Traffic lights out after transformer fires

By Toronto Star


NFPA 70e Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today
A series of transformer fires has caused power outages across the city the morning of February 22. Traffic lights at several intersections are also out as the GTA undergoes an intense snowfall, with reports of lightning in parts of the city.

The affected intersections include Bathurst St. and Wilson Ave., Palmerston Ave. and Queen St. W., Brookwell Drive and Streamdale Court, and Newbold Ave. and Gainsborough Rd.

At one point in the morning, there were reports of at least a dozen transformer fires. A Toronto Hydro spokesperson was unavailable for comment.

Meanwhile, the snowy conditions have created a logjam on the highways and city streets, with many collisions reported.

The heavy snow is expected to end by this afternoon, leaving up to four centimetres in its wake.

Related News

U.S. Speeds Up Permitting for Geothermal Energy

Geothermal Emergency Permitting accelerates BLM approvals on public lands via categorical exclusions for exploratory drilling and geophysical surveys, boosting domestic energy security, cutting timelines by up to a year, and streamlining low-impact reviews.

 

Key Points

A policy fast-tracking geothermal exploration on public lands, using BLM categorical exclusions to cut review delays.

✅ Categorical exclusions speed exploratory drilling approvals

✅ Cuts permitting timelines by up to one year

✅ Focused on public lands to enhance energy security

 

In a significant policy shift, the U.S. Department of the Interior has introduced emergency permitting procedures aimed at expediting the development of geothermal energy projects. This initiative, announced on May 30, 2025, is part of a broader strategy to enhance domestic energy production, seen in proposals to replace Obama's power plant overhaul and reduce reliance on foreign energy sources.

Background and Rationale

The decision to fast-track geothermal energy projects comes in the wake of President Donald Trump's declaration of a national energy emergency, which faces a legal challenge from Washington's attorney general, on January 20, 2025. This declaration cited high energy costs and an unreliable energy grid as threats to national security and economic prosperity. While the emergency order includes traditional energy resources such as oil, gas, coal, and uranium and nuclear energy resources, it notably excludes renewable sources like solar, wind, and hydrogen from its scope.

Geothermal energy, which harnesses heat from beneath the Earth's surface to generate electricity, is considered a reliable and low-emission energy source. However, its development has been hindered by lengthy permitting processes and environmental reviews, with recent NEPA rule changes influencing timelines. The new emergency permitting procedures aim to address these challenges by streamlining the approval process for geothermal projects.

Key Features of the Emergency Permitting Procedures

Under the new guidelines, the Bureau of Land Management (BLM) has adopted categorical exclusions to expedite the review and approval of geothermal energy exploration on public lands. These exclusions allow for faster permitting of low-impact activities, such as drilling exploratory wells and conducting geophysical surveys, without the need for extensive environmental assessments.

Additionally, the BLM has proposed a new categorical exclusion that would apply to operations related to the search for indirect evidence of geothermal resources. This proposal is currently open for public comment and, if finalized, would further accelerate the discovery of new geothermal resources on public lands.

Expected Impact on Geothermal Energy Development

The implementation of these emergency permitting procedures is expected to significantly reduce the time and cost associated with developing geothermal energy projects. According to the Department of the Interior, the new measures could cut permitting timelines by up to a year for certain types of geothermal exploration activities.

This acceleration in project development is particularly important given the untapped geothermal potential in regions like Nevada, which is home to some of the largest undeveloped geothermal resources in the country.

Industry and Environmental Reactions

The geothermal industry has largely welcomed the new permitting procedures, viewing them as a necessary step to unlock the full potential of geothermal energy. Industry advocates argue that reducing permitting delays will facilitate the deployment of geothermal projects, contributing to a more reliable and sustainable energy grid amid debates over electricity pricing changes that affect market signals.

However, the exclusion of solar and wind energy projects from the emergency permitting procedures has drawn criticism from some environmental groups. Critics argue that a comprehensive approach to energy development should include all renewable sources, not just geothermal, to effectively address climate change, as reflected in new EPA pollution limits for coal and gas power plants, and promote energy sustainability.

The U.S. government's move to implement emergency permitting procedures for geothermal energy development marks a significant step toward enhancing domestic energy production and reducing reliance on foreign energy sources. By streamlining the approval process for geothermal projects, the administration aims to accelerate the deployment of this reliable and low-emission energy source. While the exclusion of other renewable energy sources from the emergency procedures has sparked debate, especially after states like California halted an energy rebate program during a federal freeze, the focus on geothermal energy underscores its potential role in the nation's energy future.

