
The following account of events is based on the interagency team’s interviews with operations and information technology staff and leadership at six Ukrainian organizations with first-hand experience of the event. US critical infrastructure asset owners and operators can request access to this information by emailing DETAILS

ICS-CERT strongly encourages organizations across all sectors to review and employ the mitigation strategies listed below.Īdditional information on this incident including technical indicators can be found in the TLP GREEN alert (IR-ALERT-H-16-043-01P and subsequent updates) that was released to the US-CERT secure portal. This report is being shared for situational awareness and network defense purposes. This report provides an account of the events that took place based on interviews with company personnel. team and shared information to help prevent future cyber-attacks. The Ukrainian government worked closely and openly with the U.S. Computer Emergency Readiness Team (US-CERT), Department of Energy, Federal Bureau of Investigation, and the North American Electric Reliability Corporation traveled to Ukraine to collaborate and gain more insight. Public reports indicate that the BlackEnergy (BE) malware was discovered on the companies’ computer networks, however it is important to note that the role of BE in this event remains unknown pending further technical analysis.Īn interagency team comprised of representatives from the National Cybersecurity and Communications Integration Center (NCCIC)/Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), U.S.

In addition, there have also been reports of malware found in Ukrainian companies in a variety of critical infrastructure sectors. On December 23, 2015, Ukrainian power companies experienced unscheduled power outages impacting a large number of customers in Ukraine. For more information on Russian malicious cyber activity, refer to /Russia.

Government attributes this activity to Russian nation-state cyber actors and assess that Russian nation-state cyber actors conducted a cyber campaign against Ukrainian critical infrastructure.
