Sandstorm Blocked From Taking Down Ukrainian Energy Provider

April 14, 2022

The state-sponsored Russian hacking group, Sandstorm has tried unsuccessfully to take down a major Ukrainian energy supplier.

The attack was discovered by researchers from cybersecurity firm ESET in partnership with Ukraine’s Computer Emergency Response Team (CERT) before the hackers were able to complete the final phase of the attack on Friday, April 18.

CERT-UA says that “the implementation of [Sandstorm’s] malicious plan has so far been prevented”

According to the researchers, the attackers used a new variant of Industroyer malware for industrial control systems (ICS) and a new version of the CaddyWiper data destruction malware.

The ICS malware used in the attack is being tracked as Industroyer2, and researchers claimed that it was built with the source code of Industroyer, which was used in 2016 to disrupt electricity in Ukraine.

Other tools used in the attack include the PowerGap PowerShell script, which is used to add a Group Policy that downloads payload data and creates scheduled tasks, and Impacket, a tool used to remotely execute commands.

The researchers noted that it remains unknown how the attacker was able to compromise the environment and how they were able to move from the IT network into the ICS environment.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 2, 2026 AMD has agreed to acquire Intel in an all-stock transaction that would combine the two long-time x86 more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 31, 2026 In what would be its longest public-facing outage to date, China’s DeepSeek chatbot went offline for more more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn