Defending Against the Dragonfly Cyber Security Attacks

June 11, 2014

The age of malware specifically targeting industrial control systems (ICS) began in 2010 when Stuxnet1 was revealed to be disrupting operations at one of Iran’s nuclear enrichment facilities. Recently, a sophisticated malware, known as Dragonfly by some and Energetic Bear by others, was discovered executing cyber espionage on industrial facilities. This white paper analyzes the Dragonfly malware campaign, looking at its targets, its methods of attacks, its results and what it means for defending operations from similar attacks with the goal of improving cyber resilience. In the case of Dragonfly, the campaign dates back to late 2010 or early 2011. The public was first made aware of it when the Finnish security firm F-Secure posted a blog in June 2014 describing how the malware was used to search for industrial control systems (ICS)2 .

Spotlight

Integration Technologies, Inc

Intech has been providing network design, installation and support services since 1991. We provide managed services to businesses and non-profits in multiple industries, including healthcare, financial services, hospitality, distribution, real estate, legal and professional services. Our network engineers are certified with Microsoft, VMWare, Cisco and Citrix systems as well as A+/Network+ among others. We provide support for both on-site and cloud systems and specialize in multi-site and multi-state networks. We also provide disaster recovery, offsite backup, firewall security and complete voice and data structured cabling solutions.

OTHER WHITEPAPERS
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

Navigating the Changing Cyber Landscape in Australia

whitePaper | April 13, 2023

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

Read More
news image

The State of Ransomware 2022

whitePaper | April 20, 2022

Sophos' annual study of the real-world ransomware experiences of IT professionals working at the frontline has revealed an ever more challenging attack environment together with the growing financial and operational burden ransomware places on its victims. It also shines new light on the relationship between ransomware and cyber insurance, and the role insurance is playing in driving changes to cyber defenses.

Read More
news image

HackerPowered Security Report 2022 By HackerOne

whitePaper | March 14, 2023

Security automation cannot replace the creativity of humans. In fact, 92% of ethical hackers say they can find vulnerabilities scanners can’t. For the past six years, we’ve been surveying hackers to learn more about how they see the evolving security testing industry. We combine these insights with the world’s largest dataset of vulnerabilities to identify trends that inform our customers how to build an impactful security strategy.

Read More

Spotlight

Integration Technologies, Inc

Intech has been providing network design, installation and support services since 1991. We provide managed services to businesses and non-profits in multiple industries, including healthcare, financial services, hospitality, distribution, real estate, legal and professional services. Our network engineers are certified with Microsoft, VMWare, Cisco and Citrix systems as well as A+/Network+ among others. We provide support for both on-site and cloud systems and specialize in multi-site and multi-state networks. We also provide disaster recovery, offsite backup, firewall security and complete voice and data structured cabling solutions.

Events