Track Common Adversary Tasks Performed Using Backdoor.Oldrea

 




To know more about it, you can go through my detailed document by clicking here









Overview

Backdoor.Oldrea, as the name suggests, is a backdoor used by Dragonfly to target energy companies since 2013. It spreads through supply chain compromise and also contains special modules to enumerate as well as map ICS-specific systems, processes, and protocols. It's a Remote Access Trojan (RAT) and can easily communicate with Command and Control (C2) server, that deploys payloads and offers additional functionality.

Techniques Used

Some of the techniques used by the malware are:
  • Automated Collection- Collects the information about the connected devices and send them to the server for the threat actors to analyze. 

  • Denial of Service- Sudden crash of the various OPC platforms may lead to the denial of service impact on the applications.

  • Spearphishing Attachment- The malware can easily spread via the emails containing the malicious links or attachments.

  • Point & Tag Identification- As the malware is capable of enumerating OPC tags, they can easily get information about the names and function of control devices. 

  • Supply Chain Compromise-The malware can also spread via malicious installers planted on compromised vendor sites. 

Remedy

The following methods may help in mitigating the threat:
  1. Use an Antivirus.
  2. Carefully download online files.
  3. Use a firewall.
  4. Use a password manager.
  5. Regular security updates/patches.














To know more about it, you can go through my detailed document by clicking here















































Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Deployment (Part 2)