Symantec Proves Russian


NFPA 70b Training - Electrical Maintenance

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today

Dragonfly energy sector cyberattacks target ICS and SCADA across critical infrastructure, including the power grid and nuclear facilities, using spearphishing, watering-hole sites, supply-chain compromises, malware, and VPN exploits to gain operational access.

 

Key Points

Dragonfly APT campaigns target energy firms and ICS to gain grid access, risking manipulation and service disruption.

✅ Breaches leveraged spearphishing, watering-hole sites, and supply chains.

✅ Targeted ICS, SCADA, VPNs to pivot into operational networks.

✅ Aimed to enable power grid manipulation and potential outages.

 

An October, 2017 report by researchers at Symantec Corp., cited by the U.S. government, has linked recent US power grid cyber attacks to a group of hackers it had code-named "Dragonfly", and said it found evidence critical infrastructure facilities in Turkey and Switzerland also had been breached.

The Symantec researchers said an earlier wave of attacks by the same group starting in 2011 was used to gather intelligence on companies and their operational systems. The hackers then used that information for a more advanced wave of attacks targeting industrial control systems that, if disabled, leave millions without power or water.

U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attacks, condemned by the U.S. government, striking almost simultaneously at multiple locations, are testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

#google#

While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers.

“Since at least March 2016, Russian government cyber actors… targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,” according to Thursday’s FBI and Department of Homeland Security report. The report did not say how successful the attacks were or specify the targets, but said that the Russian hackers “targeted small commercial facilities’ networks where they staged malware, conducted spearphishing, and gained remote access into energy sector networks.” At least one target of a string of infrastructure attacks last year was a nuclear power facility in Kansas.

Symantec doesn’t typically point fingers at particular nations in its research on cyberattacks, said Eric Chien, technical director of Symantec’s Security Technology and Response division, though he said his team doesn’t see anything it would disagree with in the new federal report. The government report appears to corroborate Symantec’s research, showing that the hackers had penetrated computers and accessed utility control rooms that would let them directly manipulate power systems, he says.

“There were really no more technical hurdles for them to do something like flip off the power,” he said.

And as for the group behind the attacks, Chien said it appears to be relatively dormant for now, but it has gone quiet in the past only to return with new hacks.

“We expect they’re sort of retooling now, and they likely will be back,”

 


 

In some cases, Dragonfly successfully broke into the core systems that control US and European energy companies, Symantec revealed.

“The energy sector has become an area of increased interest to cyber-attackers over the past two years,” Symantec said in its report.

“Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the US being compromised by hackers.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.”

In recent weeks, senior US intelligence officials said that the Kremlin believes it can launch hacking operations against the West with impunity, including a cyber weapon that can disrupt power grids, according to assessments.

The DHS and FBI report further elaborated: “This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organisations such as trusted third-party suppliers with less-secure networks, referred to as ‘staging targets’ throughout this alert.

“The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. National Cybersecurity and Communications Integration Center and FBI judge the ultimate objective of the actors is to compromise organisational networks, also referred to as the ‘intended target’.”

According to the US alert, hackers used a variety of attack methods, including spear-phishing emails, watering-hole domains, credential gathering, open source and network reconnaissance, host-based exploitation, and deliberate targeting of ICS infrastructure.

The attackers also targeted VPN software and used password cracking tools.

Once inside, the attackers downloaded tools from a remote server and then carried out a number of actions, including modifying key systems to store plaintext credentials in memory, and built web shells to gain command and control of targeted systems.

“This actors’ campaign has affected multiple organisations in the energy, nuclear, water, aviation, construction and critical manufacturing sectors, with hundreds of victims across the U.S. power grid confirmed,” the DHS said, before outlining a number of steps that IT managers in infrastructure organisations can take to cleanse their systems and defend against Russian hackers. he said.
 

 

Related News

Related News

UK Energy Industry Divided Over Free Electricity Debate

UK Free Electricity Debate weighs soaring energy prices against market regulation, renewables, and social equity, examining price caps, funding via windfall taxes, grid investment, and consumer protection in the UK's evolving energy policy landscape.

