threats to the US energy sector based on comprehensive FY 2014
incident reporting data compiled by ICS-CERT, as well as reporting by the Intelligence Community (IC), private sector cybersecurity
industry, and open source media between early 2011 and January 2016. This Assessment is designed to help close gaps between the
private sector’s and the IC’s understanding of current cyber threats facing the US energy sector. Critical infrastructure owners and
operators can use this analysis to better understand cyber threats facing the US energy sector and help focus defensive strategies and
operations to mitigate these threats. The Assessment does not include an in-depth analysis of foreign cyber doctrines or nation-state red
lines for conducting cyber attacks against the United States. The information cutoff date for this Assessment is January 2016.
(U) Industrial Control Systems
(U) ICS are computers that control real-world activity; for example, ICS are used to run power plants, manufacturing assembly lines,
commercial air conditioning systems, and building elevators.
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
Page 2 of 7
» (U//FOUO) APT actors were responsible for at least 17 intrusions against the US energy sector in FY 2014, according
to ICS-CERT incident report data—the last full year for which this data was available.1
Included in these intrusions are
incidents of data theft from enterprise networks and accessing and maintaining presence on ICS. APT actors did not
cause any damage or disruption in any of the 17 reported incidents, according to the same ICS-CERT incident report
data.2
» (U//FOUO) ICS-CERT in late 2014 became aware of an ongoing campaign, dating to 2011, targeting ICS devices
worldwide using Havex malware, according to ICS-CERT alerts and cybersecurity industry analysis.3,4,5,6
This activity is
attributed to suspected Russian state-sponsored actors according to cybersecurity industry analysis.7,8
» (U//FOUO) APT actors in FY 2014 were responsible for two confirmed intrusions into US petroleum organizations’
enterprise networks, and are suspected of exfiltrating data in at least one case, according to ICS-CERT incident report
data.11
(U//FOUO) Low-level Cybercrime Predominant Activity Against US Energy Sector
(U//FOUO) We assess the majority of malicious activity occurring against the energy sector is low-level cybercrime that is
likely opportunistic in nature rather than specifically aimed at the sector, is financially or ideologically motivated, and is not
meant to be destructive. Low-level activity such as that by cybercriminals or criminal hackers is less likely to be reported
to ICS-CERT, as the organizations themselves may be able to handle the incident—meaning the number of low-level
cybercrime incidents is probably much higher. Low-level cybercrime incidents cost the energy sector billions of dollars in
cybersecurity spending and insurance coverage against cyber attacks.16
» (U//FOUO) Of the cyber incidents against the US energy sector reported to ICS-CERT in FY 2014, 63 percent
involved unattributed, low-level activity against enterprise networks—for which we have insufficient information to
provide definitive attribution.17
We assess these incidents likely were conducted by cybercriminals, criminal hackers,
unknown actors, and insiders. In addition, many of these incidents were handled independently of ICS-CERT, either by
the victim organizations themselves or by third-party consultants.
» (U//FOUO) Unknown actors in FY 2014 used the Bang distributed denial-of-service (DDoS) malware to infect at least
four US electricity organizations, according to ICS-CERT incident report data.18
DDoS malware is typically spread by
targeting vulnerabilities rather than specific organizations, indicating the electricity organizations probably were not
targeted specifically.
» (U//FOUO) Cybercriminals in FY 2014 used Cryptolocker ransomware to infect three US energy organizations,
according to ICS-CERT incident report data.19
Cryptolocker encrypts the victim’s data so it can no longer be accessed
(U//FOUO) Havex Malware
(U//FOUO) Havex is a malware tool likely developed by Russian state-sponsored cyber actors. Its main function is to gather system
information, but it also can run specialized plug-ins for additional capabilities.9,10
(U) Ukraine Power Outage
(U//FOUO) Open source media and various US cybersecurity threat intelligence companies have claimed that at least six Ukrainian
regional power providers in late December suffered a cyber attack causing the loss of power for more than 80,000 customers for up to
six hours12,13
Due to limited authoritative reporting, I&A is unable to confirm the event was triggered by cyber means. While not
independently confirmed as the cause of the outage, malware provided by Kyiv indicates the presence of a variant of an ICS-specific
malware on the energy provider’s systems, according to ICS-CERT analysis.14
The variant provided by the Ukrainian Government has
the capability to enable remote access and delete computer content, including system drives.15
I&A cannot attribute this operation to
any specific cyber actor, but the attacks are consistent with our understanding of Moscow’s capability and intent, including observations
of cyber operations during regional tensions. This incident does not represent an increase in the threat of a disruptive or destructive
attack on US energy infrastructure, which I&A assesses is low.
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
Page 3 of 7
without a passkey, which only the cybercriminal possesses. To recover the data, the victim must pay a ransom—
usually in bitcoins—to the cybercriminal.
» (U) Unidentified cybercriminals in May 2013 compromised the payroll login credentials of a North Carolina fuel
distribution company, and during the course of five days stole more than $800,000 before the theft was noticed,
