SlideShare a Scribd company logo
KillDisk and its
use in hacks in
Ukraine
❏ A quality security application that destroys data permanently from any computer .
❏ Access drive’s data on physical level via BIOS.
❏ Regardless of the OS, file systems or type of machine, it can destroy all data on all
storage devices.
❏ Can be installed on the system or booted from a disk as well, which allows to clean
the hard drive that has os installed to it.
❏ Support 24 International data sanitization methods.
What is KillDisk?
❏ Bootable version allows to erase whole drive at once but have a text only
interface.
❏ Installable version allows to erase things like flash drive and other internal hard
drives and has a GUI.
❏ In order to use KillDisk from outside the OS, select the partition to wipe and
press F10 to start.
❏ To run the KillDisk like a regular program open the Active KillDisk program.
❏ Bootable version can be created from the pre installed program using “Boot
Disk Creator” option.
KillDisk-Comparing the two ways
❏ Disk Erase (complete all disk's surface sanitation) for HDDs, SSDs, USBs.
❏ Supports preliminary Disk Examination for bad sectors.
❏ Displays Disks health diagnostics via S.M.A.R.T info and sectors inspection in
advanced Disk Editor.
❏ Supports batch operations.
❏ Allows disk cloning after erase.
❏ Ability to start from Bootable CD/DVD or LiveUSB and erase disks on any
PC.
❏ Mapping network shares
❏ Changing disk serial number
Features
❏ Sound notifications for completed erase jobs with different results.
❏ Auto hibernate or shutdown the system after all jobs are completed.
❏ Supports verification, PDF Certificates & XML reports, emailing results, reports
customization.
❏ Disk Wipe sanitation of unused clusters on live volumes for most file systems.
❏ Freeware or Demo product version provided for evaluation.
❏ Pricing :
Software KillDisk - $39.95/license,
Desktop KillDisk - $1900/box,
Industrial KillDisk - $350
Features
Erase Methods
Supports 24 International sanitation methods :
❏ One Pass Zeros:
Number of passes is fixed and cannot be changed.
When the write head passes through a sector, it writes only zeros or a series of
random characters.
❏ US DoD 5220.22-M:
Write head passes over each sector three times.
The first time with zeros (0x00), second time with 0xFF and the third time with
random characters.
❏ Canadian OPS - II:
Write head passes over each sector seven times (0x00, 0xFF, 0x00, 0xFF, 0x00,
0xFF, Random). There is one final pass to verify random characters by reading.
Erase Methods
❏ Russian GOST p50739-95:
Write head passes over each sector two times. (0x00, Random).
There is one final pass to verify random characters by reading.
❏ NSA 130-2:
Write head passes over each sector two times (Random, Random).
There is one final pass to verify random characters by reading.
❏ User Defined:
User indicates the number of times the write head passes over each sector.
Each overwriting pass is performed with a buffer containing random characters.
Erase Methods
The Erase Preferences tab allows for users to configure settings for the KillDisk
erase procedures.
❏ Select entire disk
❏ Select exact area
❏ Erase method
❏ Erase verification
❏ Initialize after erase
❏ Write fingerprint
❏ Erase confirmation
Disk Erase Options
The disk wipe procedure, like with the erase procedure, allows you to specify the
erase method used, as well as a few additional wipe-specific options.
❏ Entire disk wiped
❏ All volumes will be selected for wipe operation
❏ All unallocated space will be wiped
❏ Select a single partition to be wiped
❏ Erase method
❏ Erase verification
❏ Wipe unused cluster
❏ Wipe metadata and system files area
❏ Wipe slack space in file clusters
Disk Wipe Options
❏ DBAN
❏ HDShredder
❏ HDDErase
❏ Disk Wipe
❏ CBL Data Shredder
❏ Macrorit Data Wiper
Other players in the market
Ukraine Power Grid Cyber Attack
Source: https://www.youtube.com/watch?v=bV47gBsrDkc&feature=youtu.be
23 December 2015
First known successful cyber attack on
power grid
Coordinated multi-part attack on a
number of regional power distribution
centers in the region.
Compromised information systems of
three energy distribution companies in
Ukraine
Ukraine Power Grid Cyber Attack
IMPACT:
❏ Blackout in a whole geographic area of Ukraine
❏ More than 50 substations went offline
❏ Service outage to customers
❏ More than 80,000 homes remained without electricity
for a period of 1-6 hours
❏ Telephone lines were attacked preventing customers
from reporting outage
Ukraine Power Grid Cyber Attack
Cyber Attack : Potential Scenario
❏ KillDisk overwrote critical system files on operator machines
❏ causing them to crash and become inoperable
❏ KillDisk overwrites the master boot record
❏ the infected computers could not reboot
❏ KillDisk components had to be manually set,but
❏ the attackers used a logic bomb that launched KillDisk
automatically about 90 minutes into the attack
Role of KillDisk in Ukraine Attack
KillDisk as a malware
❏ First known use of KillDisk Malware was reported by CERT
Ukraine in November 2015
❏ News media companies were attacked at the time of the
2015 Ukrainian local elections
❏ A large number of video materials and various documents
were destroyed as a result of the attack
KillDisk as a ransomware
Lately:
❏ KillDisk disk wiper malware is back with new variants - Killdisk
Ransomware
❏ Targeting Windows and Linux Machines and servers
❏ Data encrypted
❏ Demands for unusually large ransom in Bitcoins
For Linux Systems:
❏ Encryption key is not stored anywhere on disk/server
❏ Even after paying ransom, one might not get decryption key
KillDisk as a ransomware
FBI advises - Pay off the criminals to get your files back if you don't have a backup
❏ KillDisk is a data sanitization tool capable of
❏ destroying 4000 different file types
❏ rendering machine unbootable
❏ killing processes and services on a server
❏ wiping off the whole hard disk
❏ Thus apparently,KillDisk is a data destroying parasite
❏ Categorised as an anti-forensic tool
❏ Only way to be safe is prevention
KillDisk : Conclusion
❏ Awareness within the organizations
❏ Regular backups
❏ Do not click on links provided in emails
❏ Do not open attachments from unknown sources
❏ Updated Antivirus Software
KillDisk : Prevention measures
 https://www.lifewire.com/killdisk-review-2619139
 http://www.killdisk.com/downloads/killdisk.pdf
 https://en.wikipedia.org/wiki/December_2015_Ukraine_power_grid_cyberattack
 https://www.makeuseof.com/tag/ukraines-power-grid-hacked-happen/
 https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-
attacks-ukrainian-electric-power-industry/
 https://www.wired.com/2016/01/everything-we-know-about-ukraines-power-
plant-hack/
 https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-
power-grid/
 https://thehackernews.com/2016/01/Ukraine-power-system-hacked.html
 https://thehackernews.com/2017/01/linux-ransomware-malware.html
References

