<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MZTJSD" height="0" width="0" style="display:none;visibility:hidden">
Dragonfly Cyber Security Attacks

Download the complete white paper: "Defending Against the Dragonfly Cyber Security Attacks"

In this white paper, you will learn about the Dragonfly malware campaign and how it signals a new era of Offense in Depth. The white paper details:

Part A  Identifying the Targets

DragonflyMalewareWP_CTA
  • The timeline of the attacks and an analysis of the ICS vendor companies that were compromised
  • The reasoning to conclude that the target of the malware campaign is likely the pharmaceutical sector

Part B  Analyzing the Malware

  • The arsenal of attack vectors used to infect organizations including three malware components: Havex, Sysmain and Karagany
  • How Trojanized software from trusted supply chain vendors was a pathway to control systems

Part C  Assessing the Consequences

  • Assessment of the consequences of the attack on enterprise and industrial networks
  • How the malware design could be dangerous to live process control operations

Part D  Defending Industrial Control Systems

  • How Dragonfly's "insider" tactics made it both difficult to detect and prevent
  • Ineffective Defenses for Dragonfly
  • Effective Defenses for Dragonfly

Complete the form and download the white paper.

Author

Joel-Langill

Joel Langill is an independent ICS security expert who was commissioned by Belden to create this paper.

Joel has more than 30 years of field experience with industrial automation and control systems. He is the founder of the globally recognized website SCADAhacker.com and of RedHat Cyber, an industrial cyber security services firm.

Joel is an active ICS security researcher with numerous contributions to CERT organizations around the world.