according to a well-known cybersecurity media outlet.20
(U//FOUO) Misperceptions about Cyber Threats in the Energy Sector
(U//FOUO) We assess imprecise use of the term “cyber attack” in open source media reporting and throughout the
private sector has led to misperceptions about the cyber threat to the US energy sector. The term “cyber attack” is
frequently used to refer to any cyber incident directed against the US energy sector. This overuse of the term “cyber
attack” creates an unnecessarily alarmist general view of the threat to the sector. “Cyber attack”—which should denote
intent to cause denial, disruption, destruction, or other negative effects—is frequently used in the private sector to describe
cyber espionage, and even low-level, untargeted incidents of cybercrime. Overuse of the term “cyber attack,” risks “alarm
fatigue,” which could lead to longer response times or to missing important incidents.*
» (U//FOUO) A major media outlet reported in December 2014 that the nation’s energy grid is constantly under “attack”
by hackers. The article makes this claim by drawing on an ICS-CERT statement regarding the number of incidents it
responded to in FY 2014.21
In fact, none of these events were properly considered attacks because no disruption, denial,
or destruction occurred; rather, these events are more correctly described as espionage or some other activity. The only
two incidents that resulted in damage or disruption to the victim’s systems were self-inflicted—caused by accidental
misconfiguration, according to DHS incident report data.22
» (U//FOUO) Another major media outlet in November 2014 published an article speculating that China could shut down
the US electric power grid through a cyber attack, but the article offered no concrete evidence to support this claim.23
According to all sources of information available to the IC, ICS-CERT, and the private sector, there have been no
damaging or destructive attacks against the US energy sector. We also have no reporting that Chinese cyber actors have
ever accessed the ICS components of any US energy sector entity.
(U) Mitigation Measures
(U//FOUO) Regardless whether adversarial APT actors intend to conduct damaging attacks against the US energy sector, it
is clear that the sector is vulnerable to low-level cybercrime and sophisticated state-sponsored APT activity. In properly
segmented networks—where ICS components are not directly connected to the Internet—the enterprise network is often
the entry point for targeted and untargeted malicious activity against ICS components. Energy sector asset owners and
operators can reduce the risk of malicious activity reaching ICS components by better protecting and securing their
enterprise networks. Four relatively simple tactics could result in a significant decrease in compromises: implementing
up-to-date e-mail filters; keeping antivirus definitions current; keeping software patches current; and continually training
users.
* (U) Alarm fatigue occurs when one is exposed to a large number of frequent alarms and consequently becomes desensitized to them.
Desensitization can lead to longer response times or to missing important alarms.
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
Page 4 of 7
(U) Appendix A: ICS-CERT and US-CERT Publications
(U//FOUO) ICS-CERT works to reduce risks within and across all critical infrastructure sectors by partnering with law
enforcement agencies and the IC and coordinating efforts among federal, state, local, and tribal governments and control
systems owners, operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector
computer emergency response teams to share control systems-related security incidents and mitigation measures.
ICS-CERT distributes advisories, alerts, bulletins, and recommended practices through its website: https://ics-cert.us-
cert.gov/.
(U//FOUO) ICS-CERT has published ICS-TIP-12-146-01B, which provides guidance and recommended practices for
intrusion detection and mitigation strategies. This technical information paper can be found at, https://ics-cert.us-
cert.gov/tips/ICS-TIP-12-146-01B.
(U//FOUO) Organizations should routinely evaluate how to integrate best practices into their current environments to
achieve system integrity, including the assurance of software authenticity and user identity. To assist in this endeavor,
US-CERT has published recommended best practices in TIP-11-075-01, which can be found at, https://www.us-
cert.gov/sites/default/files/publications/TIP11-075-01.pdf.
(U//FOUO) US critical infrastructure consists of the physical and cyber assets of public and private entities in several
sectors, including the US energy sector. The healthy functioning of cyber assets is essential to our economy and national
security. US-CERT has published a paper outlining strategic objectives to prevent cyber attacks against US critical
infrastructure, reduce national vulnerability to cyber attacks, and minimize damage and recovery time from cyber attacks.
This document can be found at, https://www.us-cert.gov/security-publications/national-strategy-secure-cyberspace.
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
Page 5 of 7
(U) Appendix B: ICS-CERT Incident Report Data
(U) The below chart displays all ICS-CERT’s 2014 US energy sector incident resport data by consequence and threat
actors.
(U) The classification of the above table is U//FOUO.24
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
Page 6 of 7
(U) Tracked by: HSEC-1.1, HSEC-1.6, HSEC-1.10
1 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014
Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.
2 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014
Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.
3 (U); DHS; ICS-CERT; “ICS Focused Malware (Update A)”; 07 JUL 2015; https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-176-02A;
accessed on 08 SEP 2015.
