2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) 2020
DOI: 10.1109/etfa46521.2020.9212128
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of Black Energy 3, Crashoverride, and Trisis, Three Malware Approaches Targeting Operational Technology Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…In short, according to Avira, we can say that Microsoft Protector may be sufficient for the user to satisfactorily protect their data, but it is also clear that it represents a reputable and reliable 'non-free' antivirus option. 24 With regards to users who do not have high levels of technical experience, it is difficult for them to correctly judge whether this product is sufficient to protect them or not. It can therefore represent an advantageous product for some, and a limited one for others.…”
Section: Related Workmentioning
confidence: 99%
“…In short, according to Avira, we can say that Microsoft Protector may be sufficient for the user to satisfactorily protect their data, but it is also clear that it represents a reputable and reliable 'non-free' antivirus option. 24 With regards to users who do not have high levels of technical experience, it is difficult for them to correctly judge whether this product is sufficient to protect them or not. It can therefore represent an advantageous product for some, and a limited one for others.…”
Section: Related Workmentioning
confidence: 99%
“…More recently, the Trisis [78] malware successfully attacked equipment employed in energy, oil, and gas control systems. Other research dealt with a combined analysis of BlackEnergy, Crashoverride, and Trisis [79], whereas Hemsley et al [80] discussed the history of ICS cyber incidents.…”
Section: Cybersecurity and Cti In Active Buildingsmentioning
confidence: 99%
“…The National Electric Sector Cybersecurity Organization Resource (NESCOR) conducted cyber-security assessment and grid failure scenarios for increase SG resilience [15] and Jauhar et al (2015) proposed model-based techniques [16] for its study. One could use reported vulnerability incidents and detailed cyber-attack vectors using MITRE's ATT&CK framework 2 , combining with databases provided by NVD 3 or CVE 4 . Dabrowski et al (2017) [17] commented on "Grid-shock", i.e., the problem of synchronizing attacks to destabilize the D R A F T power grid.…”
Section: Related Workmentioning
confidence: 99%
“…Over the years, attacks to Smart-Grid power control components, such as, the Stuxnet worm [1], Black Energy 3 [2], Crashoverride [3], and Trisis [4], were able to significantly damage Industrial Control Systems (ICS) [5]. In the first quarter of 2021 the US' East Coast oil supply chain, provided by Colonial Pipeline, was the target of a serious attack.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation