CrashOverride
Posted: March 20, 2018
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 14,272 |
---|---|
Threat Level: | 8/10 |
Infected PCs: | 9 |
First Seen: | February 16, 2025 |
---|---|
Last Seen: | March 3, 2025 |
OS(es) Affected: | Windows |
CrashOverride or Industroyer is a Trojan that targets energy sector-associated equipment for causing power outages and, potentially, permanent, physical damage. While this threat's campaign begun in Ukraine, CrashOverride is a modular Trojan that can adjust different portions of its attacks for harming the power grids of other countries around the world. Malware experts recommend using human resources for monitoring possible signs of an infection regularly, patching all software, and having dedicated anti-malware products for removing CrashOverride from the infected system.
Your Next Outage may not Be Due to Bad Weather
Occasional Trojan campaigns targeting the energy sectors of different nations are a recurring problem for the cyber-security industry to deal with, and, previously, included threats like the Gh0st RAT, Havex, TritonStuxnet. The last example is especially notable for its capacity for causing physical damage to hardware, which, until now, was a trait that was unique to it. However, a new, Ukraine-based campaign is sharing that property, thanks to the Trojan that authorities refer to as both Industroyer and CrashOverride.
Like Stuxnet, CrashOverride is likely of being of Russian origin, although malware experts can't, currently, verify either the identity of the threat actors or their infiltration methods. Attacks of this nature often utilize e-mail as the infection method of choice. CrashOverride uses a module-based design that customizes its payload for different infrastructure norms in different regions, such as Ukraine. Once it gains access, it's capable of deploying itself without much oversight, and can cause outages autonomously, which is a significant difference from the previous, and otherwise similar, Stuxnet campaign. CrashOverride also can operate manually, when appropriate, for a more precise level of control than its default module settings provide.
CrashOverride also may be providing recon information on the control systems to its threat actors. The Trojan includes a relatively non-obfuscated, data-uploading feature that could help the remote attackers learn previously unknown details about the functionality of the equipment. CrashOverride also can self-destruct and erase other files on the infected PC with it, thereby destroying any evidence of the infection method or its payload's operations.
Overriding the Trojan with an Anti-Energy Agenda
One hazard with CrashOverride infections is their potential for exploiting a vulnerability in Siprotec digital relays that, like Stuxnet's attacks, could facilitate the physical destruction of hardware with nothing more than purely digital commands. However, its threat actors may intend for the feature to do nothing more than a preventative measure against the re-enabling of any circuit breakers after a blackout. Malware analysts note that CrashOverride's current implementation of this feature is defensible for users equipping their software with the latest patch for their Siprotec-brand equipment.
CrashOverride is adaptable to different targets globally and can maintain its presence, and a timed payload, even on any systems without a network connection. Although CrashOverride can't apply its payload to non-electrical control systems without further changes to its built-in code, its modules may let it cause well-organized outages anywhere in the world. Any anti-malware protocols should focus on preventing infections by scanning incoming files with appropriate security software and having the removal of CrashOverride taking place automatically.
CrashOverride is a well-designed Trojan whose motives remain guessable but not verifiable, for the present. Although most nations maintain a minimum of hands-on monitoring of their electrical grids, the CrashOverride campaign should give most electrical companies reasons for doing otherwise.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
* See Free Trial offer below. EULA and Privacy/Cookie Policy.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.