Behind the News: The Ragnar Locker Attack on Greek Natural Gas Supplier DESFA
Aug 30, 2022 | Radiflow team
What we know:
On August 20, 2022, SecNews.gr announced that Greek Natural Gas Supplier DESFA had a day earlier suffered a cyber attack on part of its IT infrastructure: “Cyber attack on DESFA by foreign hackers, through Ragnar Locker ransomware and data interception took place on August 19, 2022 at 18:42. Hackers infected the National Gas System Operator’s systems with ransomware and managed to steal sensitive employee and customer data and information.”
Sometime later, leaked DESFA files showed up on the dark web:
Apparently, the hacker/blackmailers essentially have been stealing files from DESFA for a long time, and have threatened to share these files if the ransom is not paid.
At current, according to DataBreachToday, 361 gigabytes of what appears to be confidential data belonging to Greek national natural gas pipeline operator DESFA, after DESFA refused to negotiate with the hackers.
Among the leaked documents, some of which were posted on SecNews are engineering designs and budget and revenue documents, in addition to several files that appear to be future budget and past revenue spreadsheets; copies of non-disclosure agreements with customers and partners; engineering designs and their backups in a directory format (the authenticity of the data could not be immediately verified.) It is not clear the types and the extent of stolen personal data (PII).
According to DESFA, all industrial operations (OT) related to the Greek national natural gas system kept operating as usual and the damage was only to the IT of DESFA. “The management of the NNGS continues to operate smoothly and DESFA continues to supply natural gas to all entry and exit points of the country safely and adequately”
Insights
Even though they have announced ceasing operations in 2021, the Ragnar Locker gang is very much active
Given that the hackers published files stolen from DESFA’s IT environment, and that, according to DESFA, some of its systems were affected by a cyberattack, our assessment is that the hackers had probably leveraged weak authentication mechanisms or social engineering vectors to penetrate into the enterprise network
The DESFA attack was similar in nature to previous Ragnar Locker attacks, especially to the attack on the Colonial Pipeline (US)
Unlike the Colonial Pipeline attack which caused the victim to shut down its production operations (probably as a precaution), this time the victim, DESFA, stated that it “…continues to supply natural gas to all entry and exit points of the country safely and adequately.”
Recommendations
DESFA’s ability to maintain continuity of its OT operations was probably achieved thanks to the implementation of proper security controls between the breached IT environment and OT the networks which continued to function.
Critical infrastructure utilities should, accordingly, take action in two parallel paths:
Improve IT security to prevent external threat vectors
Build OT cyber resilience through a number of vectors:
Risk assessment: assessing the risk posed to the organization by a cyber attack on each and every operational unit enables prioritizing the most effective mitigation measures per dollar spent, thus maximizing the ROI on OT security expenditure
IT/OT segmentation: segmentation plays an important role in preventing advanced cyber attacks, as they tend to employ lateral trans-network movement and attempts to breach the IT-OT conduits
Network Visibility: A system for continuously updated network visibility, with access to all asset state/properties, would enable tracking the spread of ransomware in real time, for much better handling of breach incidents.
Two-Factor Authentication: The spread of ransomware can be avoided by implementing 2FA , especially for remote access, and make sure employees have strong passwords and are well aware of phishing and another social-engineering attacks
DESFA’s ability to maintain continuity of its OT operations was probably achieved thanks to the implementation of proper security controls between the breached IT environment and OT the networks which continued to function.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.