SlideShare a Scribd company logo
1 of 22
KillDisk and its
use in hacks in
Ukraine
❏ A quality security application that destroys data permanently from any computer .
❏ Access drive’s data on physical level via BIOS.
❏ Regardless of the OS, file systems or type of machine, it can destroy all data on all
storage devices.
❏ Can be installed on the system or booted from a disk as well, which allows to clean
the hard drive that has os installed to it.
❏ Support 24 International data sanitization methods.
What is KillDisk?
❏ Bootable version allows to erase whole drive at once but have a text only
interface.
❏ Installable version allows to erase things like flash drive and other internal hard
drives and has a GUI.
❏ In order to use KillDisk from outside the OS, select the partition to wipe and
press F10 to start.
❏ To run the KillDisk like a regular program open the Active KillDisk program.
❏ Bootable version can be created from the pre installed program using “Boot
Disk Creator” option.
KillDisk-Comparing the two ways
❏ Disk Erase (complete all disk's surface sanitation) for HDDs, SSDs, USBs.
❏ Supports preliminary Disk Examination for bad sectors.
❏ Displays Disks health diagnostics via S.M.A.R.T info and sectors inspection in
advanced Disk Editor.
❏ Supports batch operations.
❏ Allows disk cloning after erase.
❏ Ability to start from Bootable CD/DVD or LiveUSB and erase disks on any
PC.
❏ Mapping network shares
❏ Changing disk serial number
Features
❏ Sound notifications for completed erase jobs with different results.
❏ Auto hibernate or shutdown the system after all jobs are completed.
❏ Supports verification, PDF Certificates & XML reports, emailing results, reports
customization.
❏ Disk Wipe sanitation of unused clusters on live volumes for most file systems.
❏ Freeware or Demo product version provided for evaluation.
❏ Pricing :
Software KillDisk - $39.95/license,
Desktop KillDisk - $1900/box,
Industrial KillDisk - $350
Features
Erase Methods
Supports 24 International sanitation methods :
❏ One Pass Zeros:
Number of passes is fixed and cannot be changed.
When the write head passes through a sector, it writes only zeros or a series of
random characters.
❏ US DoD 5220.22-M:
Write head passes over each sector three times.
The first time with zeros (0x00), second time with 0xFF and the third time with
random characters.
❏ Canadian OPS - II:
Write head passes over each sector seven times (0x00, 0xFF, 0x00, 0xFF, 0x00,
0xFF, Random). There is one final pass to verify random characters by reading.
Erase Methods
❏ Russian GOST p50739-95:
Write head passes over each sector two times. (0x00, Random).
There is one final pass to verify random characters by reading.
❏ NSA 130-2:
Write head passes over each sector two times (Random, Random).
There is one final pass to verify random characters by reading.
❏ User Defined:
User indicates the number of times the write head passes over each sector.
Each overwriting pass is performed with a buffer containing random characters.
Erase Methods
The Erase Preferences tab allows for users to configure settings for the KillDisk
erase procedures.
❏ Select entire disk
❏ Select exact area
❏ Erase method
❏ Erase verification
❏ Initialize after erase
❏ Write fingerprint
❏ Erase confirmation
Disk Erase Options
The disk wipe procedure, like with the erase procedure, allows you to specify the
erase method used, as well as a few additional wipe-specific options.
❏ Entire disk wiped
