Researchers  have discovered that hackers have evolved the Black Energy Malware to infiltrate other sectors. It was first seen when hackers used BlackEnergy to take down the Ukrainian Power grid affecking more than 1 million Ukrainians. Now Trend Micro is reporting that the malware have also been found along with KillDisk in a Ukrainian mining operation and railway system. Tim Erlin, director of IT security and risk strategy at Tripwire have the following comments on it.

[su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire :

“Industrial control systems aren’t limited to the energy sector, so it should be no surprise that BlackEnergy can and has been used in other industries. We may find that 2016 is the year of Industrial Control Systems for cybersecurity.

Attribution has always been tricky business in cybersecurity, but it’s clear that the BlackEnergy has expanded its footprint as a tool, whether the actors behind it are the same or not.

If your business has an industrial control system footprint, whether you’re in manufacturing, transportation or energy, now is the time to evaluate how you’re securing that environment.”[/su_note]

[su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire logoTripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]

Experts Comments

Stay Tuned! Our Information Security Experts Community is responding .....

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.