Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Security Research

LightsOut for the Energy Sector

image
CLINTON KARR
March 14, 2014 - 1 min read

This week, Zscaler ThreatLabZ has published research focused on the LightOut exploit kit being used in a "watering hole" attack again the energy sector. You can read additional analysis on the well-respected security research blog, ThreatPost.

In late February, Zscaler ThreatLabZ security research discovered a “watering-hole” attack targeting the energy sector. “Watering-hole” attacks compromise legitimate Web sites where its intended victims are expected to visit. In this instance, the compromised Web site was a law firm that works with energy companies. The compromised Web site was serving the “LightsOut” exploit, which installs a Remote Access Trojan (RAT). This attack is similar to an attack against the energy sector last fall and is potentially related.

Attacks like these show the sophistication of motivated attackers. In the past, infected documents and malicious URLs delivered via email were the primary vector for targeted attacks; however, by infecting a legitimate Web site, such as this law firm, attackers can more effectively compromise their targets through a trusted channel. Additionally, that these attacks are against the energy sector should be a concern since recent FERC and NERC reports about physical infrastructure have indicated that substation compromise could bring down the entire power grid nationwide. Are energy companies doing enough to protect its IT infrastructure?

form submtited
Thank you for reading

Was this post useful?

Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.