❏ All volumes will be selected for wipe operation
❏ All unallocated space will be wiped
❏ Select a single partition to be wiped
❏ Erase method
❏ Erase verification
❏ Wipe unused cluster
❏ Wipe metadata and system files area
❏ Wipe slack space in file clusters
Disk Wipe Options
❏ DBAN
❏ HDShredder
❏ HDDErase
❏ Disk Wipe
❏ CBL Data Shredder
❏ Macrorit Data Wiper
Other players in the market
Ukraine Power Grid Cyber Attack
Source: https://www.youtube.com/watch?v=bV47gBsrDkc&feature=youtu.be
23 December 2015
First known successful cyber attack on
power grid
Coordinated multi-part attack on a
number of regional power distribution
centers in the region.
Compromised information systems of
three energy distribution companies in
Ukraine
Ukraine Power Grid Cyber Attack
IMPACT:
❏ Blackout in a whole geographic area of Ukraine
❏ More than 50 substations went offline
❏ Service outage to customers
❏ More than 80,000 homes remained without electricity
for a period of 1-6 hours
❏ Telephone lines were attacked preventing customers
from reporting outage
Ukraine Power Grid Cyber Attack
Cyber Attack : Potential Scenario
❏ KillDisk overwrote critical system files on operator machines
❏ causing them to crash and become inoperable
❏ KillDisk overwrites the master boot record
❏ the infected computers could not reboot
❏ KillDisk components had to be manually set,but
❏ the attackers used a logic bomb that launched KillDisk
automatically about 90 minutes into the attack
Role of KillDisk in Ukraine Attack
KillDisk as a malware
❏ First known use of KillDisk Malware was reported by CERT
Ukraine in November 2015
❏ News media companies were attacked at the time of the
2015 Ukrainian local elections
❏ A large number of video materials and various documents
were destroyed as a result of the attack
KillDisk as a ransomware
Lately:
❏ KillDisk disk wiper malware is back with new variants - Killdisk
Ransomware
❏ Targeting Windows and Linux Machines and servers
❏ Data encrypted
❏ Demands for unusually large ransom in Bitcoins
For Linux Systems:
❏ Encryption key is not stored anywhere on disk/server
❏ Even after paying ransom, one might not get decryption key
KillDisk as a ransomware
FBI advises - Pay off the criminals to get your files back if you don't have a backup
❏ KillDisk is a data sanitization tool capable of
❏ destroying 4000 different file types
❏ rendering machine unbootable
❏ killing processes and services on a server
❏ wiping off the whole hard disk
❏ Thus apparently,KillDisk is a data destroying parasite
❏ Categorised as an anti-forensic tool
❏ Only way to be safe is prevention
KillDisk : Conclusion
❏ Awareness within the organizations
❏ Regular backups
❏ Do not click on links provided in emails
❏ Do not open attachments from unknown sources
❏ Updated Antivirus Software
KillDisk : Prevention measures
 https://www.lifewire.com/killdisk-review-2619139
 http://www.killdisk.com/downloads/killdisk.pdf
 https://en.wikipedia.org/wiki/December_2015_Ukraine_power_grid_cyberattack
 https://www.makeuseof.com/tag/ukraines-power-grid-hacked-happen/
 https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-
attacks-ukrainian-electric-power-industry/
 https://www.wired.com/2016/01/everything-we-know-about-ukraines-power-
plant-hack/
 https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-
power-grid/
 https://thehackernews.com/2016/01/Ukraine-power-system-hacked.html
 https://thehackernews.com/2017/01/linux-ransomware-malware.html
References