4 (U); PC WORLD; “New Havex Malware Variants Target Industrial Control System and SCADA Users”;
http://www.pcworld.com/article/2367240/new-havex-malware-variants-target-industrial-control-system-and-scada-users.html; accessed
on 07 JUL 2015; (U); Article.
5 (U); DHS; ICS-CERT; ICS-ALERT-14-281-01B; 21 NOV 2014; DOI UNK; (U); Ongoing Sophisticated Malware Campaign
Compromising ICS; Extracted information is UNCLASSIFIED; Overall document classification is UNCLASSIFIED.
6 (U); Symantec; “Dragonfly: Energy Companies Under Sabotage Threat”; 2012;
https://files.sans.org/summit/ics2015/PDFs/Technical_Briefing_ICSTargeted_Threats.pdf; accessed on 08 SEP 2015; (U); Briefing.
7 (U); PC WORLD; “New Havex Malware Variants Target Industrial Control System and SCADA Users”;
http://www.pcworld.com/article/2367240/new-havex-malware-variants-target-industrial-control-system-and-scada-users.html; accessed
on 07 JUL 2015; (U); Article.
8 (U); Symantec; “Dragonfly: Energy Companies Under Sabotage Threat”; 2012;
https://files.sans.org/summit/ics2015/PDFs/Technical_Briefing_ICSTargeted_Threats.pdf; accessed on 08 SEP 2015; (U); Briefing.
9 (U); Symantec; “Dragonfly: Energy Companies Under Sabotage Threat”; 2012;
https://files.sans.org/summit/ics2015/PDFs/Technical_Briefing_ICSTargeted_Threats.pdf; accessed on 08 SEP 2015; (U); Briefing.
10 (U); DHS; ICS-CERT; “ICS Focused Malware (Update A)”; 07 JUL 2015; https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-176-02A;
accessed on 08 SEP 2015.
11 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014
Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.
12 (U); iSight Partners; 15-00014822; 30 DEC 2015, Version 2; (U); Power Outage by Cyber Attack on Energy Control Systems in Several
Regions of Ukraine; (U); Cybersecurity industry report.
13 (U); Eduard Kovacs; Security Weekly; “Ukrain Accuses Russia of Hacking Power Companies”; www.securityweek.com/ukraine-accuses-
russia-hacking-power-companies; (U); Article.
(U) Source Summary Statement
(U) This Assessment is based on ICS-CERT incident reporting data and information self-reported to ICS-CERT by victim organizations
from Fiscal Year 2014—the last full year for which incident reporting data was available. This Assessment is also supported by information
from reputable cybersecurity firms and the US media. We have high confidence in the accuracy and reliability of the ICS-CERT data,
but acknowledge that newer ICS-CERT data might change our assessment. We also have high confidence in the reporting from
reputable cybersecurity firms. Although the media reporting corroborates other reporting, this information may be intended to influence
as well as inform, giving us medium confidence in this information. While we have high to medium confidence in the accuracy and
reliability of these sources, our overall confidence in this assessment is medium because of the lack of data that would provide a
comprehensive understanding of all malicious cyber incidents affecting the US energy sector.
(U) Reporting Computer Security Incidents
(U) To report a computer security incident, either contact US-CERT at 888-282-0870, or go to https://forms.us-
cert.gov/report/ and complete the US-CERT Incident Reporting System form. The US-CERT Incident Reporting System
provides a secure, web-enabled means of reporting computer security incidents to US-CERT. An incident is defined as a violation or
imminent threat of violation of computer security policies, acceptable use policies, or standard computer security practices. In general,
types of activity commonly recognized as violating typical security policies include attempts (either failed or successful) to gain
unauthorized access to a system or its data, including personally identifiable information; unwanted disruption or denial of service; the
unauthorized use of a system for processing or storing data; and changes to system hardware, firmware, or software without the owner’s
knowledge, instruction, or consent.
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y
Page 7 of 7
14 (U); DHS; I&A Intelligence Analyst; Meeting; 04 JAN 2016; DOI UNK; (U); Meeting with ICS-CERT and E-ISAC; Extracted information
is UNCLASSIFIED; Overall document classification is UNCLASSIFIED.
15 (U); DHS; I&A Intelligence Analyst; Meeting; 04 JAN 2016; DOI UNK; (U); Meeting with ICS-CERT and E-ISAC; Extracted information
is UNCLASSIFIED; Overall document classification is UNCLASSIFIED.
16 (U); Fortune; “Lloyd’s CEO: Cyber Attacks Cost Companies $400 Billion Every Year”; 23 JAN 2015;
http://fortune.com/2015/01/23/cyber attack-insurance-lloyds/; accessed on 21 SEP 2015; (U); Article.
17 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014
Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.
18 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident
Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.
19 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014
Incident Response Data; Extracted information is U//FOUO; Overall classification is S//NF.
20 (U); Krebs on Security; “NC Fuel Distributor Hit by $800,000 Cyberheist”; 23 MAY 2013;
http://www.krebsonsecurity.com/2013/05/nc-fuel-distributor-hit-by-800000-cyberheist/; accessed on 11 SEP 2015; (U); Blog.
21 (U); CNN; “Hackers attacked the U.S. energy grid 79 times this year”; 29 DEC 2014;
http://money.cnn.com/2014/11/18/technology/security/energy-grid-hack/; accessed on 8 SEP 2015; (U); Article.
22 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident
Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.
23 (U); Forbes; “Chinese Cyber Attack Could Shut Down U.S. Electric Power Grid”; 28 NOV 2014;
http://www.forbes.com/sites/robertlenzner/2014/11/28/chinese-cyber attack-could-shut-down-u-s-electric-power-grid/; accessed on 8
SEP 2015; (U); Article.
24 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014
Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.

