Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Mississippi's Age Guarantee Act Tests Decentralized Social Networks

    August 28, 2025

    Threads test how to share long format text on the platform

    August 28, 2025

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025

    Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

    August 27, 2025

    Google Vids adds AI avatars to the video editor and launches the consumer version

    August 27, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

    August 28, 2025

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025
TechBrunchTechBrunch

Hackers use malware to shut down heating in Ukrainian cities, researchers say

TechBrunchBy TechBrunchJuly 23, 20245 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Security researchers and Ukrainian authorities have concluded that for two days in mid-January, some Ukrainians in the city of Lviv were forced to go without central heating and suffered freezing cold due to a cyberattack on the city's energy company.

On Tuesday, cybersecurity firm Dragos published a report detailing a new piece of malware called FrostyGoop that the company said is designed to target industrial control systems, in this case specifically a type of heating system controller.

Dragos researchers wrote in a report that they first detected the malware in April. At the time, Dragos didn't have any details about FrostyGoop beyond the malware sample and believed it was only used for testing purposes. But Ukrainian authorities later alerted Dragos that they had found evidence of the malware being actively used in a cyberattack that took place in Lviv between late night on January 22 and January 23.

“As a result, more than 600 apartments were left without heat for nearly 48 hours,” Dragos researcher Magpie Graham said in a conference call with reporters briefed on the report ahead of its release.

“Clearance efforts to recover from the incident took nearly two days, during which civilians endured subzero temperatures,” Dragos researchers Graham, Kyle O'Meara and Carolyn Ahlers wrote in their report.

This is the third known outage linked to a cyberattack that has hit Ukraine in recent years, and while researchers say the malware is unlikely to cause widespread outages, it does indicate that malicious hackers are stepping up their efforts to target critical infrastructure such as the energy grid.

Dragos said that because the FrostyGoop malware is designed to communicate with industrial control devices (ICS) via Modbus, a decades-old protocol used widely around the world to control devices in industrial environments, FrostyGoop could potentially be used to target other companies and facilities.

“There are currently at least 46,000 internet-exposed ICS devices that allow Modbus,” Graham told reporters.

Dragos said FrostyGoop is the ninth ICS-specific malware it has encountered in recent years. The most notorious is Industroyer (aka CrashOverride), which was used by the notorious Russian government-linked hacker group Sandworm to turn off the lights in Kiev and then shut down a Ukrainian power substation. Beyond these cyberattacks targeting Ukraine, Dragos has also seen Triton deployed at a Saudi petrochemical plant and then an unknown second facility, as well as the CosmicEnergy malware discovered by Mandiant last year.

Contact Us Do you have more information about this cyberattack or similar attacks targeting ICS in Ukraine or elsewhere? You can securely contact Lorenzo Franceschi-Bicchierai from a non-work device via Signal (+1 917 257 1382), Telegram, Keybase @lorenzofb, or email. You can also contact TechCrunch via SecureDrop.

Dragos researchers wrote that they believe the hackers controlling the FrostyGoop malware first gained access to the targeted municipal energy company's network by exploiting a vulnerability in an internet-exposed Mikrotik router. The router, along with other servers and controllers, including those made by Chinese company ENCO, were not “properly segmented,” the researchers said.

Graham said on the call that he found open ENCO controllers in Lithuania, Ukraine and Romania, and reiterated that while FrostyGoop was used in the targeted attack in Lviv, the hackers who control it can target malware elsewhere.

ENCO and its employees did not immediately respond to TechCrunch's request for comment.

“The attackers did not attempt to destroy the controllers. Instead, they caused the controllers to report inaccurate measurements, resulting in the system malfunctioning and loss of heat to customers,” the researchers wrote.

During their investigation, the researchers said they concluded that the hackers “likely gained access” to the targeted network in April 2023, nearly a year before they deployed the malware and stopped the attack. The hackers continued to access the network in the following months, connecting through a Moscow IP address on Jan. 22, 2024, according to the report.

Despite the Russian IP addresses, Dragos did not point to any specific hacking group or government as responsible for the cyber outages because it was unable to find any links to previous activity or tools and because of the company's long-standing policy of not accepting responsibility for cyberattacks, Graham said.

Graham actually said that he and his colleagues believe the sabotage operation was carried out over the internet rather than by firing missiles at the facility, presumably to undermine the morale of the Ukrainians living there.

“This is very much a psychological effort, and I think it was perhaps facilitated by cyber means at a time when physical means were not the best option,” Graham said.

Finally, Phil Tonking, Dragos' field chief technology officer, said it's important not to underestimate FrostyGoop, but also not to overestimate it.

“It's important to recognize that this is something that is in use,” he said on a conference call with reporters. “And it's also really important that we don't think of this as something that's going to immediately shut down the national grid.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.