 

Related News

View more

Group to create Canadian cyber standards for electricity sector IoT devices

Canadian Industrial IoT Cybersecurity Standards aim to unify device security for utilities, smart grids, SCADA, and OT systems, aligning with NERC CIP, enabling certification, trust marks, compliance testing, and safer energy sector deployments.

 

Key Points

National standards to secure industrial IoT for utilities and grids, enabling certification and NERC CIP alignment.

✅ Aligns with NERC CIP and NIST frameworks for energy sector security

✅ Defines certification, testing tools, and a trusted device repository

✅ Enhances OT, SCADA, and smart grid resilience against cyber threats

 

The Canadian energy sector has been buying Internet-connected sensors for monitoring a range of activities in generating plants, distribution networks facing harsh weather risks and home smart meters for several years. However, so far industrial IoT device makers have been creating their own security standards for devices, leaving energy producers and utilities at their mercy.

The industry hopes to change that by creating national cybersecurity standards for industrial IoT devices, with the goal of improving its ability to predict, prevent, respond to and recover from cyber threats, such as emerging ransomware attacks across the grid.

To help, the federal government today announced an $818,000 grant support a CIO Strategy Council project oversee the setting of standards.

In an interview council executive director Keith Jansa said the money will help a three-year effort that will include holding a set of cross-country meetings with industry, government, academics and interest groups to create the standards, tools to be able to test devices against the standards and the development of product repository of IoT safe devices companies can consult before making purchases.

“The challenge is there are a number of these devices that will be coming online over the next few years,” Jansa said. “IoT devices are designed for convenience and not for security, so how do you ensure that a technology an electricity utility secures is in fact safeguarded against cyber threats? Currently, there is no associated trust mark or certification that gives confidence associated with these devices.”

He also said the council will work with the North American Electric Reliability Corporation (NERC), which sets North American-wide utility safety procedural standards and informs efforts on protecting the power grid across jurisdictions. The industrial IoT standards will be product standards.

According to Robert Wong, vice-president and CIO of Toronto Hydro, all the big provincial utilities are subject to adhering to NERC CIP standards which have requirements for both cyber and physical security. Ontario is different from most provinces in that it has local distribution companies — like Toronto Hydro — which buy electricity in bulk and resell it to customers.  These LDCs don’t own or operate critical infrastructure and therefore don’t have to follow the NERC CIP standards.

Regional reforms, such as regulatory changes in Atlantic Canada, aim to bring greener power options to the grid.

Electricity is considered around the world as one of a country’s critical national infrastructure. Threats to the grid can be used for ransom or by a country for political pressure. Ukraine had its power network knocked offline in 2015 and 2016 by what were believed to be Russian-linked attackers operating against utilities.

All the big provincial utilities operate “critical infrastructure” and are subject to adhering to NERC CIP (critical infrastructure protection) standards, which have requirements for both cyber and physical security, as similar compromises at U.S. electric utilities have highlighted recently.  There are audited on a regular basis for compliance and can face hefty fines if they fail to meet the requirements.  The LDCs in Ontario don’t own or operate “critical infrastructure” and therefore are not required to adopt NERC CIP standards (at least for now).

The CIO Strategy Council is a forum for chief information officers that is helping set standards in a number of areas. In January it announced a partnership with the Internet Society’s Canada Chapter to create standards of practice for IoT security for consumer devices. As part of the federal government’s updated national cybersecurity strategy it is also developing a national cybersecurity standard for small and medium-sized businesses. That strategy would allow SMBs to advertise to customers that they meet minimum security requirements.

“The security of Canadians and our critical infrastructure is paramount,” federal minister of natural resources Seamus O’Regan said in a statement with today’s announcement. “Cyber attacks are becoming more common and dangerous. That’s why we are supporting this innovative project to protect the Canadian electricity sector.”

The announcement was welcomed by Robert Wong, Toronto Hydro’s vice-president and CIO. “Any additional investment towards strengthening the safeguards against cyberattacks to Canada’s critical infrastructure is definitely good news.  From the perspective of the electricity sector, the convergence of IT and OT (operational technology) has been happening for some time now as the traditional electricity grid has been transforming into a Smart Grid with the introduction of smart meters, SCADA systems, electronic sensors and monitors, smart relays, intelligent automated switching capabilities, distributed energy resources, and storage technologies (batteries, flywheels, compressed air, etc.).