More Related Content

What's hot

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
How secure are you?
How secure are you?How secure are you?
How secure are you?Joe Morris
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
Digital em Portugal 2018
Digital em Portugal 2018Digital em Portugal 2018
Digital em Portugal 2018alphaCoimbra
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Mark Raduenzel
 
31,000 federal government cyber incidents identified by White House
31,000 federal government cyber incidents identified by White House31,000 federal government cyber incidents identified by White House
31,000 federal government cyber incidents identified by White HouseDavid Sweigert
 

What's hot (20)

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber war
Cyber warCyber war
Cyber war
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Digital em Portugal 2018
Digital em Portugal 2018Digital em Portugal 2018
Digital em Portugal 2018
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
31,000 federal government cyber incidents identified by White House
31,000 federal government cyber incidents identified by White House31,000 federal government cyber incidents identified by White House
31,000 federal government cyber incidents identified by White House
 

Viewers also liked

HIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit QuestionsHIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit QuestionsDavid Sweigert
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareDavid Sweigert
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3David Sweigert
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83David Sweigert
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017David Sweigert
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefingDavid Sweigert
 
Handbook for Cyber Incident Response
Handbook for Cyber Incident ResponseHandbook for Cyber Incident Response
Handbook for Cyber Incident ResponseDavid Sweigert
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider ThreatDavid Sweigert
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRDavid Sweigert
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisDavid Sweigert
 
HIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCRHIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCRDavid Sweigert
 
Developing Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDeveloping Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDavid Sweigert
 
TDL3 Rootkit Background
TDL3 Rootkit BackgroundTDL3 Rootkit Background
TDL3 Rootkit BackgroundDavid Sweigert
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksDavid Sweigert
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksDavid Sweigert
 
Example of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of AgingExample of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of AgingDavid Sweigert
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDavid Sweigert
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareDavid Sweigert
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureDavid Sweigert
 

Viewers also liked (20)

HIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit QuestionsHIPAA HHS OCR Audit Questions
HIPAA HHS OCR Audit Questions
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017Cyber TTX Training Opportunity for mid-January 2017
Cyber TTX Training Opportunity for mid-January 2017
 
Emergency Services Sector Cybersecurity Initiative UASI briefing
Emergency Services Sector Cybersecurity Initiative  UASI briefingEmergency Services Sector Cybersecurity Initiative  UASI briefing
Emergency Services Sector Cybersecurity Initiative UASI briefing
 
Handbook for Cyber Incident Response
Handbook for Cyber Incident ResponseHandbook for Cyber Incident Response
Handbook for Cyber Incident Response
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
Healthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPRHealthcare Contingency Operations by DHHS ASPR
Healthcare Contingency Operations by DHHS ASPR
 
Use of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysisUse of reverse proxies to counter attacks -- TCP flow analysis
Use of reverse proxies to counter attacks -- TCP flow analysis
 
HIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCRHIPAA Security Rule consent agreement with OCR
HIPAA Security Rule consent agreement with OCR
 
Developing Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to RecoveryDeveloping Transistion Planning from Cyber Incident Response to Recovery
Developing Transistion Planning from Cyber Incident Response to Recovery
 
TDL3 Rootkit Background
TDL3 Rootkit BackgroundTDL3 Rootkit Background
TDL3 Rootkit Background
 
Wireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication AttacksWireless Disassociation and Deauthentication Attacks
Wireless Disassociation and Deauthentication Attacks
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Example of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of AgingExample of Security Awareness Training -- Department of Aging
Example of Security Awareness Training -- Department of Aging
 
Disaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA frameworkDisaster Recovery planning within HIPAA framework
Disaster Recovery planning within HIPAA framework
 
Use of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional WarfareUse of Cyber Proxy Forces in Unconventional Warfare
Use of Cyber Proxy Forces in Unconventional Warfare
 
Russian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting InfrastructureRussian Hacker Cyber Threats to US Voting Infrastructure
Russian Hacker Cyber Threats to US Voting Infrastructure
 

Similar to Cyber Threats that impact the US Energy Infrastructure

The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...Fas (Feisal) Mosleh
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxronak56
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infrasimisterchristen
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...RepentSinner
 
(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...AnonDownload
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityJohn Kingsley
 

Similar to Cyber Threats that impact the US Energy Infrastructure (20)

The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...
 
(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...(U fouo) dhs infrastructure protection note- most significant tactics against...
(U fouo) dhs infrastructure protection note- most significant tactics against...
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
Security Management
Security ManagementSecurity Management
Security Management
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012rehmti665
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...ankitnayak356677
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.pptsilvialandin2
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt13875446-Ballistic Missile Trajectories.ppt
13875446-Ballistic Missile Trajectories.ppt
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 

Cyber Threats that impact the US Energy Infrastructure

  • 1. I N T E L L I G E N C E A S S E S S M E N T U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y (U//FOUO) Damaging Cyber Attacks Possible but Not Likely Against the US Energy Sector 27 January 2016 Office of Intelligence and Analysis IA-0060-16 (U) Warning: This document is UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO). It contains information that may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information and is not to be released to the public, the media, or other personnel who do not have a valid need to know without prior approval of an authorized DHS official. State and local homeland security officials may share this document with authorized critical infrastructure and key resource personnel and private sector security officials without further approval from DHS
  • 2. U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y 22 January 2016 (U//FOUO) Damaging Cyber Attacks Possible but Not Likely Against the US Energy Sector (U) Prepared by the Office of Intelligence and Analysis (I&A). Coordinated with the Industrial Control Systems Computer Emergency Response Team (ICS-CERT). (U) Key Judgments (U//FOUO) We assess the threat of a damaging or disruptive cyber attack against the US energy sector is low. We judge advanced persistent threat (APT) nation-state cyber actors are targeting US energy sector enterprise networks primarily to conduct cyber espionage. The APT activity directed against sector industrial control system (ICS) networks probably is focused on acquiring and maintaining persistent access to facilitate the introduction of malware, and likely is part of nation-state contingency planning that would only be implemented to conduct a damaging or disruptive attack in the event of hostilities with the United States. (U//FOUO) We assess the majority of malicious activity occurring against the US energy sector is low-level cybercrime that is likely opportunistic in nature rather than specifically aimed at the sector, is financially or ideologically motivated, and is not meant to be destructive. (U//FOUO) We assess that imprecise use of the term “cyber attack” in open source media reporting and throughout the private sector has led to misperceptions about the cyber threat to the US energy sector. (U//FOUO) Advanced Persistent Threat Actors Not Likely To Conduct Damaging or Disruptive Attack (U//FOUO) We assess the threat of a damaging or disruptive cyber attack against the US energy sector is low. We judge APT nation-state cyber actors are targeting US energy sector enterprise networks primarily to conduct cyber espionage. The APT activity directed against sector ICS networks probably is focused on acquiring and maintaining persistent access to facilitate the introduction of malware, and likely is part of nation-state contingency planning that would only be implemented to conduct a damaging or disruptive attack in the event of hostilities with the United States. (U) Scope (U//FOUO) This Assessment establishes a baseline analysis of cyber threats to the US energy sector based on comprehensive FY 2014 incident reporting data compiled by ICS-CERT, as well as reporting by the Intelligence Community (IC), private sector cybersecurity industry, and open source media between early 2011 and January 2016. This Assessment is designed to help close gaps between the private sector’s and the IC’s understanding of current cyber threats facing the US energy sector. Critical infrastructure owners and operators can use this analysis to better understand cyber threats facing the US energy sector and help focus defensive strategies and operations to mitigate these threats. The Assessment does not include an in-depth analysis of foreign cyber doctrines or nation-state red lines for conducting cyber attacks against the United States. The information cutoff date for this Assessment is January 2016. (U) Industrial Control Systems (U) ICS are computers that control real-world activity; for example, ICS are used to run power plants, manufacturing assembly lines, commercial air conditioning systems, and building elevators.
