GreyEnergy malware uses junk code and anti-analysis techniques to evade detection

clock
Cyber-attacks launched by BlackEnergy left 230,000 people in Ukraine without electricity in December 2015. Image via Pixabay
Image:

Cyber-attacks launched by BlackEnergy left 230,000 people in Ukraine without electricity in December 2015. Image via Pixabay

GreyEnergy is thought to be the successor of another Russia-linked hacking group called BlackEnergy

An analysis of the malware linked with the 2015 cyber-attacks on the Ukrainian power grid reveals that hackers added a large amount of junk code to their malware in a bid to evade detection and to ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Security

Register now: Prevent, protect and recover from ransomware

Register now: Prevent, protect and recover from ransomware

A company is hit by ransomware every 11 seconds.

clock 28 June 2022 • 1 min read
Neither Windows 10 nor 11, as well as other related tools, are available in the country

Microsoft blocks Windows downloads in Russia

Was it a deliberate move or just a mistake?

clock 21 June 2022 • 2 min read
Have a plan for recovery, and then have a backup plan for when the first falls through

Identify your "vital ground" or your cyber effort is wasted

And the road to recovery is to plan, plan and plan again

Tom Allen
clock 16 June 2022 • 3 min read