Dragonfly Cyber Security Attacks

Download the white paper: "Defending Against the Dragonfly Cyber Security Attacks

Part B – Analyzing the Malware

Learn about the components of the Dragonfly malware campaign and how it signals a new era of Offense in Depth. The white paper details:


  • The arsenal of attack vectors used to infect organizations
  • The three malware components involved: Havex, Sysmain and Karagany
  • How Trojanized software from trusted supply chain vendors was a pathway to control systems
  • How the malware was updated over time through the use of a Command and Control infrastructure
  • New insights about ICS security gained from understanding Dragonfly

Complete the form and download the white paper.

You will receive both Part A – Identifying the Targets and Part B – Analyzing the Malware.

Additional parts of this white paper will be published soon. For up-to-date information and to receive additional sections, visit: Dragonfly Industrial Cyber Security Updates



Joel Langill is an independent ICS security expert who was commissioned by Belden to create this paper.

Joel has more than 30 years of field experience with industrial automation and control systems. He is the founder of the globally recognized website SCADAhacker.com and of RedHat Cyber, an industrial cyber security services firm.

Joel is an active ICS security researcher with numerous contributions to CERT organizations around the world.