More Related Content

What's hot

Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
Tanveer Malik
 
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
Sam Bowne
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
GIBIN JOHN
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Malware analysis using volatility
Malware analysis using volatilityMalware analysis using volatility
Malware analysis using volatilityYashashree Gund
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptx
masbulosoke
 
The DDS Tutorial Part II
The DDS Tutorial Part IIThe DDS Tutorial Part II
The DDS Tutorial Part II
Angelo Corsaro
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
9905234521
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Nuova ecdl modulo 7- Online collaboration
Nuova ecdl modulo 7- Online collaborationNuova ecdl modulo 7- Online collaboration
Nuova ecdl modulo 7- Online collaboration
Prof Web
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
primeteacher32
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
Divya Raval
 
Windows Architecture
Windows ArchitectureWindows Architecture
Windows Architecture
Amrith Krishna
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic ImagesCTIN
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsMoe Tanabian
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
Vivek Sinha Anurag
 
Ntfs and computer forensics
Ntfs and computer forensicsNtfs and computer forensics
Ntfs and computer forensics
Gaurav Ragtah
 

What's hot (20)

Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
 
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Malware analysis using volatility
Malware analysis using volatilityMalware analysis using volatility
Malware analysis using volatility
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptx
 
The DDS Tutorial Part II
The DDS Tutorial Part IIThe DDS Tutorial Part II
The DDS Tutorial Part II
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Nuova ecdl modulo 7- Online collaboration
Nuova ecdl modulo 7- Online collaborationNuova ecdl modulo 7- Online collaboration
Nuova ecdl modulo 7- Online collaboration
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Windows Architecture
Windows ArchitectureWindows Architecture
Windows Architecture
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android Apps
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
 
Ntfs and computer forensics
Ntfs and computer forensicsNtfs and computer forensics
Ntfs and computer forensics
 

Similar to killdisk and its use in ukraine hacks

Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
Chris Harrington
 
Windows optimization and customization
Windows optimization and customizationWindows optimization and customization
Windows optimization and customizationHiren Mayani
 
kbrgwillis.pdf
kbrgwillis.pdfkbrgwillis.pdf
kbrgwillis.pdf
Kblblkb
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
christinemaritza
 