  • 3. U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y Page 2 of 7 » (U//FOUO) APT actors were responsible for at least 17 intrusions against the US energy sector in FY 2014, according to ICS-CERT incident report data—the last full year for which this data was available.1 Included in these intrusions are incidents of data theft from enterprise networks and accessing and maintaining presence on ICS. APT actors did not cause any damage or disruption in any of the 17 reported incidents, according to the same ICS-CERT incident report data.2 » (U//FOUO) ICS-CERT in late 2014 became aware of an ongoing campaign, dating to 2011, targeting ICS devices worldwide using Havex malware, according to ICS-CERT alerts and cybersecurity industry analysis.3,4,5,6 This activity is attributed to suspected Russian state-sponsored actors according to cybersecurity industry analysis.7,8 » (U//FOUO) APT actors in FY 2014 were responsible for two confirmed intrusions into US petroleum organizations’ enterprise networks, and are suspected of exfiltrating data in at least one case, according to ICS-CERT incident report data.11 (U//FOUO) Low-level Cybercrime Predominant Activity Against US Energy Sector (U//FOUO) We assess the majority of malicious activity occurring against the energy sector is low-level cybercrime that is likely opportunistic in nature rather than specifically aimed at the sector, is financially or ideologically motivated, and is not meant to be destructive. Low-level activity such as that by cybercriminals or criminal hackers is less likely to be reported to ICS-CERT, as the organizations themselves may be able to handle the incident—meaning the number of low-level cybercrime incidents is probably much higher. Low-level cybercrime incidents cost the energy sector billions of dollars in cybersecurity spending and insurance coverage against cyber attacks.16 » (U//FOUO) Of the cyber incidents against the US energy sector reported to ICS-CERT in FY 2014, 63 percent involved unattributed, low-level activity against enterprise networks—for which we have insufficient information to provide definitive attribution.17 We assess these incidents likely were conducted by cybercriminals, criminal hackers, unknown actors, and insiders. In addition, many of these incidents were handled independently of ICS-CERT, either by the victim organizations themselves or by third-party consultants. » (U//FOUO) Unknown actors in FY 2014 used the Bang distributed denial-of-service (DDoS) malware to infect at least four US electricity organizations, according to ICS-CERT incident report data.18 DDoS malware is typically spread by targeting vulnerabilities rather than specific organizations, indicating the electricity organizations probably were not targeted specifically. » (U//FOUO) Cybercriminals in FY 2014 used Cryptolocker ransomware to infect three US energy organizations, according to ICS-CERT incident report data.19 Cryptolocker encrypts the victim’s data so it can no longer be accessed (U//FOUO) Havex Malware (U//FOUO) Havex is a malware tool likely developed by Russian state-sponsored cyber actors. Its main function is to gather system information, but it also can run specialized plug-ins for additional capabilities.9,10 (U) Ukraine Power Outage (U//FOUO) Open source media and various US cybersecurity threat intelligence companies have claimed that at least six Ukrainian regional power providers in late December suffered a cyber attack causing the loss of power for more than 80,000 customers for up to six hours12,13 Due to limited authoritative reporting, I&A is unable to confirm the event was triggered by cyber means. While not independently confirmed as the cause of the outage, malware provided by Kyiv indicates the presence of a variant of an ICS-specific malware on the energy provider’s systems, according to ICS-CERT analysis.14 The variant provided by the Ukrainian Government has the capability to enable remote access and delete computer content, including system drives.15 I&A cannot attribute this operation to any specific cyber actor, but the attacks are consistent with our understanding of Moscow’s capability and intent, including observations of cyber operations during regional tensions. This incident does not represent an increase in the threat of a disruptive or destructive attack on US energy infrastructure, which I&A assesses is low.