More Related Content

What's hot

HBase Blockcache 101
HBase Blockcache 101HBase Blockcache 101
HBase Blockcache 101Nick Dimiduk
 
ceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-shortceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-shortNAVER D2
 
eMMC Embedded Multimedia Card overview
eMMC Embedded Multimedia Card overvieweMMC Embedded Multimedia Card overview
eMMC Embedded Multimedia Card overviewVijayGESYS
 
Run Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using YoctoRun Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using YoctoMarco Cavallini
 
Linux Porting to a Custom Board
Linux Porting to a Custom BoardLinux Porting to a Custom Board
Linux Porting to a Custom BoardPatrick Bellasi
 
Understanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panicUnderstanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panicJoseph Lu
 
Bootloaders (U-Boot)
Bootloaders (U-Boot) Bootloaders (U-Boot)
Bootloaders (U-Boot) Omkar Rane
 
Systemd: the modern Linux init system you will learn to love
Systemd: the modern Linux init system you will learn to loveSystemd: the modern Linux init system you will learn to love
Systemd: the modern Linux init system you will learn to loveAlison Chaiken
 
Open stack networking vlan, gre
Open stack networking   vlan, greOpen stack networking   vlan, gre
Open stack networking vlan, greSim Janghoon
 
Memory Mapping Implementation (mmap) in Linux Kernel
Memory Mapping Implementation (mmap) in Linux KernelMemory Mapping Implementation (mmap) in Linux Kernel
Memory Mapping Implementation (mmap) in Linux KernelAdrian Huang
 
Vmlinux: anatomy of bzimage and how x86 64 processor is booted
Vmlinux: anatomy of bzimage and how x86 64 processor is bootedVmlinux: anatomy of bzimage and how x86 64 processor is booted
Vmlinux: anatomy of bzimage and how x86 64 processor is bootedAdrian Huang
 
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Odinot Stanislas
 

What's hot (20)

HBase Blockcache 101
HBase Blockcache 101HBase Blockcache 101
HBase Blockcache 101
 
GPU Computing
GPU ComputingGPU Computing
GPU Computing
 
ceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-shortceph optimization on ssd ilsoo byun-short
ceph optimization on ssd ilsoo byun-short
 
eMMC Embedded Multimedia Card overview
eMMC Embedded Multimedia Card overvieweMMC Embedded Multimedia Card overview
eMMC Embedded Multimedia Card overview
 
Run Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using YoctoRun Qt on Linux embedded systems using Yocto
Run Qt on Linux embedded systems using Yocto
 
Linux Porting to a Custom Board
Linux Porting to a Custom BoardLinux Porting to a Custom Board
Linux Porting to a Custom Board
 
Understanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panicUnderstanding a kernel oops and a kernel panic
Understanding a kernel oops and a kernel panic
 
Board Support Package Fact Sheet | Manual Guide
Board Support Package Fact Sheet | Manual GuideBoard Support Package Fact Sheet | Manual Guide
Board Support Package Fact Sheet | Manual Guide
 
Bootloaders (U-Boot)
Bootloaders (U-Boot) Bootloaders (U-Boot)
Bootloaders (U-Boot)
 
Embedded Operating System - Linux
Embedded Operating System - LinuxEmbedded Operating System - Linux
Embedded Operating System - Linux
 
Systemd: the modern Linux init system you will learn to love
Systemd: the modern Linux init system you will learn to loveSystemd: the modern Linux init system you will learn to love
Systemd: the modern Linux init system you will learn to love
 
Open stack networking vlan, gre
Open stack networking   vlan, greOpen stack networking   vlan, gre
Open stack networking vlan, gre
 
Memory Mapping Implementation (mmap) in Linux Kernel
Memory Mapping Implementation (mmap) in Linux KernelMemory Mapping Implementation (mmap) in Linux Kernel
Memory Mapping Implementation (mmap) in Linux Kernel
 
Docker, LinuX Container
Docker, LinuX ContainerDocker, LinuX Container
Docker, LinuX Container
 
Linux device drivers
Linux device drivers Linux device drivers
Linux device drivers
 
Vmlinux: anatomy of bzimage and how x86 64 processor is booted
Vmlinux: anatomy of bzimage and how x86 64 processor is bootedVmlinux: anatomy of bzimage and how x86 64 processor is booted
Vmlinux: anatomy of bzimage and how x86 64 processor is booted
 
Embedded Linux Kernel - Build your custom kernel
Embedded Linux Kernel - Build your custom kernelEmbedded Linux Kernel - Build your custom kernel
Embedded Linux Kernel - Build your custom kernel
 
Linux Internals - Part II
Linux Internals - Part IILinux Internals - Part II
Linux Internals - Part II
 
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
 
Node ppt
Node pptNode ppt
Node ppt
 

Similar to killdisk and its use in ukraine hacks

Windows optimization and customization
Windows optimization and customizationWindows optimization and customization
Windows optimization and customizationHiren Mayani
 
kbrgwillis.pdf
kbrgwillis.pdfkbrgwillis.pdf
kbrgwillis.pdfKblblkb
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxchristinemaritza
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptSuman Sudheer
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive EraserJemma Elliott
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetChristophe Elut
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingCTruncer
 
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UKZephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UKHARDWARIO
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]Phil Huggins FBCS CITP
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgSam Bowne
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERJohndion Ruloma
 

