Dragonfly Cyber Security Attacks

Download the complete white paper: "Defending Against the Dragonfly Cyber Security Attacks"

The 2014 Dragonfly malware campaign is one of the few Advanced Persistent Threats (APTs) attacks on industrial control systems that has been extensively studied.

This classic white paper from SCADA security expert Joel Langill is a valuable learning tool for anyone involved with control system security today.It details:

How the Targets Were Identified - Part A

DragonflyMalewareWP_CTA
  • Follow Joel's logic as he examines the evidence and concludes that the target of the malware campaign is likely the pharmaceutical sector

A Detailed Analysis of the Malware - Part B

  • Learn about Dragonfly's "Offense in Depth" infection strategies and consider how they might be effective against your control network now
  • Techies - this section is for you. It includes a detailed analysis of Dragonfly's malware components.

Assessing the Consequences - Part C

Defending Industrial Control Systems - Part D

  • The above two sections are relevant for anyone currently doing risk assessments or designing Defense in Depth security measures
  • Consider how Dragonfly's "insider" tactics made it both difficult to detect and prevent
  • Review the descriptions of Ineffective and Effective Defenses for Dragonfly and apply them to your organization

Don't delay, complete the form and download the white paper today. You'll be on your way to improving  the cyber resiliency of your control network!

Author

Joel-Langill

Joel Langill is an independent ICS security expert who was commissioned by Belden to create this paper.

Joel has more than 30 years of field experience with industrial automation and control systems. He is the founder of the globally recognized website SCADAhacker.com and of RedHat Cyber, an industrial cyber security services firm.

Joel is an active ICS security researcher with numerous contributions to CERT organizations around the world.