Hard Disk Data Acquisition
Hard Disk Data AcquisitionHard Disk Data Acquisition
Hard Disk Data Acquisition
Taha İslam YILMAZ
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 ppt
Suman Sudheer
 
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by SreelakshmiDeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Cysinfo Cyber Security Community
 
Protecting Hosts
Protecting HostsProtecting Hosts
Protecting Hosts
primeteacher32
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
Jemma Elliott
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
Christophe Elut
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while Persisting
CTruncer
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
shaikmohammedsalman
 
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UKZephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
HARDWARIO
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]
Phil Huggins FBCS CITP
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
Sam Bowne
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
Johndion Ruloma
 
Diagnostic software tools
Diagnostic software toolsDiagnostic software tools
Diagnostic software tools
Celeste Dela Cruz
 
Computers
ComputersComputers
Computers
molllymunkatchy
 

Similar to killdisk and its use in ukraine hacks (20)

Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
Windows optimization and customization
Windows optimization and customizationWindows optimization and customization
Windows optimization and customization
 
kbrgwillis.pdf
kbrgwillis.pdfkbrgwillis.pdf
kbrgwillis.pdf
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 
Hard Disk Data Acquisition
Hard Disk Data AcquisitionHard Disk Data Acquisition
Hard Disk Data Acquisition
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 ppt
 
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by SreelakshmiDeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
 
Protecting Hosts
Protecting HostsProtecting Hosts
Protecting Hosts
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
 
Deft
DeftDeft
Deft
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while Persisting
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UKZephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
 
Diagnostic software tools
Diagnostic software toolsDiagnostic software tools
Diagnostic software tools
 
Computers
ComputersComputers
Computers
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

