ALLANITE
Watering-hole and phishing attacks leading to ICS reconnaissance and screenshot collection.

ALLANITE operations continue and intelligence indicates activity since at least May 2017. ALLANITE activity closely resembles Palmetto Fusion described by the US Department of Homeland Security (DHS). In October 2017, a DHS advisory documented ALLANITE technical operations combined with activity with a group Symantec calls Dragonfly (which Dragos associates with DYMALLOY).
ALLANITE’s targeting and techniques are similar to other activity groups, including Dragonfly, and activity Dragos labels DYMALLOY. However, ALLANITE’s technical capabilities are significantly different from Dragonfly and DYMALLOY.
ALLANITE uses email phishing campaigns and compromised websites called watering holes to steal credentials and gain access to target networks, including collecting and distributing screenshots of industrial control systems. ALLANITE operations limit themselves to information gathering and have not demonstrated any disruptive or damaging capabilities.
ALLANITE conducts malware-less operations primarily leveraging legitimate and available tools in the Windows operating system.
Public disclosure by third-parties, including the DHS, associate ALLANITE operations with Russian strategic interests. However, Dragos does not corroborate the attribution of others.
US officials told the media in July 2017 these adversaries gained access to business and administrative systems, not operations networks. Since then, third-party reporting indicates ALLANITE has gathered information directly from ICS networks, which Dragos can independently confirm.
Date: Since 2017
ADVERSARY
- Some overlap with DYMALLOY, Dragonfly groups
CAPABILITIES
- Spearphishing; watering holes; publicly available tools for password hash cracking & capture
- Built-in Windows commands & scripts
VICTIM
- Electric Utilities
- US, UK
INFRASTRUCTURE
- Legitimate but compromised infrastructure mapping to various organizations & ISPs
ICS IMPACT
- Intelligence collection, information gathering, capturing system screenshots within ICS environments