CrashOverride / Industroyer Malware
CrashOverrride is an industrial control system cyberattack launched in December 2016 that created a massive blackout in Kiev, Ukraine. Also known as Industroyer by security firm ESET, CrashOverride is a form of malware developed with capabilities to control electricity substation switches and circuit breakers on a wide scale.
The Industroyer / CrashOverrride malware doesn't need to target any zero-day exploits or unpatched security vulnerabilities to do its damage; instead it communicates directly with industrial hardware through communication protocols that were designed many years in the past without significant security in mind.
Industroyer Image Source: ESET
Following in the Footsteps of Stuxnet and BlackEnergy
CrashOverride also isn't the first form of malware to target electricity substations, as it followed an attack known as BlackEnergy that created a blackout in the Ukraine in 2015.
The CrashOverrride / Industroyer malware also shares similarities with the Stuxnet malware that targeted an Iranian power plant in 2010 and which also used its ability to communicate directly with industrial hardware to do its damage.
These forms of malware have brought to light just how vulnerable industrial environments — and most environments in our increasingly Internet of Things (IoT) world — can be to cyberattacks.
Defending against them requires a multilayer approach that can be difficult to apply when dealing with hardware and software systems that were developed many years ago without sophisticated — or even basic in many cases — security measures taken into consideration.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »List of Well-Known TCP Port Numbers
Port numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of port numbers are specified in... Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »