From the course: Ethical Hacking: Denial of Service

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding BlackEnergy

Understanding BlackEnergy

From the course: Ethical Hacking: Denial of Service

Start my 1-month free trial

Understanding BlackEnergy

- [Instructor] There's been a lot of noise about an incident known as BlackEnergy as a result of attacks on the Ukraine critical infrastructure in 2014 reportedly by Russia. The term BlackEnergy variously refers to a threat actor, a botnet and a piece of malware. Let's have a look at what this really is. A variety of botnets can be used to conduct DDoS attacks, and BlackEnergy is one of the most popular with over 4,000 deployments having been detected. BlackEnergy started out as a web-based distributed denial of service botnet. But in 2008, its authors made significant modifications to the original version, and BlackEnergy 2 is now used for a much wider range of attacks. BlackEnergy is a sophisticated botnet, which consists of a command-and-control server and an implant. It has a number of interesting features: It actively hides from anti-malware products using encryption; it operates by injecting code into system processes; and it can target more than one IP address on a host name…

Contents