killdisk and its use in ukraine hacks

  • 1. KillDisk and its use in hacks in Ukraine
  • 2. ❏ A quality security application that destroys data permanently from any computer . ❏ Access drive’s data on physical level via BIOS. ❏ Regardless of the OS, file systems or type of machine, it can destroy all data on all storage devices. ❏ Can be installed on the system or booted from a disk as well, which allows to clean the hard drive that has os installed to it. ❏ Support 24 International data sanitization methods. What is KillDisk?
  • 3. ❏ Bootable version allows to erase whole drive at once but have a text only interface. ❏ Installable version allows to erase things like flash drive and other internal hard drives and has a GUI. ❏ In order to use KillDisk from outside the OS, select the partition to wipe and press F10 to start. ❏ To run the KillDisk like a regular program open the Active KillDisk program. ❏ Bootable version can be created from the pre installed program using “Boot Disk Creator” option. KillDisk-Comparing the two ways
  • 4. ❏ Disk Erase (complete all disk's surface sanitation) for HDDs, SSDs, USBs. ❏ Supports preliminary Disk Examination for bad sectors. ❏ Displays Disks health diagnostics via S.M.A.R.T info and sectors inspection in advanced Disk Editor. ❏ Supports batch operations. ❏ Allows disk cloning after erase. ❏ Ability to start from Bootable CD/DVD or LiveUSB and erase disks on any PC. ❏ Mapping network shares ❏ Changing disk serial number Features
  • 5. ❏ Sound notifications for completed erase jobs with different results. ❏ Auto hibernate or shutdown the system after all jobs are completed. ❏ Supports verification, PDF Certificates & XML reports, emailing results, reports customization. ❏ Disk Wipe sanitation of unused clusters on live volumes for most file systems. ❏ Freeware or Demo product version provided for evaluation. ❏ Pricing : Software KillDisk - $39.95/license, Desktop KillDisk - $1900/box, Industrial KillDisk - $350 Features
  • 7. Supports 24 International sanitation methods : ❏ One Pass Zeros: Number of passes is fixed and cannot be changed. When the write head passes through a sector, it writes only zeros or a series of random characters. ❏ US DoD 5220.22-M: Write head passes over each sector three times. The first time with zeros (0x00), second time with 0xFF and the third time with random characters. ❏ Canadian OPS - II: Write head passes over each sector seven times (0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, Random). There is one final pass to verify random characters by reading. Erase Methods
  • 8. ❏ Russian GOST p50739-95: Write head passes over each sector two times. (0x00, Random). There is one final pass to verify random characters by reading. ❏ NSA 130-2: Write head passes over each sector two times (Random, Random). There is one final pass to verify random characters by reading. ❏ User Defined: User indicates the number of times the write head passes over each sector. Each overwriting pass is performed with a buffer containing random characters. Erase Methods
  • 9. The Erase Preferences tab allows for users to configure settings for the KillDisk erase procedures. ❏ Select entire disk ❏ Select exact area ❏ Erase method ❏ Erase verification ❏ Initialize after erase ❏ Write fingerprint ❏ Erase confirmation Disk Erase Options
  • 10. The disk wipe procedure, like with the erase procedure, allows you to specify the erase method used, as well as a few additional wipe-specific options. ❏ Entire disk wiped ❏ All volumes will be selected for wipe operation ❏ All unallocated space will be wiped ❏ Select a single partition to be wiped ❏ Erase method ❏ Erase verification ❏ Wipe unused cluster ❏ Wipe metadata and system files area ❏ Wipe slack space in file clusters Disk Wipe Options
  • 11. ❏ DBAN ❏ HDShredder ❏ HDDErase ❏ Disk Wipe ❏ CBL Data Shredder ❏ Macrorit Data Wiper Other players in the market
  • 12. Ukraine Power Grid Cyber Attack Source: https://www.youtube.com/watch?v=bV47gBsrDkc&feature=youtu.be
  • 13. 23 December 2015 First known successful cyber attack on power grid Coordinated multi-part attack on a number of regional power distribution centers in the region. Compromised information systems of three energy distribution companies in Ukraine Ukraine Power Grid Cyber Attack
  • 14. IMPACT: ❏ Blackout in a whole geographic area of Ukraine ❏ More than 50 substations went offline ❏ Service outage to customers ❏ More than 80,000 homes remained without electricity for a period of 1-6 hours ❏ Telephone lines were attacked preventing customers from reporting outage Ukraine Power Grid Cyber Attack
  • 15. Cyber Attack : Potential Scenario
  • 16. ❏ KillDisk overwrote critical system files on operator machines ❏ causing them to crash and become inoperable ❏ KillDisk overwrites the master boot record ❏ the infected computers could not reboot ❏ KillDisk components had to be manually set,but ❏ the attackers used a logic bomb that launched KillDisk automatically about 90 minutes into the attack Role of KillDisk in Ukraine Attack
  • 17. KillDisk as a malware ❏ First known use of KillDisk Malware was reported by CERT Ukraine in November 2015 ❏ News media companies were attacked at the time of the 2015 Ukrainian local elections ❏ A large number of video materials and various documents were destroyed as a result of the attack
  • 18. KillDisk as a ransomware Lately: ❏ KillDisk disk wiper malware is back with new variants - Killdisk Ransomware ❏ Targeting Windows and Linux Machines and servers ❏ Data encrypted ❏ Demands for unusually large ransom in Bitcoins For Linux Systems: ❏ Encryption key is not stored anywhere on disk/server ❏ Even after paying ransom, one might not get decryption key
  • 19. KillDisk as a ransomware FBI advises - Pay off the criminals to get your files back if you don't have a backup
  • 20. ❏ KillDisk is a data sanitization tool capable of ❏ destroying 4000 different file types ❏ rendering machine unbootable ❏ killing processes and services on a server ❏ wiping off the whole hard disk ❏ Thus apparently,KillDisk is a data destroying parasite ❏ Categorised as an anti-forensic tool ❏ Only way to be safe is prevention KillDisk : Conclusion
  • 21. ❏ Awareness within the organizations ❏ Regular backups ❏ Do not click on links provided in emails ❏ Do not open attachments from unknown sources ❏ Updated Antivirus Software KillDisk : Prevention measures
  • 22.  https://www.lifewire.com/killdisk-review-2619139  http://www.killdisk.com/downloads/killdisk.pdf  https://en.wikipedia.org/wiki/December_2015_Ukraine_power_grid_cyberattack  https://www.makeuseof.com/tag/ukraines-power-grid-hacked-happen/  https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again- attacks-ukrainian-electric-power-industry/  https://www.wired.com/2016/01/everything-we-know-about-ukraines-power- plant-hack/  https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines- power-grid/  https://thehackernews.com/2016/01/Ukraine-power-system-hacked.html  https://thehackernews.com/2017/01/linux-ransomware-malware.html References

Editor's Notes

  1. A data sanitization method is the specific way in which a data destruction program or file shredder overwrites the data on a hard drive or other storage device.
  2. Variations - Killdisk software, Desktop, Industrial S - Specific M - Measurable A - Attainable R - Relevant T - Time-bound
  3. US Army AR380-19 and US Air Force 5020 used the same approach as US DoD with a difference in the sequence in which sectors are overwritten.