Track Common Adversary Tasks Performed Using Backdoor.Oldrea
To know more about it, you can go through my detailed document by clicking here
Overview
Backdoor.Oldrea, as the name suggests, is a backdoor used by Dragonfly to target energy companies since 2013. It spreads through supply chain compromise and also contains special modules to enumerate as well as map ICS-specific systems, processes, and protocols. It's a Remote Access Trojan (RAT) and can easily communicate with Command and Control (C2) server, that deploys payloads and offers additional functionality.
Techniques Used
Some of the techniques used by the malware are:
- Automated Collection- Collects the information about the connected devices and send them to the server for the threat actors to analyze.
- Denial of Service- Sudden crash of the various OPC platforms may lead to the denial of service impact on the applications.
- Spearphishing Attachment- The malware can easily spread via the emails containing the malicious links or attachments.
- Point & Tag Identification- As the malware is capable of enumerating OPC tags, they can easily get information about the names and function of control devices.
- Supply Chain Compromise-The malware can also spread via malicious installers planted on compromised vendor sites.
Remedy
The following methods may help in mitigating the threat:
- Use an Antivirus.
- Carefully download online files.
- Use a firewall.
- Use a password manager.
- Regular security updates/patches.
To know more about it, you can go through my detailed document by clicking here
Comments
Post a Comment