Similar to killdisk and its use in ukraine hacks (20)

Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
Windows optimization and customization
Windows optimization and customizationWindows optimization and customization
Windows optimization and customization
 
kbrgwillis.pdf
kbrgwillis.pdfkbrgwillis.pdf
kbrgwillis.pdf
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 
Hard Disk Data Acquisition
Hard Disk Data AcquisitionHard Disk Data Acquisition
Hard Disk Data Acquisition
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 ppt
 
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by SreelakshmiDeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
 
Protecting Hosts
Protecting HostsProtecting Hosts
Protecting Hosts
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
 
Deft
DeftDeft
Deft
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while Persisting
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UKZephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
 
Diagnostic software tools
Diagnostic software toolsDiagnostic software tools
Diagnostic software tools
 
Computers
ComputersComputers
Computers
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

killdisk and its use in ukraine hacks

  • 1. KillDisk and its use in hacks in Ukraine
  • 2. ❏ A quality security application that destroys data permanently from any computer . ❏ Access drive’s data on physical level via BIOS. ❏ Regardless of the OS, file systems or type of machine, it can destroy all data on all storage devices. ❏ Can be installed on the system or booted from a disk as well, which allows to clean the hard drive that has os installed to it. ❏ Support 24 International data sanitization methods. What is KillDisk?
  • 3. ❏ Bootable version allows to erase whole drive at once but have a text only interface. ❏ Installable version allows to erase things like flash drive and other internal hard drives and has a GUI. ❏ In order to use KillDisk from outside the OS, select the partition to wipe and press F10 to start. ❏ To run the KillDisk like a regular program open the Active KillDisk program. ❏ Bootable version can be created from the pre installed program using “Boot Disk Creator” option. KillDisk-Comparing the two ways
  • 4. ❏ Disk Erase (complete all disk's surface sanitation) for HDDs, SSDs, USBs. ❏ Supports preliminary Disk Examination for bad sectors. ❏ Displays Disks health diagnostics via S.M.A.R.T info and sectors inspection in advanced Disk Editor. ❏ Supports batch operations. ❏ Allows disk cloning after erase. ❏ Ability to start from Bootable CD/DVD or LiveUSB and erase disks on any PC. ❏ Mapping network shares ❏ Changing disk serial number Features
  • 5. ❏ Sound notifications for completed erase jobs with different results. ❏ Auto hibernate or shutdown the system after all jobs are completed. ❏ Supports verification, PDF Certificates & XML reports, emailing results, reports customization. ❏ Disk Wipe sanitation of unused clusters on live volumes for most file systems. ❏ Freeware or Demo product version provided for evaluation. ❏ Pricing : Software KillDisk - $39.95/license, Desktop KillDisk - $1900/box, Industrial KillDisk - $350 Features
  • 7. Supports 24 International sanitation methods : ❏ One Pass Zeros: Number of passes is fixed and cannot be changed. When the write head passes through a sector, it writes only zeros or a series of random characters. ❏ US DoD 5220.22-M: Write head passes over each sector three times. The first time with zeros (0x00), second time with 0xFF and the third time with random characters. ❏ Canadian OPS - II: Write head passes over each sector seven times (0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, Random). There is one final pass to verify random characters by reading. Erase Methods
  • 8. ❏ Russian GOST p50739-95: Write head passes over each sector two times. (0x00, Random). There is one final pass to verify random characters by reading. ❏ NSA 130-2: Write head passes over each sector two times (Random, Random). There is one final pass to verify random characters by reading. ❏ User Defined: User indicates the number of times the write head passes over each sector. Each overwriting pass is performed with a buffer containing random characters. Erase Methods
