Conexiant
Login
  • The Analytical Scientist
  • The Cannabis Scientist
  • The Medicine Maker
  • The Ophthalmologist
  • The Pathologist
  • The Traditional Scientist
The Medicine Maker
  • Explore

    Explore

    • Latest
    • Features
    • Interviews
    • Business & Trends
    • Technology & Manufacturing
    • Product Profiles
    • White Papers

    Featured Topics

    • Biopharma
    • Small Molecules
    • Cell & Gene
    • Future of Pharma

    Issues

    • Latest Issue
    • Archive
    • Cell and Gene Therapy Supplement
  • Topics

    Topics

    • Drug Discovery
    • Development & Clinical
    • Formulation
    • Drug Delivery
    • Bioprocessing
    • Small Molecules
    • Cell and Gene
    • Facilities & Equipment
    • Outsourcing
    • Packaging
    • Supply Chain
    • Regulation & Standards
  • News & Blogs

    News & Blogs

    • Industry News
    • Research News
    • Blogs
  • Events
    • Live Events
    • Webinars
  • Community & Awards

    Community & Awards

    • Power List
    • Sitting Down With
    • Innovation Awards
    • Company of the Year Awards
    • Authors & Contributors
  • Multimedia
    • Video
    • Podcasts
    • eBooks
Subscribe
Subscribe
The Medicine Maker / Issues / 2014 / Articles / Nov / Beware the Dragonfly
Manufacture Business Practice Technology and Equipment Trends & Forecasts Facilities & Equipment Technology & Manufacturing

Beware the Dragonfly

Mysterious cyber attackers are hitting pharma manufacturing systems

By Eric Byres, Joel Langill 11/06/2014 0 min read

Share

The pharma industry is being targeted by a cyber-espionage campaign known as Dragonfly, which uses a variety of ‘weapons,’ including spam emails, web watering holes (that infect websites with malware) and Trojan malware that allows unauthorized system access and information disclosure. Most organizations are aware of the dangers of malware, but Dragonfly is unusual as it specifically targets manufacturing systems. We spoke to Joel Langill, a security expert at RedHat Cyber, and Eric Byres, chief technology officer of Belden’s Tofino Security, to find out more.

0214-206-upfront-main

Are we sure Dragonfly is targeting pharma? The actual list of named victims is contained in “restricted” documents that cannot be shared. However, security provider Kaspersky Labs (Russia) offered descriptive information of the victims at various stages of the attack. This information, along with personal knowledge of the operation of pharmaceutical and life science facilities, led to the conclusion that the attack was not likely targeting the energy sector, as previously assumed. At this time, the campaign appears to be limited to reconnaissance or information theft, but the attackers possess the capability for more destructive acts, including system sabotage or disruption to operations.

How does Dragonfly work? The malware used in Dragonfly targets common services that run on industrial control systems found within the manufacturing networks of an organization. It “scans” a network for potential targets, and then probes them for specific communication services. The attackers placed the malware in legitimate software that would then be used by suppliers common in pharma and life sciences, allowing the malware to be introduced into the final organization via the “trusted supplier” that was carrying the malware.

Is it unusual for the pharma industry to be targeted? No. The pharma industry has been a potential target for years. According to security analysts, pharma companies have become more vulnerable to cyber-attacks over the last year than even the retail industry (and Target and EBay recently suffered high-profile data breaches). The pharma industry’s focus on federal regulations, like 21 CFR Part 11, with the absence of any cyber requirements, makes them easy targets. This technical weakness is amplified by a socio-economic motivation for countries to obtain intellectual property or other information that would allow them to establish local manufacturing capabilities.
Kaspersky Labs released information of an ongoing attack against the pharma industry they called “Epic Turla” that is believed to have begun in late 2013. The overlap of the Dragonfly and Epic Turla campaigns led us to believe that both attacks may be coordinated, and that Dragonfly was actually used to obtain information about the industrial control systems that was not previously available from Epic Turla.

Any recommendations? Dragonfly shows that cyber-attacks are becoming more sophisticated, and that the tools used are beginning to focus on critical systems within manufacturing operations. Recommendations to help defend against Dragonfly and similar attacks are discussed in more detail in Belden’s white paper series ‘Defending Against the Dragonfly Cyber Security Attacks’ (1).

Reference

  1. Belden, “Defending Against the Dragonfly Cyber Security Attacks”, (2014). http://info.belden com/a-cyber-security-dragonfly-bc-lp

Newsletters

Receive the latest analytical science news, personalities, education, and career development – weekly to your inbox.

Newsletter Signup Image

References

  1. Belden, “Defending Against the Dragonfly Cyber Security Attacks”, (2014). http://info.belden com/a-cyber-security-dragonfly-bc-lp

About the Author(s)

Eric Byres

Eric Byres is chief technology officer of Belden’s Tofino Security.

More Articles by Eric Byres

Joel Langill

Joel Langill is a security expert at RedHat Cyber.

More Articles by Joel Langill

False

Advertisement

Recommended

False

Related Content

What Trump’s Latest Moves Mean for the Industry
Business Practice Standards & Regulation Trends & Forecasts Bioprocessing - Upstream & Downstream
What Trump’s Latest Moves Mean for the Industry

May 27, 2025

6 min read

Audrey Greenberg’s latest insight on US-based manufacturing, Trump’s “Administration for A Healthy America”, and an ever-shifting regulatory environment.

Big Bad Pharma?
Business Practice Trends & Forecasts
Big Bad Pharma?

December 1, 2014

0 min read

The Ebola media frenzy has reminded the public how selfish our industry is. But, somehow, that doesn’t sound quite right...

Access All Areas
Business Practice Trends & Forecasts
Access All Areas

December 1, 2014

0 min read

The 2014 Access to Medicine index shows progress – but companies remain “conservative”

Care to ‘Patent Dance’?
Business Practice Trends & Forecasts
Care to ‘Patent Dance’?

December 1, 2014

0 min read

Amgen accuses Sandoz of snubbing its advances in a complex biosimilar dispute

The Medicine Maker
Subscribe

About

  • About Us
  • Work at Conexiant Europe
  • Terms and Conditions
  • Privacy Policy
  • Advertise With Us
  • Contact Us

Copyright © 2025 Texere Publishing Limited (trading as Conexiant), with registered number 08113419 whose registered office is at Booths No. 1, Booths Park, Chelford Road, Knutsford, England, WA16 8GS.