In September 2014, it emerged that a cyber-espionage campaign had turned its focus to the pharma industry. The campaign, known as Dragonfly or Energetic Bear, was initially thought to be targeting critical infrastructure in the energy industry. However, when researchers explored the threat in greater depth they found that the probable target was actually pharma.
Cyber expert Joel Langill concluded that the attackers were motivated by intellectual property theft, as opposed to simply causing disruption or downtime.
“The potential damage could include the theft of proprietary recipes and production batch sequence steps, as well as network and device information that indicate manufacturing plant volumes and capabilities,” he remarked in a report for Belden.
First, the group used spear-phishing to collect data about companies that supply the sector. Next, they ‘trojanised’ these companies’ software, allowing them to download specific industrial control system (ICS) components. This in turn enabled them to steal intellectual property, most likely for the purpose of counterfeiting.
Notably, the companies targeted were small, with fewer than 50 employees, and their website CMS used open-source software. From an attacker’s perspective, their servers were easier to compromise.
Dragonfly was thought to be related to another industrial espionage campaign, Epic Turla. Relatively speaking, the damage wreaked wasn’t too significant. However, these were some of the first high-profile cyber-attacks against the industry and a wake-up call to the pharma supply chain.
Q&A: Genomics
Wellcome: pushing for a UK genomics revolution