 

Key Points

A policy dispute over free power, balancing consumer relief with market stability, renewables, and investment.

✅ Pros: relief for households; boosts efficiency and green adoption.

✅ Cons: risks to market signals, quality, and grid investment.

✅ Policy options: price caps, windfall taxes, targeted subsidies.

 

In recent months, the debate over free electricity in the UK has intensified, revealing a divide within the energy sector. With soaring energy prices and economic pressures impacting consumers, the discussion around providing free electricity has gained traction. However, the idea has sparked significant controversy among industry stakeholders, each with their own perspectives on the feasibility and implications of such a move.

The Context of Rising Energy Costs

The push for free electricity is rooted in the UK’s ongoing energy crisis, exacerbated by geopolitical tensions, supply chain disruptions, and the lingering effects of the COVID-19 pandemic. As energy prices reached unprecedented levels, households faced the harsh reality of skyrocketing bills, prompting calls for government intervention to alleviate financial burdens.

Supporters of free electricity argue that it could serve as a vital lifeline for struggling families and businesses. The proposal suggests that by providing a certain amount of electricity for free, the government could help mitigate the effects of rising costs while encouraging energy conservation and efficiency.

Industry Perspectives

However, the notion of free electricity has not been universally embraced within the energy sector. Some industry leaders express concerns about the financial viability of such a scheme. They argue that providing free electricity could undermine the market dynamics that incentivize investment in infrastructure and renewable energy, in a market already exposed to natural gas price volatility today. Critics warn that if energy companies are forced to absorb costs, it could lead to diminished service quality and investment in necessary advancements.

Additionally, there are worries about how free electricity could be funded. Proponents suggest that a tax on energy companies could generate the necessary revenue, but opponents question whether this would stifle innovation and competition. The fear is that placing additional financial burdens on energy providers could ultimately lead to higher prices in the long run.

Renewable Energy and Sustainability

Another aspect of the debate centers around the UK’s commitment to transitioning to renewable energy sources. Supporters of free electricity emphasize that such a policy could encourage more widespread adoption of green technologies by making energy more accessible. They argue that by removing the financial barriers associated with energy costs, households would be more inclined to invest in solar panels, heat pumps, and other sustainable solutions.

On the other hand, skeptics contend that the focus should remain on ensuring a stable and reliable energy supply as the UK moves toward its climate goals. They caution against implementing policies that might disrupt the balance of the energy market, potentially hindering the necessary investments in renewable infrastructure.

Government's Role

As discussions unfold, the government’s role in this debate is crucial. Policymakers must navigate the complex landscape of energy regulation, market dynamics, and consumer needs. The government has already introduced measures aimed at assisting vulnerable households, such as energy price caps and direct financial support. However, the question remains whether these initiatives go far enough in addressing the root causes of the energy crisis.

In this context, the government faces pressure from both consumers demanding relief and industry leaders advocating for market stability, including proposals to end the link between gas and electricity prices to curb price volatility. The challenge lies in finding a middle ground that balances immediate support for households with long-term sustainability and investment in the energy sector.

Future Implications

The ongoing debate about free electricity in the UK underscores broader themes related to energy policy, market regulation, and social equity, with rising electricity prices abroad offering context for comparison. As the country navigates its energy transition, the decisions made today will have far-reaching implications for both consumers and the industry.

If the government chooses to pursue a model that includes free electricity, it will need to carefully consider how to implement such a system without jeopardizing the market. Transparency, stakeholder engagement, and thorough impact assessments will be essential to ensure that any new policies are sustainable and equitable.

Conversely, if the concept of free electricity is ultimately rejected, the focus will likely shift back to addressing energy costs through other means, such as enhancing energy efficiency programs or increasing support for vulnerable populations.

The divide within the UK’s energy industry regarding free electricity highlights the complexities of balancing consumer needs with market stability. As the energy crisis continues to unfold, the conversations surrounding this issue will remain at the forefront of public discourse. Ultimately, finding a solution that addresses the immediate challenges while promoting a sustainable energy future will be key to navigating this critical juncture in the UK’s energy landscape.