“In my experience, many OT device and system manufacturers and vendors are still lagging the traditional IT vendors in incorporating Security by Design philosophies and effective security features into their products.  This, in turn, creates greater risks and challenges for utilities to protecting their critical infrastructures and ensuring a reliable supply of electricity to its customers.”

The Ontario Energy Board, which regulates the industry in the province, has led an initiative for all utilities to adopt the National Institute of Standards and Technology (NIST) Cybersecurity Framework, along with the ES-C2M2 maturity and Privacy By Design models, he noted.  Toronto Hydro has been managing its cybersecurity practice in adherence to these standards, as the city addresses growing electricity needs as well, he said.

“Other jurisdictions, such as Israel, have invested heavily on a national level in developing its cybersecurity capabilities and are seen as global leaders.  I am confident that given the availability of talent, capabilities and resources in Canada (especially around the GTA) if we get strong support and leadership at a federal level we can also emerge as a leader in this area as well.”

 

Related News

View more

Ontario Government Consults On Changes To Industrial Electricity Pricing And Programs

Ontario electricity pricing consultations will gather business input on OEB rate design, Industrial Conservation Initiative, dynamic pricing, global adjustment, and system costs through online feedback and sector-specific in-person sessions province-wide.

 

Key Points

Consultations gathering business input on rates, programs, and OEB policy to improve fairness and reduce system costs.

✅ Consults on ICI, GA, dynamic pricing structures

✅ Seeks views on OEB C&I rate design changes

✅ In-person sessions across key industrial sectors

 

The Ontario government has announced plans to hold consultations to seek input from businesses about industrial electricity pricing and programs. This will be done through Ontario's online consultations directory and though in-person sector-specific consultation sessions across the province. The in-person sessions will be held in all areas of Ontario, and will target "key industries," including automotive and the build-out of electric vehicle charging stations infrastructure, forestry, mining, agriculture, steel, manufacturing and chemicals.

On April 1, 2019, the Ontario government published a consultation notice for this process, confirming that it is looking for input on "electricity rate design, existing tax-based incentives, reducing system costs and regulatory and delivery costs," including related proposals such as the hydrogen rate reduction proposal under discussion. The consultation process includes a list of nine questions for respondents (and presumably participants in the in-person sessions) to address. These include questions about:

The benefits of the Industrial Conservation Initiative (described below), including how it could be changed to improve fairness and industrial competitiveness, and how it could complement programs like the Hydrogen Innovation Fund that support industrial innovation.

Dynamic pricing structures that allow for lower rates in return for responding to price signals versus a flat rate structure that potentially costs more, but is more stable and predictable, as Ontario's energy storage expansion accelerates.

Interest in an all-in commodity contract with an electricity retailer, even if it involves a risk premium.

Interested parties are invited to submit their comments before May 31, 2019.

The government's consultation announcement follows recent developments in the Ontario Energy Board's (OEB) review of electricity ratemaking for commercial and industrial customers, and intertie projects such as the Lake Erie Connector that could affect market dynamics.

In December 2018, the OEB published a paper from its Market Surveillance Panel (MSP) examining the Industrial Conservation Initiative (ICI), and potential alternative approaches. The ICI is a program that allows qualifying large industrial customers to base their global adjustment (GA) payments on their consumption during five peak demand hours in a year. Customers who find ways to reduce consumption at those times, perhaps through DERs and enabling energy storage options, will reduce their electricity costs. This shifts GA costs to other customers. The MSP found that the ICI does not fairly allocate costs to those who cause them and/or benefit from them, and recommends that a better approach should be developed.

In February 2019, the OEB released its Staff Report to the Board on Rate Design for Commercial and Industrial Electricity Customers, setting out recommendations for new rate designs for electricity commercial and industrial (C&I) rate classes as Ontario increasingly turns to battery storage to meet rising demand. As described in an earlier post, the Staff Report includes recommendations to: (i) establish a fixed distribution charge for commercial customers with demands under 10 kW; (ii) implement a demand charge (rather than the current volumetric charge) for C&I customers with demands between 10kW and 50kW; and (iii) introduce a "capacity reserve charge" for customers with load displacement generation to replace stand-by charges and provide for recognition of the benefits of this generation on the system. The OEB held a stakeholder information session in mid-March on this initiative, and interested parties are now filing submissions in response to the Staff Report.