  • 4. U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y Page 3 of 7 without a passkey, which only the cybercriminal possesses. To recover the data, the victim must pay a ransom— usually in bitcoins—to the cybercriminal. » (U) Unidentified cybercriminals in May 2013 compromised the payroll login credentials of a North Carolina fuel distribution company, and during the course of five days stole more than $800,000 before the theft was noticed, according to a well-known cybersecurity media outlet.20 (U//FOUO) Misperceptions about Cyber Threats in the Energy Sector (U//FOUO) We assess imprecise use of the term “cyber attack” in open source media reporting and throughout the private sector has led to misperceptions about the cyber threat to the US energy sector. The term “cyber attack” is frequently used to refer to any cyber incident directed against the US energy sector. This overuse of the term “cyber attack” creates an unnecessarily alarmist general view of the threat to the sector. “Cyber attack”—which should denote intent to cause denial, disruption, destruction, or other negative effects—is frequently used in the private sector to describe cyber espionage, and even low-level, untargeted incidents of cybercrime. Overuse of the term “cyber attack,” risks “alarm fatigue,” which could lead to longer response times or to missing important incidents.* » (U//FOUO) A major media outlet reported in December 2014 that the nation’s energy grid is constantly under “attack” by hackers. The article makes this claim by drawing on an ICS-CERT statement regarding the number of incidents it responded to in FY 2014.21 In fact, none of these events were properly considered attacks because no disruption, denial, or destruction occurred; rather, these events are more correctly described as espionage or some other activity. The only two incidents that resulted in damage or disruption to the victim’s systems were self-inflicted—caused by accidental misconfiguration, according to DHS incident report data.22 » (U//FOUO) Another major media outlet in November 2014 published an article speculating that China could shut down the US electric power grid through a cyber attack, but the article offered no concrete evidence to support this claim.23 According to all sources of information available to the IC, ICS-CERT, and the private sector, there have been no damaging or destructive attacks against the US energy sector. We also have no reporting that Chinese cyber actors have ever accessed the ICS components of any US energy sector entity. (U) Mitigation Measures (U//FOUO) Regardless whether adversarial APT actors intend to conduct damaging attacks against the US energy sector, it is clear that the sector is vulnerable to low-level cybercrime and sophisticated state-sponsored APT activity. In properly segmented networks—where ICS components are not directly connected to the Internet—the enterprise network is often the entry point for targeted and untargeted malicious activity against ICS components. Energy sector asset owners and operators can reduce the risk of malicious activity reaching ICS components by better protecting and securing their enterprise networks. Four relatively simple tactics could result in a significant decrease in compromises: implementing up-to-date e-mail filters; keeping antivirus definitions current; keeping software patches current; and continually training users. * (U) Alarm fatigue occurs when one is exposed to a large number of frequent alarms and consequently becomes desensitized to them. Desensitization can lead to longer response times or to missing important alarms.
  • 5. U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y Page 4 of 7 (U) Appendix A: ICS-CERT and US-CERT Publications (U//FOUO) ICS-CERT works to reduce risks within and across all critical infrastructure sectors by partnering with law enforcement agencies and the IC and coordinating efforts among federal, state, local, and tribal governments and control systems owners, operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector computer emergency response teams to share control systems-related security incidents and mitigation measures. ICS-CERT distributes advisories, alerts, bulletins, and recommended practices through its website: https://ics-cert.us- cert.gov/. (U//FOUO) ICS-CERT has published ICS-TIP-12-146-01B, which provides guidance and recommended practices for intrusion detection and mitigation strategies. This technical information paper can be found at, https://ics-cert.us- cert.gov/tips/ICS-TIP-12-146-01B. (U//FOUO) Organizations should routinely evaluate how to integrate best practices into their current environments to achieve system integrity, including the assurance of software authenticity and user identity. To assist in this endeavor, US-CERT has published recommended best practices in TIP-11-075-01, which can be found at, https://www.us- cert.gov/sites/default/files/publications/TIP11-075-01.pdf. (U//FOUO) US critical infrastructure consists of the physical and cyber assets of public and private entities in several sectors, including the US energy sector. The healthy functioning of cyber assets is essential to our economy and national security. US-CERT has published a paper outlining strategic objectives to prevent cyber attacks against US critical infrastructure, reduce national vulnerability to cyber attacks, and minimize damage and recovery time from cyber attacks. This document can be found at, https://www.us-cert.gov/security-publications/national-strategy-secure-cyberspace.
  • 6. U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y Page 5 of 7 (U) Appendix B: ICS-CERT Incident Report Data (U) The below chart displays all ICS-CERT’s 2014 US energy sector incident resport data by consequence and threat actors. (U) The classification of the above table is U//FOUO.24