  • 9. The Erase Preferences tab allows for users to configure settings for the KillDisk erase procedures. ❏ Select entire disk ❏ Select exact area ❏ Erase method ❏ Erase verification ❏ Initialize after erase ❏ Write fingerprint ❏ Erase confirmation Disk Erase Options
  • 10. The disk wipe procedure, like with the erase procedure, allows you to specify the erase method used, as well as a few additional wipe-specific options. ❏ Entire disk wiped ❏ All volumes will be selected for wipe operation ❏ All unallocated space will be wiped ❏ Select a single partition to be wiped ❏ Erase method ❏ Erase verification ❏ Wipe unused cluster ❏ Wipe metadata and system files area ❏ Wipe slack space in file clusters Disk Wipe Options
  • 11. ❏ DBAN ❏ HDShredder ❏ HDDErase ❏ Disk Wipe ❏ CBL Data Shredder ❏ Macrorit Data Wiper Other players in the market
  • 12. Ukraine Power Grid Cyber Attack Source: https://www.youtube.com/watch?v=bV47gBsrDkc&feature=youtu.be
  • 13. 23 December 2015 First known successful cyber attack on power grid Coordinated multi-part attack on a number of regional power distribution centers in the region. Compromised information systems of three energy distribution companies in Ukraine Ukraine Power Grid Cyber Attack
  • 14. IMPACT: ❏ Blackout in a whole geographic area of Ukraine ❏ More than 50 substations went offline ❏ Service outage to customers ❏ More than 80,000 homes remained without electricity for a period of 1-6 hours ❏ Telephone lines were attacked preventing customers from reporting outage Ukraine Power Grid Cyber Attack
  • 15. Cyber Attack : Potential Scenario
  • 16. ❏ KillDisk overwrote critical system files on operator machines ❏ causing them to crash and become inoperable ❏ KillDisk overwrites the master boot record ❏ the infected computers could not reboot ❏ KillDisk components had to be manually set,but ❏ the attackers used a logic bomb that launched KillDisk automatically about 90 minutes into the attack Role of KillDisk in Ukraine Attack
  • 17. KillDisk as a malware ❏ First known use of KillDisk Malware was reported by CERT Ukraine in November 2015 ❏ News media companies were attacked at the time of the 2015 Ukrainian local elections ❏ A large number of video materials and various documents were destroyed as a result of the attack
  • 18. KillDisk as a ransomware Lately: ❏ KillDisk disk wiper malware is back with new variants - Killdisk Ransomware ❏ Targeting Windows and Linux Machines and servers ❏ Data encrypted ❏ Demands for unusually large ransom in Bitcoins For Linux Systems: ❏ Encryption key is not stored anywhere on disk/server ❏ Even after paying ransom, one might not get decryption key
  • 19. KillDisk as a ransomware FBI advises - Pay off the criminals to get your files back if you don't have a backup
  • 20. ❏ KillDisk is a data sanitization tool capable of ❏ destroying 4000 different file types ❏ rendering machine unbootable ❏ killing processes and services on a server ❏ wiping off the whole hard disk ❏ Thus apparently,KillDisk is a data destroying parasite ❏ Categorised as an anti-forensic tool ❏ Only way to be safe is prevention KillDisk : Conclusion
  • 21. ❏ Awareness within the organizations ❏ Regular backups ❏ Do not click on links provided in emails ❏ Do not open attachments from unknown sources ❏ Updated Antivirus Software KillDisk : Prevention measures
  • 22.  https://www.lifewire.com/killdisk-review-2619139  http://www.killdisk.com/downloads/killdisk.pdf  https://en.wikipedia.org/wiki/December_2015_Ukraine_power_grid_cyberattack  https://www.makeuseof.com/tag/ukraines-power-grid-hacked-happen/  https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again- attacks-ukrainian-electric-power-industry/  https://www.wired.com/2016/01/everything-we-know-about-ukraines-power- plant-hack/  https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines- power-grid/  https://thehackernews.com/2016/01/Ukraine-power-system-hacked.html  https://thehackernews.com/2017/01/linux-ransomware-malware.html References

Editor's Notes

  1. A data sanitization method is the specific way in which a data destruction program or file shredder overwrites the data on a hard drive or other storage device.
  2. Variations - Killdisk software, Desktop, Industrial S - Specific M - Measurable A - Attainable R - Relevant T - Time-bound
  3. US Army AR380-19 and US Air Force 5020 used the same approach as US DoD with a difference in the sequence in which sectors are overwritten.