 

Related News

View more

Energy Efficiency and Demand Response Can Nearly Level Southeast Electricity Demand for More than a Decade

Southeast Electricity Demand Forecast examines how energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response shape grid needs, stabilize load through 2030, shift peaks, and inform utility planning across the region.

 

Key Points

An outlook of load shaped by efficiency, solar, EVs, with demand response keeping usage steady through 2030.

✅ Stabilizes regional demand through 2030 under accelerated adoption

✅ Energy efficiency and demand response are primary levers

✅ EVs and heat pumps drive growth post 2030; shift winter peaks

 

Electricity markets in the Southeast are facing many changes on the customer side of the meter. In a new report released today, we look at how energy efficiency, photovoltaics (solar electricity), electric vehicles, heat pumps, and demand response (shifting loads from periods of high demand) might affect electricity needs in the Southeast.

We find that if all of these resources are pursued on an accelerated basis, electricity demand in the region can be stabilized until about 2030.

After that, demand will likely grow in the following decade because of increased market penetration of electric vehicles and heat pumps, but energy planners will have time to deal with this growth if these projections are borne out. We also find that energy efficiency and demand response can be vital for managing electricity supply and demand in the region and that these resources can help contain energy demand growth, reducing the impact of expensive new generation on consumer wallets.

 

National trends

This is the second ACEEE report looking at regional electricity demand. In 2016, we published a study on electricity consumption in New England, finding an even more pronounced effect. For New England, with even more aggressive pursuit of energy efficiency and these other resources, consumption was projected to decline through about 2030, before rebounding in the following decade.

These regional trends fit into a broader national pattern. In the United States, electricity consumption has been characterized by flat electricity demand for the past decade. Increased energy efficiency efforts have contributed to this lack of consumption growth, even as the US economy has grown since the Great Recession. Recently, the US Energy Information Administration (EIA – a branch of the US Department of Energy) released data on US electricity consumption in 2016, finding that 2016 consumption was 0.3% below 2015 consumption, and other analysts reported a 1% slide in 2023 on milder weather.

 

Five scenarios for the Southeast

ACEEE’s new study focuses on the Southeast because it is very different from New England, with warmer weather, more economic growth, and less-aggressive energy efficiency and distributed energy policies than the Northeast. For the Southeast, we examined five scenarios: a business-as-usual scenario; two alternative scenarios with progressively higher levels of energy efficiency, photovoltaics informed by a solar strategy for the South that is emerging regionally, electric vehicles, heat pumps, and demand response; and two scenarios combining high numbers of electric vehicles and heat pumps with more modest levels of the other resources. This figure presents electricity demand for each of these scenarios:

Over the 2016-2040 period, we project that average annual growth will range from 0.1% to 1.0%, depending on the scenario, much slower than historic growth in the region. Energy efficiency is generally the biggest contributor to changes in projected 2040 electricity consumption relative to the business-as-usual scenario, as shown in the figure below, which presents our accelerated scenario that is based on levels of energy efficiency and other resources now targeted by leading states and utilities in the Southeast.

To date, Entergy Arkansas has achieved the annual efficiency savings as a percent of sales shown in the accelerated scenario and Progress Energy (a division of Duke Energy) has nearly achieved those savings in both North and South Carolina. Sixteen states outside the Southeast have also achieved these savings statewide.

The efficiency savings shown in the aggressive scenario have been proposed by the Arkansas PSC. This level of savings has already been achieved by Arizona as well as six other states. Likewise, the demand response savings we model have been achieved by more than 10 utilities, including four in the Southeast. The levels of photovoltaic, electric vehicle, and heat pump penetration are more speculative and are subject to significant uncertainty.

We also examined trends in summer and winter peak demand. Most utilities in the Southeast have historically had peak demand in the summer, often seeing heatwave-driven surges that stress operations across the Eastern U.S., but our analysis shows that winter peaks will be more likely in the region as photovoltaics and demand response reduce summer peaks and heat pumps increase winter peaks.

