The major targets of Dragonfly were energy grid operators, electricity generation firms, petroleum pipeline operators, energy & industrial equipment providers located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.
The attackers managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to the energy supply in the affected countries.
While, its most ambitious attack campaign saw it compromise a number of industrial control system (ICS) equipment providers, infecting their software with a remote access-type Trojan, resulting the companies to install the malware when downloading software updates for computers running ICS equipment.
Get an inside look into the tools and tactics used by Dragonfly, so as to stay ahead of the risks posed by this widespread cyber-espionage by downloading this exclusive report on Dragonfly Cyber-espionage Attacks Against Energy Suppliers now.
Sign up here with your email