Other
BlackEnergy/KillDisk: First Cyberattack Causing a Power Outage (Ukraine, Sandworm)
Primary Source βIncident Details
On December 23, 2015, coordinated cyberattacks against three Ukrainian electricity distribution companies β Prykarpattyaoblenergo, Chernivtsioblenergo, and Kyivoblenergo β caused the first confirmed power outages attributed to a cyberattack in history. Approximately 230,000 consumers lost power for 1β6 hours during a Ukrainian winter evening. The attack used BlackEnergy3 malware delivered via spear-phishing emails with malicious Word documents to electric company employees. After establishing persistent access for months, on December 23 the attackers simultaneously: (1) opened breakers via remote SCADA access to cut power; (2) deployed KillDisk to wipe SCADA workstation operating systems, preventing quick recovery; (3) conducted telephone denial-of-service attacks against customer call centers to delay public awareness. The attackers also manipulated UPS systems and serial-to-Ethernet converters at substations. Recovery required field engineers to manually restore each breaker. The attack was attributed to Sandworm (GRU Unit 74455). US-CERT and CISA issued joint advisories. This attack was a watershed moment in ICS/OT security, demonstrating that cyber operations could achieve kinetic (physical world) effects against civilian infrastructure β and preceded the more sophisticated Industroyer attack one year later.
Technical Details
- Initial Attack Vector
- Sandworm (GRU) sent spear-phishing emails with malicious Microsoft Word documents containing BlackEnergy3 macros to Ukrainian energy company employees; gaining access to IT networks before pivoting to SCADA systems; operators were locked out via KillDisk wiping workstations while attackers opened breakers via VPN
- Vendor / Product
- Microsoft Office (macro); ICS SCADA systems
- Malware Family
- BlackEnergy3; KillDisk
Timeline
- 2015-12-23 Breach occurred
- 2016-01-07 Publicly disclosed