  • 7. U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y Page 6 of 7 (U) Tracked by: HSEC-1.1, HSEC-1.6, HSEC-1.10 1 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF. 2 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF. 3 (U); DHS; ICS-CERT; “ICS Focused Malware (Update A)”; 07 JUL 2015; https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-176-02A; accessed on 08 SEP 2015. 4 (U); PC WORLD; “New Havex Malware Variants Target Industrial Control System and SCADA Users”; http://www.pcworld.com/article/2367240/new-havex-malware-variants-target-industrial-control-system-and-scada-users.html; accessed on 07 JUL 2015; (U); Article. 5 (U); DHS; ICS-CERT; ICS-ALERT-14-281-01B; 21 NOV 2014; DOI UNK; (U); Ongoing Sophisticated Malware Campaign Compromising ICS; Extracted information is UNCLASSIFIED; Overall document classification is UNCLASSIFIED. 6 (U); Symantec; “Dragonfly: Energy Companies Under Sabotage Threat”; 2012; https://files.sans.org/summit/ics2015/PDFs/Technical_Briefing_ICSTargeted_Threats.pdf; accessed on 08 SEP 2015; (U); Briefing. 7 (U); PC WORLD; “New Havex Malware Variants Target Industrial Control System and SCADA Users”; http://www.pcworld.com/article/2367240/new-havex-malware-variants-target-industrial-control-system-and-scada-users.html; accessed on 07 JUL 2015; (U); Article. 8 (U); Symantec; “Dragonfly: Energy Companies Under Sabotage Threat”; 2012; https://files.sans.org/summit/ics2015/PDFs/Technical_Briefing_ICSTargeted_Threats.pdf; accessed on 08 SEP 2015; (U); Briefing. 9 (U); Symantec; “Dragonfly: Energy Companies Under Sabotage Threat”; 2012; https://files.sans.org/summit/ics2015/PDFs/Technical_Briefing_ICSTargeted_Threats.pdf; accessed on 08 SEP 2015; (U); Briefing. 10 (U); DHS; ICS-CERT; “ICS Focused Malware (Update A)”; 07 JUL 2015; https://ics-cert.us-cert.gov/alerts/ICS-ALERT-14-176-02A; accessed on 08 SEP 2015. 11 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF. 12 (U); iSight Partners; 15-00014822; 30 DEC 2015, Version 2; (U); Power Outage by Cyber Attack on Energy Control Systems in Several Regions of Ukraine; (U); Cybersecurity industry report. 13 (U); Eduard Kovacs; Security Weekly; “Ukrain Accuses Russia of Hacking Power Companies”; www.securityweek.com/ukraine-accuses- russia-hacking-power-companies; (U); Article. (U) Source Summary Statement (U) This Assessment is based on ICS-CERT incident reporting data and information self-reported to ICS-CERT by victim organizations from Fiscal Year 2014—the last full year for which incident reporting data was available. This Assessment is also supported by information from reputable cybersecurity firms and the US media. We have high confidence in the accuracy and reliability of the ICS-CERT data, but acknowledge that newer ICS-CERT data might change our assessment. We also have high confidence in the reporting from reputable cybersecurity firms. Although the media reporting corroborates other reporting, this information may be intended to influence as well as inform, giving us medium confidence in this information. While we have high to medium confidence in the accuracy and reliability of these sources, our overall confidence in this assessment is medium because of the lack of data that would provide a comprehensive understanding of all malicious cyber incidents affecting the US energy sector. (U) Reporting Computer Security Incidents (U) To report a computer security incident, either contact US-CERT at 888-282-0870, or go to https://forms.us- cert.gov/report/ and complete the US-CERT Incident Reporting System form. The US-CERT Incident Reporting System provides a secure, web-enabled means of reporting computer security incidents to US-CERT. An incident is defined as a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard computer security practices. In general, types of activity commonly recognized as violating typical security policies include attempts (either failed or successful) to gain unauthorized access to a system or its data, including personally identifiable information; unwanted disruption or denial of service; the unauthorized use of a system for processing or storing data; and changes to system hardware, firmware, or software without the owner’s knowledge, instruction, or consent.
  • 8. U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y U N C L A S S I F I E D / / F O R O F F I C I A L U S E O N L Y Page 7 of 7 14 (U); DHS; I&A Intelligence Analyst; Meeting; 04 JAN 2016; DOI UNK; (U); Meeting with ICS-CERT and E-ISAC; Extracted information is UNCLASSIFIED; Overall document classification is UNCLASSIFIED. 15 (U); DHS; I&A Intelligence Analyst; Meeting; 04 JAN 2016; DOI UNK; (U); Meeting with ICS-CERT and E-ISAC; Extracted information is UNCLASSIFIED; Overall document classification is UNCLASSIFIED. 16 (U); Fortune; “Lloyd’s CEO: Cyber Attacks Cost Companies $400 Billion Every Year”; 23 JAN 2015; http://fortune.com/2015/01/23/cyber attack-insurance-lloyds/; accessed on 21 SEP 2015; (U); Article. 17 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF. 18 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF. 19 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall classification is S//NF. 20 (U); Krebs on Security; “NC Fuel Distributor Hit by $800,000 Cyberheist”; 23 MAY 2013; http://www.krebsonsecurity.com/2013/05/nc-fuel-distributor-hit-by-800000-cyberheist/; accessed on 11 SEP 2015; (U); Blog. 21 (U); CNN; “Hackers attacked the U.S. energy grid 79 times this year”; 29 DEC 2014; http://money.cnn.com/2014/11/18/technology/security/energy-grid-hack/; accessed on 8 SEP 2015; (U); Article. 22 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF. 23 (U); Forbes; “Chinese Cyber Attack Could Shut Down U.S. Electric Power Grid”; 28 NOV 2014; http://www.forbes.com/sites/robertlenzner/2014/11/28/chinese-cyber attack-could-shut-down-u-s-electric-power-grid/; accessed on 8 SEP 2015; (U); Article. 24 (U//FOUO); DHS; ICS-CERT; REPORT NO. UNK; FEB 2015; DOI 01 OCT 2013 – 30 SEP 2014; (U//FOUO); Fiscal Year 2014 Incident Response Data; Extracted information is U//FOUO; Overall document classification is S//NF.