Whether and how the OEB's processes will fit together with the government's consultation process remains to be seen.

 

Related News

View more

Manitoba Hydro seeks unpaid days off to trim costs during pandemic

Manitoba Hydro unpaid leave plan offers unpaid days off to curb workforce costs amid COVID-19, avoiding temporary layoffs and pay cuts, targeting $5.7M savings through executive, manager, and engineer participation, with union options under discussion.

 

Key Points

A cost-saving measure offering unpaid days off to avert layoffs and pay cuts, targeting $5.7M savings amid COVID-19.

✅ 3 unpaid days for executives, managers, engineers

✅ Targets $5.7M total; $1.4M from non-union staff

✅ Avoids about 240 layoffs over a four-month period

 

The Manitoba government's Crown energy utility is offering workers unpaid days off as an alternative to temporary layoffs or pay cuts, even as residential electricity use rises due to more working from home.

In an email to employees, Manitoba Hydro president Jay Grewal says executives, managers, and engineers will take three unpaid days off before the fiscal year ends next March.

She says similar options are being discussed with other employee groups, which are represented by unions, as the Saskatchewan COVID-19 crisis reshaped workforces across the Prairies.

The provincial government ordered Manitoba Hydro to reduce workforce costs during the COVID-19 pandemic, as some power operators considered on-site staffing plans, and at one point the utility said it was looking at 600 to 700 temporary layoffs.

The organization said it’s looking for targeted savings of $5.7 million, down from $11 million previously estimated, while peers like BC Hydro’s Site C began reporting COVID-19 updates.

A spokesperson for Manitoba Hydro said non-unionized staff taking three days of unpaid leave will save $1.4 million of the $5.7 million savings.

“Three days of unpaid leave for every employee would eliminate layoffs entirely,” the spokesperson said in an email. “For comparison, approximately 240 layoffs would have to occur over a four-month period, while measures like Alberta's worker transition fund aim to support displaced workers, to achieve savings of $4.3 million.”

Grewal says the unpaid days off were a preferred option among the executives, managers, and engineers in an industry that recently saw a Hydro One worker injury case.

She says unions representing the other workers have been asked to respond by next Wednesday.

 

Related News

View more

Purdue: As Ransomware Attacks Increase, New Algorithm May Help Prevent Power Blackouts

Infrastructure Security Algorithm prioritizes cyber defense for power grids and critical infrastructure, mitigating ransomware, blackout risks, and cascading failures by guiding utilities, regulators, and cyber insurers on optimal security investment allocation.

 

Key Points

An algorithm that optimizes security spending to cut ransomware and blackout risks across critical infrastructure.

✅ Guides utilities on optimal security allocation

✅ Uses incentives to correct human risk biases

✅ Prioritizes assets to prevent cascading outages

 

Millions of people could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid, as past US utility intrusions have shown.

No single power utility company has enough resources to protect the entire grid, but maybe all 3,000 of the grid's utilities could fill in the most crucial security gaps if there were a map showing where to prioritize their security investments.

Purdue University researchers have developed an algorithm to create that map. Using this tool, regulatory authorities or cyber insurance companies could establish a framework for protecting the U.S. power grid that guides the security investments of power utility companies to parts of the grid at greatest risk of causing a blackout if hacked.

Power grids are a type of critical infrastructure, which is any network - whether physical like water systems or virtual like health care record keeping - considered essential to a country's function and safety. The biggest ransomware attacks in history have happened in the past year, affecting most sectors of critical infrastructure in the U.S. such as grain distribution systems in the food and agriculture sector and the Colonial Pipeline, which carries fuel throughout the East Coast, prompting increased military preparation for grid hacks in the U.S.

With this trend in mind, Purdue researchers evaluated the algorithm in the context of various types of critical infrastructure in addition to the power sector, including electricity-sector IoT devices that interface with grid operations. The goal is that the algorithm would help secure any large and complex infrastructure system against cyberattacks.

"Multiple companies own different parts of infrastructure. When ransomware hits, it affects lots of different pieces of technology owned by different providers, so that's what makes ransomware a problem at the state, national and even global level," said Saurabh Bagchi, a professor in the Elmore Family School of Electrical and Computer Engineering and Center for Education and Research in Information Assurance and Security at Purdue. "When you are investing security money on large-scale infrastructures, bad investment decisions can mean your power grid goes out, or your telecommunications network goes out for a few days."

