Other
Industroyer/CrashOverride: Ukraine Power Grid Attack (Kyiv Blackout, Sandworm)
Primary Source βIncident Details
On December 17, 2016, exactly one year after the first Ukraine power grid attack (BlackEnergy 2015), Russian military intelligence (GRU Sandworm team) deployed Industroyer against Ukraine’s Pivnichna (Northern) transmission substation in Kyiv, cutting power to approximately 20% of the city (200,000+ customers) for approximately one hour. Unlike the 2015 attack which required manual operator manipulation, Industroyer (also known as CrashOverride) was the first ICS-native malware capable of directly speaking industrial communication protocols (IEC 60870-5-101, IEC 60870-5-104, IEC 61850, OPC DA) β enabling fully automated, scalable attacks against power grid equipment without requiring prior knowledge of specific configurations. Industroyer also targeted Siemens SIPROTEC protection relay modules to prevent automatic fault recovery after the blackout. A KillDisk wiper was deployed simultaneously to destroy workstations and prevent incident response. In April 2022, Sandworm attempted an upgraded attack (‘Industroyer2’) against Ukraine’s high-voltage transmission infrastructure β detected and blocked by Ukraine’s CERT-UA and ESET before it could cause a blackout. Industroyer is considered the most sophisticated grid-attack malware ever discovered and represents the evolution from the targeted manual approach of BlackEnergy 2015 to fully automated, protocol-native grid disruption capability.
Technical Details
- Initial Attack Vector
- Sandworm (GRU Unit 74455) deployed Industroyer malware that natively spoke industrial communication protocols (IEC 60870-5-101/104, IEC 61850, OPC DA) to directly communicate with and manipulate power grid SCADA/ICS equipment without requiring attackers to understand specific OT configurations
- Vendor / Product
- IEC 60870-5-101/104 SCADA; Siemens SIPROTEC relays (CVE-2015-5374)
- Malware Family
- Industroyer (CrashOverride); KillDisk
Timeline
- 2016-12-17 Breach occurred
- 2016-12-17 Publicly disclosed