Darkness in the Ukraine Thomas Norlin, Account Executive – Denmark & Finland 1 The First of its Kind: Attackers Turn the Lights Off KNOWN TARGET: Three electric utility companies in Ukraine WHO W H A T H A P P E N E D: IMPACT 225,000 customers lost power “The big lesson here is that…someone actually brought down a power system through cyber means. That is an historic event, it has never occurred before.“ - Robert M. Lee, Cyber Warfare Operations Officer for the US Air Force 2 Step 1: Perimeter Compromise PERIMETER ****** ****** 1 Spear-phishing campaign Targeting employees 3 2 3 4 Endpoints infected Attackers gain access Reconnaissance Employees open email and malicious attachment Malware installs RATs to establish backdoor access Information and credentials are collected CyberArk Discovery & Audit (DNA) 4 Compromised Privileged Accounts – “Game Over” • Lose control of the data • Lose control of IT systems • Lose control of the business 5 Cyber Attacks Typically Start with Phishing “If an attacker sends out twenty to thirty phishing emails, there’s a good chance he’ll penetrate your network.” Verizon RISK Team (Threat Report: Privileged Account Exploits Shift the Front Lines of Cyber Security, November 2014) 6 An Attacker Must Obtain Insider Credentials “…100% of breaches involved stolen credentials.” Mandiant, M-Trends and APT1 Report 7 “APT intruders…prefer to leverage privileged accounts where possible, such as Domain Administrators, service accounts with Domain privileges, local Administrator accounts, and privileged user accounts.” Step 2: Lateral movement and escalation PERIMETER Lateral Movement VPN VPN OT Environment Using the credentials, attackers laterally move, learn the network and install KillDisk Attackers VPN into the OT environment and gain access to the control systems 8 Privilege Escalation Enables Asset Escalation 9 Privilege escalation drives asset elevation Domain Controllers Servers Endpoints 10 Step 3: Executed attack against electric grid… The Reality Outside: Attackers used their control to disconnect electricity breakers and cut power in regions across Ukraine 11 The Reality Inside: Attackers took control of the HMI software and disconnected the keyboard and mouse so that operators could not interfere. …and proactively prevented remediation Attackers simultaneously launched a DDoS attack against call centers And activated KillDisk malware – wiping all infected endpoints and servers 12 The Role of Privilege Used privileged access to launch a coordinated attack 3 Used credentials to laterally move and elevate privileges in IT and OT networks 2 Captured admin credentials from infected machines 1 13 And the attack surface is huge Privileged accounts are in every piece of hardware and software on the network • Windows systems • Unix systems • Databases 14 • Network devices • Hypervisors • Applications • SaaS applications • Social media portals • Industrial control systems Privileged Account Security – Now a Critical Security Layer 15 Comprehensive Controls on Privileged Activity Lock Down Credentials Isolate & Control Sessions Continuously Monitor Protect privileged passwords and SSH keys Prevent malware attacks and control privileged access Implement continuous monitoring across all privileged accounts Enterprise Password Vault SSH Key Manager Application Identity Manager 16 Privileged Session Manager On-Demand Privileges Unix and Windows Privileged Threat Analytics How Could CyberArk Help Make a breach attempt expensive, complexed and challenging for the attackers Once breached, Contain the breach from moving Latterly Detect anomalous use of privileged accounts 17 How could CyberArk help? Proactively secure all privileged and ICS credentials Rotate admin credentials after each use Establish a single, controlled access point into ICS systems Monitor privileged account use to detect anomalies Control applications to reduce the risk of malware-based attacks 18 Solution: CyberArk Discovery & Audit (DNA) ▪ Identifies all Privileged accounts and Pass-the-Hash vulnerabilities ▪ Standalone, easy to use tool ▪ Powerful scanning with minimal performance impact ■ Requires no installation ■ Consumes very low bandwidth ▪ Provides status and vulnerability of each Privileged account ▪ Creates Pass-the-Hash Organizational Vulnerability Map 19 Tak!! 20
© Copyright 2026 Paperzz