ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > Energetic Bear, Dragonfly

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Energetic Bear, Dragonfly

NamesEnergetic Bear (CrowdStrike)
Dragonfly (Symantec)
Crouching Yeti (Kaspersky)
Group 24 (Talos)
Koala Team (iSight)
Iron Liberty (SecureWorks)
TG-4192 (SecureWorks)
Electrum (Dragos)
ATK 6 (Thales)
ITG15 (IBM)
Bromine (Microsoft)
Ghost Blizzard (Microsoft)
Blue Kraken (PWC)
CountryRussia Russia
SponsorState-sponsored, GRU
MotivationSabotage and destruction
First seen2010
DescriptionDragonfly is a cyberespionage group that has been active since at least 2011. They initially targeted defense and aviation companies but shifted to focus on the energy sector in early 2013. They have also targeted companies related to industrial control systems.

According to Kaspersky, Crouching Yeti has been operating since at least 2010 and has infected roughly 2,800 targets in 38 countries, and in industries as diverse as education and pharmaceuticals.

A similar group emerged in 2015 and was identified by Symantec as Berserk Bear, Dragonfly 2.0. There is debate over the extent of the overlap between Dragonfly and Dragonfly 2.0, but there is sufficient evidence to lead to these being tracked as two separate groups.
ObservedSectors: Aviation, Construction, Defense, Education, Energy, Industrial, IT, Manufacturing, Oil and gas, Pharmaceutical.
Countries: Canada, France, Germany, Greece, Italy, Norway, Poland, Romania, Russia, Serbia, Spain, Turkey, UK, Ukraine, USA.
Tools usedCommix, CrackMapExec, Dirsearch, Dorshel, Goodor, Havex RAT, Hello EK, Heriplor, Impacket, Industroyer, Inveigh, Karagany, LightsOut EK, Listrix, nmap, PHPMailer, PsExec, SMBTrap, sqlmap, Subbrute, Sublist3r, Sysmain, Wpscan, WSO.
Operations performedFeb 2013Spam campaign
The Dragonfly group has used at least three infection tactics against targets in the energy sector. The earliest method was an email spear phishing campaign, which saw selected executives and senior employees in target companies receive emails containing a malicious PDF attachment. Infected emails had one of two subject lines: “The account” or “Settlement of delivery problem”.
<https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf>
Jun 2013Watering Hole Attacks using Lightsout
In June 2013, the attackers shifted their focus to watering hole attacks. They compromised a number of energy-related websites and injected an iframe into each of them. This iframe then redirected visitors to another compromised legitimate website hosting the Lightsout exploit kit. This in turn exploited either Java or Internet Explorer in order to drop Oldrea or Karagany on the victim’s computer.
Sep 2013Watering Hole Attacks using Hello
In September 2013, Dragonfly began using a new version of this exploit kit, known as the Hello exploit kit. The landing page for this kit contains JavaScript which fingerprints the system, identifying installed browser plugins. The victim is then redirected to a URL which in turn determines the best exploit to use based on the information collected.
2013Trojanized software
The most ambitious attack vector used by Dragonfly was the compromise of a number of legitimate software packages. Three different ICS equipment providers were targeted and malware was inserted into the software bundles they had made available for download on their websites.
Feb 2014LightsOut EK Targets Energy Sector
Late last year, the story broke that threat actors were targeting the energy sector with Remote Access Tools and Intelligence gathering malware. It would seem that the attackers responsible for this threat are back for more. This particular APT struck late February between 2/24-2/26.
<https://www.zscaler.com/blogs/research/lightsout-ek-targets-energy-sector>
Dec 2015Attack on Energy Companies in the Ukraine
According to a statement posted this week on the official website of the Ukrainian security service SBU, Russian special services allegedly planted malware on the networks of several regional power companies. The malicious software is said to have been discovered by employees of the SBU.
The SBU said the attackers also flooded the targeted companies’ technical support phone lines. The agency removed the malware and launched an investigation.
Just before Christmas, power outages were reported in the Ivano-Frankivsk Oblast region of Ukraine. The outages were blamed on outsiders who remotely tampered with automatic control systems. The power company responsible for the region also reported that its call center suffered a technical failure caused by a barrage of calls.
<https://ssu.gov.ua/sbu/control/uk/publish/article?art_id=170951&cat_id=39574>
2016This report by Kaspersky Lab ICS CERT presents information on identified servers that have been infected and used by the group. The report also includes the findings of an analysis of several webservers compromised by the Energetic Bear group during 2016 and in early 2017.
<https://securelist.com/energetic-bear-crouching-yeti/85345/>
Dec 2016Power outage at Ukrenergo in the Ukraine
Preliminary findings indicate that workstations and Supervisory Control and Data Acquisition (SCADA) systems, linked to the 330 kilowatt sub-station “North”, were influenced by external sources outside normal parameters, Ukrenergo said in comments emailed to Reuters.
<https://www.reuters.com/article/us-ukraine-cyber-attack-energy-idUSKBN1521BA>
<https://dragos.com/wp-content/uploads/CrashOverride-01.pdf>
<https://dragos.com/wp-content/uploads/CRASHOVERRIDE.pdf>
Apr 2017Breach of EirGrid in the UK
The breach of the Vodafone network allowed the hackers to create a type of wiretap known as Generic Routing Encapsulation (GRE) to tunnel into EirGrid’s Vodafone router located in Shotton.
<https://www.independent.ie/irish-news/statesponsored-hackers-targeted-eirgrid-electricity-network-in-devious-attack-36005921.html>
May 2017Watering Hole Attack on Turkish critical infrastructure
Through our web crawling network, we were able to determine that a website belonging to a Turkish energy company was being used in a watering hole attack targeting people associated with Turkish critical infrastructure. Compromised via a supply chain attack, the site was injected with SMB credential-harvesting malware.
<https://www.riskiq.com/blog/labs/energetic-bear/>
Mar 2020Breach of San Francisco airport
<https://www.zdnet.com/article/russian-state-hackers-behind-san-francisco-airport-hack/>
Sep 2020The Russian state-sponsored APT actor has targeted dozens of SLTT government and aviation networks, attempted intrusions at several SLTT organizations, successfully compromised network infrastructure, and as of October 1, 2020, exfiltrated data from at least two victim servers.
<https://us-cert.cisa.gov/ncas/alerts/aa20-296a>
Counter operationsOct 2020Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace
<https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and>
Mar 2022US charges 4 Russian govt employees with critical infrastructure hacks
<https://www.bleepingcomputer.com/news/security/us-charges-4-russian-govt-employees-with-critical-infrastructure-hacks/>
Information<https://www.symantec.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks>
<https://www.kaspersky.com/resource-center/threats/crouching-yeti-energetic-bear-malware-threat>
<https://www.sans.org/reading-room/whitepapers/ICS/impact-dragonfly-malware-industrial-control-systems-36672>
<https://exchange.xforce.ibmcloud.com/threat-group/388909715625410bd48078d0ddbc29c4>
MITRE ATT&CK<https://attack.mitre.org/groups/G0035/>

Last change to this card: 13 March 2024

Download this actor card in PDF or JSON format

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]