Protecting infrastructure from hacks by improving security investment decisions

The researchers tested the algorithm in simulations of previously reported hacks to four infrastructure systems: a smart grid, industrial control system, e-commerce platform and web-based telecommunications network. They found that use of this algorithm results in the most optimal allocation of security investments for reducing the impact of a cyberattack.

The team's findings appear in a paper presented at this year's IEEE Symposium on Security and Privacy, the premier conference in the area of computer security. The team comprises Purdue professors Shreyas Sundaram and Timothy Cason and former PhD students Mustafa Abdallah and Daniel Woods.

"No one has an infinite security budget. You must decide how much to invest in each of your assets so that you gain a bump in the security of the overall system," Bagchi said.

The power grid, for example, is so interconnected that the security decisions of one power utility company can greatly impact the operations of other electrical plants. If the computers controlling one area's generators don't have adequate security protection, as seen when Russian hackers accessed control rooms at U.S. utilities, then a hack to those computers would disrupt energy flow to another area's generators, forcing them to shut down.

Since not all of the grid's utilities have the same security budget, it can be hard to ensure that critical points of entry to the grid's controls get the most investment in security protection.

The algorithm that Purdue researchers developed would incentivize each security decision maker to allocate security investments in a way that limits the cumulative damage a ransomware attack could cause. An attack on a single generator, for instance, would have less impact than an attack on the controls for a network of generators, which sophisticated grid-disruption malware can target at scale, rather than for the protection of a single generator.

Building an algorithm that considers the effects of human behavior

Bagchi's research shows how to increase cybersecurity in ways that address the interconnected nature of critical infrastructure but don't require an overhaul of the entire infrastructure system to be implemented.

As director of Purdue's Center for Resilient Infrastructures, Systems, and Processes, Bagchi has worked with the U.S. Department of Defense, Northrop Grumman Corp., Intel Corp., Adobe Inc., Google LLC and IBM Corp. on adopting solutions from his research. Bagchi's work has revealed the advantages of establishing an automatic response to attacks, and analyses like Symantec's Dragonfly report highlight energy-sector risks, leading to key innovations against ransomware threats, such as more effective ways to make decisions about backing up data.

There's a compelling reason why incentivizing good security decisions would work, Bagchi said. He and his team designed the algorithm based on findings from the field of behavioral economics, which studies how people make decisions with money.

"Before our work, not much computer security research had been done on how behaviors and biases affect the best defense mechanisms in a system. That's partly because humans are terrible at evaluating risk and an algorithm doesn't have any human biases," Bagchi said. "But for any system of reasonable complexity, decisions about security investments are almost always made with humans in the loop. For our algorithm, we explicitly consider the fact that different participants in an infrastructure system have different biases."

To develop the algorithm, Bagchi's team started by playing a game. They ran a series of experiments analyzing how groups of students chose to protect fake assets with fake investments. As in past studies in behavioral economics, they found that most study participants guessed poorly which assets were the most valuable and should be protected from security attacks. Most study participants also tended to spread out their investments instead of allocating them to one asset even when they were told which asset is the most vulnerable to an attack.

Using these findings, the researchers designed an algorithm that could work two ways: Either security decision makers pay a tax or fine when they make decisions that are less than optimal for the overall security of the system, or security decision makers receive a payment for investing in the most optimal manner.

"Right now, fines are levied as a reactive measure if there is a security incident. Fines or taxes don't have any relationship to the security investments or data of the different operators in critical infrastructure," Bagchi said.

In the researchers' simulations of real-world infrastructure systems, the algorithm successfully minimized the likelihood of losing assets to an attack that would decrease the overall security of the infrastructure system.

Bagchi's research group is working to make the algorithm more scalable and able to adapt to an attacker who may make multiple attempts to hack into a system. The researchers' work on the algorithm is funded by the National Science Foundation, the Wabash Heartland Innovation Network and the Army Research Lab.

Cybersecurity is an area of focus through Purdue's Next Moves, a set of initiatives that works to address some of the greatest technology challenges facing the U.S. Purdue's cybersecurity experts offer insights and assistance to improve the protection of power plants, electrical grids and other critical infrastructure.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified