{"id":51738,"date":"2021-06-29T09:36:24","date_gmt":"2021-06-29T01:36:24","guid":{"rendered":"https:\/\/version-2.com\/?p=51738"},"modified":"2023-01-04T18:06:08","modified_gmt":"2023-01-04T10:06:08","slug":"industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/06\/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid\/","title":{"rendered":"Industroyer: A cyber\u2011weapon that brought down a power grid"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"51738\" class=\"elementor elementor-51738\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a107dd4 elementor-widget elementor-widget-text-editor\" data-id=\"a107dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/version-2.com.tw\/wp-content\/uploads\/2022\/06\/0617.jpg\" alt=\"\" width=\"623\" height=\"415\"><\/p>\n\n<p>Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids<\/p>\n\n<p>On June 12<sup>th<\/sup> 2017, <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/12\/industroyer-biggest-threat-industrial-control-systems-since-stuxnet\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">ESET researchers published their findings<\/a> about unique malware that was capable of causing a widespread blackout. Industroyer, as they named it, was the first known piece of malware that was developed specifically to target a power grid.<\/p>\n<p>Indeed, Industroyer had been deployed to considerable effect a few months earlier \u2013 it caused thousands of homes in parts of Kyiv, Ukraine to lose power supplies for about an hour on December 17<sup>th<\/sup>, 2016, after the malware struck a local electrical substation. A few days later, ESET malware researcher <a href=\"https:\/\/www.welivesecurity.com\/author\/acherepanov\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Anton Cherepanov<\/a> would start dissecting Industroyer.<\/p>\n<h2>A ticking bomb<\/h2>\n<p>Once planted, Industroyer spread throughout the substation\u2019s network looking for specific industrial control devices whose communication protocols it could speak. Then, like a time bomb going off, it apparently opened every circuit breaker at once, while defying any attempts of the substation operators to regain easy control: if an operator tried to close a breaker, the malware opened it back up.<\/p>\n<p>To clean up its footprint, the malware unleashed a data wiper that was designed to leave the substation\u2019s computers inoperable and delayed the return to normal operations. Indeed, the wiper often failed, but had it been more successful, the consequences could have been much worse \u2013 especially in wintertime when a power outage can allow pipes filled with water to crack when they freeze.<\/p>\n<p>A final malicious act was made by the malware to disable some of the protective relays at the substation, but that failed too. Without functioning protective relays in place, the substation equipment could have been at high risk of damage when the operators eventually reestablished electric transmission.<\/p>\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2022\/06\/industroyer-300x94.jpg\" alt=\"\" width=\"901\" height=\"282\"><\/p>\n<p>As Cherepanov and fellow ESET researcher <a href=\"https:\/\/www.welivesecurity.com\/author\/lipovsky\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Robert Lipovsky<\/a> <a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Win32_Industroyer.pdf\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">said at the time<\/a>, the sophistication of Industroyer makes it possible to adapt the malware to any similar environment. In fact, the industrial communication protocols that Industroyer speaks are used not only in Kyiv, but also \u201cworldwide in power supply infrastructure, transportation control systems, and other critical infrastructure systems (such as water and gas)\u201d.<\/p>\n<p>On the other hand, considering how sophisticated Industroyer was, its impact was ultimately rather underwhelming, as <a href=\"https:\/\/www.youtube.com\/watch?v=oGE6xHEQyog\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">ESET researchers noted themselves<\/a> back in 2017. Perhaps it was only a test for future attacks, or perhaps it was a sign of what the group behind it could do.<\/p>\n<h2>The work of Sandworm<\/h2>\n<p>The shenanigans of the malware, ESET researchers noted, mirror the malicious intentions of the people who created it. At a <a href=\"https:\/\/www.youtube.com\/watch?v=oGE6xHEQyog\" bis_skin_checked=\"1\">Virus Bulletin conference in 2017<\/a>, Lipovsky highlighted that the \u201cattackers had to understand the architecture of a power grid, what commands to send, and how that will be achieved\u201d. Its creators went a long way to create this malware, and their objective was not just a power outage. \u201cSome clues in the Industroyer configuration suggest they wanted to cause equipment damage and malfunction\u201d.<\/p>\n<p><a href=\"https:\/\/www.eset.com\/us\/black-hat-2017-post\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">At Black Hat 2017<\/a>, Cherepanov also pointed out that it \u201cseems very unlikely anyone could write and test such malware without access to the specialized equipment used in the specific, targeted industrial environment\u201d.<\/p>\n<p>In October 2020, the <a href=\"https:\/\/www.justice.gov\/opa\/pr\/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">United States attributed the attack<\/a> to six officers belonging to&nbsp;Unit 74455, aka&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/03\/21\/sandworm-tale-disruption-told-anew\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Sandworm<\/a>, a unit within Russia\u2019s military intelligence agency GRU.<\/p>\n<h2>A comeback for Industroyer<\/h2>\n<p>Fast forward to 2022 and it\u2019s no surprise that in the weeks just before and after <a href=\"https:\/\/www.welivesecurity.com\/2022\/06\/03\/100-days-war-ukraine-conflict-cyberspace\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Russia\u2019s invasion<\/a> on February 24<sup>th<\/sup>, <a href=\"https:\/\/www.welivesecurity.com\/2022\/06\/02\/eset-threat-report-t12022\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">ESET telemetry showed<\/a> an increase in cyberattacks targeting Ukraine.<\/p>\n<p>On April 12<sup>th<\/sup>, together with CERT-UA, ESET researchers announced they had identified a new variant of Industroyer that targeted an energy supplier in Ukraine. <a href=\"https:\/\/www.welivesecurity.com\/2022\/04\/12\/industroyer2-industroyer-reloaded\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Industroyer2<\/a> had been scheduled to cut power for a region in Ukraine on April 8<sup>th<\/sup>; fortunately, the attack was thwarted before it could wreak further havoc on the war-torn country. ESET researchers assessed with high confidence that Sandworm was again responsible for this new attack.