The Obama administration has warned the nation’s power companies, water suppliers and transportation networks that sophisticated cyberattack techniques used to bring down part of Ukraine’s power grid two months ago could easily be turned on them.
After an extensive inquiry, American investigators concluded that the attack in Ukraine on Dec. 23 may well have been the first power blackout triggered by a cyberattack — a circumstance many have long predicted. Working remotely, the attackers conducted “extensive reconnaissance” of the power system’s networks, stole the credentials of system operators and learned how to switch off the breakers, plunging more than 225,000 Ukrainians into darkness.
In interviews, American officials said they have not completed their inquiry into who was responsible for the attack. But Ukrainian officials have blamed the Russians, saying it was part of the effort to intimidate the country’s political leaders by showing they could switch off the lights at any time.
“They could be right,” said one senior administration official. “But so far we don’t have the complete evidence, and the attackers went to some lengths to hide their tracks.”
Even after it has reached a conclusion, the White House might decide not to name the attackers, just as it decided not to publicly blame China for the theft of 22 million security files from the Office of Personnel Management.
But American intelligence officials have been intensely focused on the likelihood that the attack was engineered by the Russian military, or “patriotic hackers” operating on their behalf, since the first reports of the December blackout. The officials have found it intriguing that the attack did not appear designed to shut down the entire country. “This appears to be message-sending,” said one senior administration official with access to the intelligence, who requested anonymity to discuss the ongoing inquiry.
Equally interesting to investigators was the technique used: The malware designed for the Ukrainian power grid was directed at “industrial control systems,” systems that act as the intermediary between computers and the switches that distribute electricity and guide trains as they speed down the track, the valves that control water supplies, and the machinery that mixes chemicals at factories.
The most famous such attack was the Stuxnet worm, which destroyed the centrifuges that enriched uranium at the Natanz nuclear site in Iran. But that is not an example often cited by American officials — largely because the attack was conducted by the United States and Israel, a fact American officials have never publicly acknowledged.
Experts in cybersecurity regard the Ukraine attack as a teaching moment, a chance to drive home to American firms the vulnerability of their own systems. “There’s never been an intentional cyberattack that has taken the electric grid down before,” said Robert M. Lee of the SANS Institute. Mr. Lee said that while it was still not possible to determine who conducted the attack — what is called “attribution” in the cyber industry — he noted that it was clearly designed to send a political message.
Learn more: Utilities Cautioned About Potential for a Cyberattack After Ukraine’s
The Latest on: Cyberattack industrial control systems
via Google News
The Latest on: Cyberattack industrial control systems
- The survey results of the 2022 DNV energy cyber security report are grossly misleadingon May 25, 2022 at 1:45 pm
DNV published The Cyber Priority report, “The State of Cyber Security in the Energy Sector”. I believe the oil, gas, and chemical (not electric) industries are leading most industries addressing ...
- Report: Energy Execs Expect More Extreme Cyberattacks but Defensive Action is Laggingon May 25, 2022 at 7:30 am
A new DNV research has found that more than four-fifths of energy professionals believe a cyber-attack on the industry is likely to cause operational shutdowns (85%) and damage to energy assets and ...
- Norwegian Software Venture Targets Rising Cyberattack Riskson May 25, 2022 at 5:20 am
Industrial facilities, control systems, oil pipelines, supply chains, power grids and healthcare are key targets, Brekke and the CEOs of Aker ASA and Cognite told the Reuters Global Markets Forum in ...
- Norwegian software venture targets rising cyber attack riskson May 25, 2022 at 4:18 am
Industrial facilities, control systems, oil pipelines, supply chains, power grids and healthcare are key targets, Brekke and the CEOs of Aker ASA (AKER.OL) and Cognite told the Reuters Global ...
- A cyberattack could wreak destruction comparable to a nuclear weaponon May 24, 2022 at 4:59 pm
In early 2016, hackers took control of a ... a massively destructive cyberattack – targeting several electricity utilities, water treatment facilities or industrial plants at once, or in ...
- 4 Questions to Ask About Industrial Cybersecurity Softwareon May 19, 2022 at 5:02 am
With the threat of cybersecurity attacks against industry worldwide on the rise amid the war in Ukraine, which follows hard on the news about growing ransomware attacks on industry and the potential ...
- Defensive action against cyberattacks in energy sector is lagging, DNV sayson May 19, 2022 at 2:37 am
Faster action should be taken to counter the threat of cyberattacks in the energy industry as professionals raise concerns about the possibility of operational shutdowns and damaged assets, according ...
- Industrial Control Systems (ICS) Security Market Key Players & Forecast By 2027on April 22, 2022 at 3:54 am
Research Nester has released a report titled “ Industrial Control Systems ... being able to take down systems for security update, which remains vulnerable from cyberattack is estimated to ...
via Bing News