 

Why it’s vital to plan broadly

Our analysis illustrates the importance of incorporating energy efficiency, demand response, and photovoltaics into utility planning forecasts as utility trends to watch continue to evolve. Failing to include these resources leads to much higher forecasts, resulting in excess utility system investments, unnecessarily increasing customer electricity rates. Our analysis also illustrates the importance of including electric vehicles and heat pumps in long-term forecasts. While these technologies will have moderate impacts over the next 10 years, they could become increasingly important in the long run.

We are entering a dynamic period of substantial uncertainty for long-term electricity sales and system peaks, highlighted by COVID-19 demand shifts that upended typical patterns. We need to carefully observe and analyze developments in energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response over the next few years. As these technologies advance, we can create policies to reduce energy bills, system costs, and harmful emissions, drawing on grid reliability strategies tested in Texas, while growing the Southeast’s economy. Resource planners should be sure to incorporate these emerging trends and policies into their long-term forecasts and planning.

 

Related News

View more

Florida Power & Light Faces Controversy Over Hurricane Rate Surcharge

FPL Hurricane Surcharge explained: restoration costs, Florida PSC review, rate impacts, grid resilience, and transparency after Hurricanes Debby and Helene as FPL funds infrastructure hardening and rapid storm recovery across Florida.

 

Key Points

A fee by Florida Power & Light to recoup hurricane restoration costs, under Florida PSC review for consumer fairness.

✅ Funds Debby and Helene restoration, materials, and crews

✅ Reviewed by Florida PSC for consumer protection and fairness

✅ Raises questions on grid resilience, transparency, and renewables

 

In the aftermath of recent hurricanes, Florida Power & Light (FPL) is under scrutiny as it implements a rate surcharge, alongside proposed rate hikes that span multiple years, to help cover the costs of restoration and recovery efforts. The surcharges, attributed to Hurricanes Debby and Helene, have stirred significant debate among consumers and state regulators, highlighting the ongoing challenges of hurricane preparedness and response in the Sunshine State.

Hurricanes are a regular threat in Florida, and FPL, as the state's largest utility provider, plays a critical role in restoring power and services after such events. However, the financial implications of these natural disasters often leave residents questioning the fairness and necessity of additional charges on their monthly bills. The newly proposed surcharge, which is expected to affect millions of customers, has ignited discussions about the adequacy of the company’s infrastructure investments and its responsibility in disaster recovery.

FPL’s decision to implement a surcharge comes as the company faces rising operational costs due to extensive damage caused by the hurricanes. Restoration efforts are not only labor-intensive but also require significant investment in materials and equipment to restore power swiftly and efficiently. With the added pressures of increased demand for electricity during peak hurricane seasons, utilities like FPL must navigate complex financial landscapes, similar to Snohomish PUD's weather-related rate hikes seen in other regions, while ensuring reliable service.

Consumer advocacy groups have raised concerns over the timing and justification for the surcharge. Many argue that frequent rate increases following natural disasters can strain already financially burdened households, echoing pandemic-related shutoff concerns raised during COVID that heightened energy insecurity. Florida residents are already facing inflationary pressures and rising living costs, making additional surcharges particularly difficult for many to absorb. Critics assert that utility companies should prioritize transparency and accountability, especially when it comes to costs incurred during emergencies.

The Florida Public Service Commission (PSC), which regulates utility rates and services, even as California regulators face calls for action amid soaring bills elsewhere, is tasked with reviewing the surcharge proposal. The commission’s role is crucial in determining whether the surcharge is justified and in line with the interests of consumers. As part of this process, stakeholders—including FPL, consumer advocacy groups, and the general public—will have the opportunity to voice their opinions and concerns. This input is essential in ensuring that the commission makes an informed decision that balances the utility’s financial needs with consumer protection.

In recent years, FPL has invested heavily in strengthening its infrastructure to better withstand hurricane impacts. These investments include hardening power lines, enhancing grid resilience, and implementing advanced technologies for quicker recovery, with public outage prevention tips also promoted to enhance preparedness. However, as storms become increasingly severe due to climate change, the question arises: are these measures sufficient? Critics argue that more proactive measures are needed to mitigate the impacts of future storms and reduce the reliance on post-disaster rate increases.