<\/p>\n<h2>A harbinger of things to come<\/h2>\n<p>In recent years, it\u2019s become more than clear that the world\u2019s critical infrastructure services are at major risk for disruptions. The string of <a href=\"https:\/\/www.welivesecurity.com\/2022\/04\/21\/critical-infrastructure-cyberattack-longer-think\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">incidents that have impacted critical infrastructure<\/a> in Ukraine (and, indeed, other parts of the world) have awakened much of the public to the risks of cyberattack-induced power outages, water supply interruptions, fuel distribution disruptions, loss of medical data and many other consequences that can do far more than just disrupt our daily routines \u2013 they can be truly life-threatening.<\/p>\n<p>Back in 2017, both Cherepanov and Lipovsky concluded their <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/12\/industroyer-biggest-threat-industrial-control-systems-since-stuxnet\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">research blog<\/a> with a warning that, five years later, still holds true: \u201cRegardless of whether or not the recent attack on the Ukrainian power grid was a test, it should serve as a wake-up call for those responsible for security of critical systems around the world\u201d.<\/p>\n<p>Author: <strong>Andr\u00e9 Lameiras<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Five years ago, ESET researchers released their analysi [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[461,40,61],"tags":[41,462],"class_list":["post-51738","post","type-post","status-publish","format-standard","hentry","category-year2021","category-eset","category-press-release","tag-eset","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industroyer: A cyber\u2011weapon that brought down a power grid - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industroyer: A cyber\u2011weapon that brought down a power grid - Version 2\" \/>\n<meta property=\"og:description\" content=\"Five years ago, ESET researchers released their analysi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T01:36:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-04T10:06:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com.tw\/wp-content\/uploads\/2022\/06\/0617.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/06\\\/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Industroyer: A cyber\u2011weapon that brought down a power grid\",\"datePublished\":\"2021-06-29T01:36:24+00:00\",\"dateModified\":\"2023-01-04T10:06:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/06\\\/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid\\\/\"},\"wordCount\":807,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com.tw\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0617.jpg\",\"keywords\":[\"ESET\",\"2021\"],\"articleSection\":[\"2021\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/06\\\/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid\\\/\",\"url\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/\",\"name\":\"Industroyer: A cyber\u2011weapon that brought down a power grid - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com.tw\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0617.jpg\",\"datePublished\":\"2021-06-29T01:36:24+00:00\",\"dateModified\":\"2023-01-04T10:06:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com.tw\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0617.jpg\",\"contentUrl\":\"https:\\\/\\\/version-2.com.tw\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/0617.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.welivesecurity.com\\\/2022\\\/06\\\/13\\\/industroyer-cyber-weapon-brought-down-power-grid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industroyer: A cyber\u2011weapon that brought down a power grid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industroyer: A cyber\u2011weapon that brought down a power grid - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/","og_locale":"en_US","og_type":"article","og_title":"Industroyer: A cyber\u2011weapon that brought down a power grid - Version 2","og_description":"Five years ago, ESET researchers released their analysi [&hellip;]","og_url":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/","og_site_name":"Version 2","article_published_time":"2021-06-29T01:36:24+00:00","article_modified_time":"2023-01-04T10:06:08+00:00","og_image":[{"url":"https:\/\/version-2.com.tw\/wp-content\/uploads\/2022\/06\/0617.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/06\/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Industroyer: A cyber\u2011weapon that brought down a power grid","datePublished":"2021-06-29T01:36:24+00:00","dateModified":"2023-01-04T10:06:08+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/06\/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid\/"},"wordCount":807,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com.tw\/wp-content\/uploads\/2022\/06\/0617.jpg","keywords":["ESET","2021"],"articleSection":["2021","ESET","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/06\/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid\/","url":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/","name":"Industroyer: A cyber\u2011weapon that brought down a power grid - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/#primaryimage"},"image":{"@id":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com.tw\/wp-content\/uploads\/2022\/06\/0617.jpg","datePublished":"2021-06-29T01:36:24+00:00","dateModified":"2023-01-04T10:06:08+00:00","breadcrumb":{"@id":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/#primaryimage","url":"https:\/\/version-2.com.tw\/wp-content\/uploads\/2022\/06\/0617.jpg","contentUrl":"https:\/\/version-2.com.tw\/wp-content\/uploads\/2022\/06\/0617.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.welivesecurity.com\/2022\/06\/13\/industroyer-cyber-weapon-brought-down-power-grid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Industroyer: A cyber\u2011weapon that brought down a power grid"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-dsu","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/51738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=51738"}],"version-history":[{"count":6,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/51738\/revisions"}],"predecessor-version":[{"id":51744,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/51738\/revisions\/51744"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=51738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=51738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=51738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}