Defending Against the Dragonfly Cyber Security Attacks

June 11, 2014

The age of malware specifically targeting industrial control systems (ICS) began in 2010 when Stuxnet1 was revealed to be disrupting operations at one of Iran’s nuclear enrichment facilities. Recently, a sophisticated malware, known as Dragonfly by some and Energetic Bear by others, was discovered executing cyber espionage on industrial facilities. This white paper analyzes the Dragonfly malware campaign, looking at its targets, its methods of attacks, its results and what it means for defending operations from similar attacks with the goal of improving cyber resilience. In the case of Dragonfly, the campaign dates back to late 2010 or early 2011. The public was first made aware of it when the Finnish security firm F-Secure posted a blog in June 2014 describing how the malware was used to search for industrial control systems (ICS)2 .

Spotlight

Icumulus

iCumulus is a new-age global fulfilment platform, leading the revolution of e-commerce, turning it into a totally shared & unified global economy. iCumulus connects your business to a network of global logistics providers, creating a unique shared ecosystem with the most competitive shipping rates. Unlike traditional logistics providers, iCumulus scales not by assets, staff or inventory, but by connecting true demand to supply ensuring best consumer experience. Our comprehensive cloud based e-fulfilment platform manages all distributions, purchasing, into store and consumer deliveries at no additional cost. We want our customers to be free to deal with what's important to them - service their customers, allowing them grow sales and reach new markets.

OTHER WHITEPAPERS
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More
news image

Cloud Security Survey 2023: Infrastructure Protection Best Practices

whitePaper | September 23, 2022

This survey was distributed by VMware User Group (VMUG) to their user base between July and September 2022. The responses were analyzed by the phoenixNAP team and key findings are presented in this document.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

2023 Data Protection Trends Executive Brief United States Edition

whitePaper | February 8, 2023

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 1175 in United States. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Read More
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

N-able N-central Security White Paper

whitePaper | June 22, 2023

As an integral component of your IT management system, N-able N-central® complements an organization’s existing security policies and infrastructures. N-able N-central consists of a number of components that were specifically designed to provide flexibility as well as to ensure the integrity of the security of the networks on which N-able Ncentral operates.

Read More

Spotlight

Icumulus

iCumulus is a new-age global fulfilment platform, leading the revolution of e-commerce, turning it into a totally shared & unified global economy. iCumulus connects your business to a network of global logistics providers, creating a unique shared ecosystem with the most competitive shipping rates. Unlike traditional logistics providers, iCumulus scales not by assets, staff or inventory, but by connecting true demand to supply ensuring best consumer experience. Our comprehensive cloud based e-fulfilment platform manages all distributions, purchasing, into store and consumer deliveries at no additional cost. We want our customers to be free to deal with what's important to them - service their customers, allowing them grow sales and reach new markets.

Events