BlackEnergy

Malware updated 4 months ago (2024-05-04T20:53:32.718Z)
Download STIX
Preview STIX
BlackEnergy is a potent malware toolkit that has been utilized by criminal and Advanced Persistent Threat (APT) actors since 2007. Its destructive capabilities were notably demonstrated in Ukraine where it was used for cyber-espionage, compromising industrial control systems, and launching attacks against media companies. The Sandworm group, also known as BlackEnergy APT, operating under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST), first employed BlackEnergy in attacks against Ukraine in 2015. The malware can infiltrate systems through malicious Microsoft Office documents; once opened, it deploys the BlackEnergy 3 malware variant. The Industroyer main backdoor's strong code similarity to the Win32/Exaramel backdoor is the first public evidence linking Industroyer to TeleBots, and consequently to NotPetya and BlackEnergy. This linkage suggests that these tools are part of a larger arsenal employed by the same threat actors. Notable instances include the disruption of Ukraine's power grid in 2016 with the use of BlackEnergy malware by Russian threat actors, and other high-profile attacks on critical infrastructure networks. Despite their age, these tools remain active threats, demonstrating their lasting effectiveness. The evolution of the BlackEnergy malware is evident in its successors, GreyEnergy and Kapeka. These new variants share conceptual overlaps with BlackEnergy, suggesting a continuous development and refinement of this malware family. It is speculated that Kapeka is a successor to GreyEnergy, which itself likely replaced BlackEnergy in Sandworm's arsenal. These developments highlight the persistent and evolving nature of cyber threats posed by sophisticated actors like Sandworm.
Description last updated: 2024-04-30T21:16:44.241Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Sandworm
5
Sandworm, a Russia-linked threat actor group, has been implicated in a series of significant cyber-attacks targeting Ukraine's infrastructure. The group successfully compromised 11 Ukrainian telecommunication providers, demonstrating their extensive capabilities and the broad reach of their operatio
Industroyer
4
Industroyer, also known as CrashOverride, is a potent malware specifically designed to target Industrial Control Systems (ICS) used in electrical substations. It first gained notoriety for its role in the 2016 cyberattack on Ukraine's power grid, which resulted in a six-hour blackout in Kyiv. The ma
GreyEnergy
4
GreyEnergy is a type of malware, or malicious software, designed to exploit and damage computer systems. It is believed to have been used in attacks on Ukraine's power grid in 2018 by the Russia-linked Advanced Persistent Threat (APT) group, Sandworm. Security firm WithSecure has identified overlaps
Telebots
3
TeleBots, a notorious threat actor group also known as Sandworm, BlackEnergy, Iron Viking, Voodoo Bear, and Seashell Blizzard, has been identified as operating under the control of Unit 74455 of the Russian GRU's Main Center for Special Technologies (GTsST). Active since 2000, the group is recognize
Sandworm Team
2
The Sandworm Team, a threat actor associated with Russia's military intelligence-linked group, has demonstrated significant capabilities in developing custom malware to target Operational Technology (OT) and Industrial Control Systems (ICSs). Since at least 2015, the team has used the "BlackEnergy"
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Trojan
Apt
Espionage
Ukraine
Russia
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
NotPetyais related to
4
NotPetya is a notorious malware that emerged in 2017, widely attributed to the Russian hacking group APT28, also known as Sandworm. This malicious software was primarily an act of cyberwar against Ukraine, delivered through updates to MeDoc accounting software, a technique known as a supply chain at
Kapekais related to
4
Kapeka is a previously unknown malware that operates as a backdoor into systems, linked to the Russian Sandworm Advanced Persistent Threat (APT) group. The malicious software can infiltrate a system through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, i
StuxnetUnspecified
2
Stuxnet, discovered in 2010, is one of the most notorious malware attacks in history, primarily targeting Windows systems, programming logic controllers (PLCs), and supervisory controls and data acquisition (SCADA) systems. The military-grade cyberweapon was co-developed by the United States and Isr
GoziUnspecified
2
Gozi is a notorious malware that has been linked to numerous cyber attacks. It's typically delivered through sophisticated malvertising techniques, often used in conjunction with other initial access malware such as Pikabot botnet agent and IcedID information stealer. When an individual accesses a c
ZeusUnspecified
2
Zeus is a notorious form of malware, or malicious software, designed to exploit and damage computer systems. It infiltrates devices often without the user's knowledge via suspicious downloads, emails, or websites. Once embedded within a system, Zeus can steal personal information, disrupt operations
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
QuedaghUnspecified
2
None
GamaredonUnspecified
2
Gamaredon, a Russian Advanced Persistent Threat (APT) group, has been identified as a significant threat actor in the cybersecurity landscape. Notably, it has employed the USB worm LitterDrifter in a series of cyberattacks against Ukraine, demonstrating its capacity for sophisticated and disruptive
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
CVE-2014-4114Unspecified
2
CVE-2014-4114 is a significant vulnerability that lies within the design or implementation of software. This flaw specifically targets the Microsoft Windows OLE Package Manager, enabling remote code execution. The exploit was primarily used in .pps files, which are PowerPoint presentation files, mak
Source Document References
Information about the BlackEnergy Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
4 months ago
To Damage OT Systems, Hackers Tap USBs, Old Bugs & Malware
Securityaffairs
5 months ago
Previously unknown Kapeka backdoor linked to Sandworm APT
DARKReading
5 months ago
Dangerous New ICS Malware Targets Orgs in Russia and Ukraine
BankInfoSecurity
5 months ago
Likely Sandworm Hackers Using Novel Backdoor 'Kapeka'
CERT-EU
6 months ago
Operational Technology Threats - ReliaQuest
DARKReading
6 months ago
Improved, Stuxnet-Like PLC Malware Aims to Disrupt Critical Infrastructure
Securityaffairs
8 months ago
Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months
CERT-EU
10 months ago
Advanced threat predictions for 2024 – GIXtools
Securelist
10 months ago
Kaspersky Security Bulletin: APT predictions 2024
Securityaffairs
10 months ago
Russian Sandworm disrupts power in Ukraine with a new OT attack
CERT-EU
a year ago
The Urgency for Robust Utility Cybersecurity
Securityaffairs
a year ago
Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers
CERT-EU
a year ago
Is Future Escalation in Cyber Conflict a Foregone Conclusion?
Securityaffairs
a year ago
Russia-linked hackers target Ukrainian military with Infamous Chisel Android malware
CERT-EU
a year ago
IT threat evolution in Q2 2023 – GIXtools
CERT-EU
a year ago
IT threat evolution Q2 2023
CERT-EU
a year ago
Gozi strikes again, targeting banks, cryptocurrency and more
CERT-EU
a year ago
US and Poland shut down Lolek Hosted bulletproof hosting platform
CERT-EU
a year ago
Recently Patched GE Cimplicity Vulnerabilities Reminiscent of Russian ICS Attacks
CERT-EU
a year ago
Cyberattacks on OT, ICS Lay Groundwork for Kinetic Warfare