Additionally, the conversation around climate resilience is becoming increasingly prominent in discussions about energy policy in Florida. As extreme weather events grow more common, utilities are under pressure to innovate and adapt their systems. Some experts suggest that FPL and other utilities should explore alternative strategies, such as investing in decentralized energy resources like solar and battery storage, even as Florida declined federal solar incentives that could accelerate adoption, which could provide more reliable service during outages and reduce the overall strain on the grid.

The issue of rate surcharges also highlights a broader conversation about the energy landscape in Florida. With a growing emphasis on renewable energy and sustainability, consumers are becoming more aware of the environmental impacts of their energy choices, and some recall a one-time Gulf Power bill decrease as an example of short-term relief. This shift in consumer awareness may push utilities like FPL to reevaluate their business models and explore more sustainable practices that align with the public’s evolving expectations.

As FPL navigates the complexities of hurricane recovery and financial sustainability, the impending surcharge serves as a reminder of the ongoing challenges faced by utility providers in a climate-volatile world. While the need for recovery funding is undeniable, the manner in which it is implemented and communicated will be crucial in maintaining public trust and ensuring fair treatment of consumers. As discussions unfold in the coming weeks, all eyes will be on the PSC’s decision and FPL’s approach to balancing recovery efforts with consumer affordability.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Russian hackers had 'hundreds of victims' as they infiltrated U.S. power grid

Russian cyberattacks on U.S. power grid exposed DHS warnings: Dragonfly/Energetic Bear breached control rooms, ICS networks, and could trigger blackouts via switch manipulation, phishing, and malware, threatening critical infrastructure and utility operations nationwide.

 

Key Points

State-backed breaches of utility ICS and control rooms enabled potential switch manipulation and blackouts.

✅ DHS: Dragonfly/Energetic Bear breached utility networks

✅ Access reached control rooms and ICS for switch control

✅ Ongoing campaign via phishing, malware, lateral movement

 

Russian hackers for a state-sponsored organization invaded hundreds of control rooms of U.S. electric utilities that could have led to blackouts, a new report says.

The group, known as Dragonfly or Energetic Bear, infiltrated networks of U.S. utilities as part of an effort that is likely ongoing, Department of Homeland Security officials told the Wall Street Journal.

Jonathan Home, chief of industrial-control-system analysis for DHS, said the hackers “got to the point where they could have thrown switches” and upset power flows.

Although the agency did not disclose which companies were impacted, the officials at a briefing Monday said that there were “hundreds of victims” including breaches at power plants across the U.S., and that some companies may not be aware that hackers infiltrated their networks yet.

According to experts, Russia has been preparing for such attacks for some time now, prompting a renewed focus on protecting the grid among utilities and policymakers.

“They’ve been intruding into our networks and are positioning themselves for a limited or widespread attack,” said former Deputy Assistant Defense Secretary Michael Carpenter, now senior director at the Penn Biden Center at the University of Pennsylvania, per the Wall Street Journal. “They are waging a covert war on the West.”

Earlier this year, the Trump administration claimed Russia had staged a power grid hacking campaign against the U.S. energy grid and other U.S. infrastructure.

The report comes after President Trump told reporters last week during a joint press conference in Helsinki alongside Russian President Vladimir Putin that he had no reason not to believe the Russian leader's assurances to him that the Kremlin was not to blame for interference in the election.

Trump later admitted that he misspoke when he said he didn’t “see any reason why” Russia would have meddled in the 2016 election, and said he believes the U.S. intelligence community assessment that found that the Russian government did interfere in the electoral process.

 

Related News

View more

Despite delays, BC Hydro says crews responded well to 'atypical' storm

BC Hydro Ice Storm Response to Fraser Valley power outages highlights freezing rain impacts, round the clock crews, infrastructure challenges, and climate change risks across the Lower Mainland during winter weather and restoration efforts.

 

Key Points

A plan for freezing rain events that prioritizes safety, rapid repairs, and clear communication to restore power.

✅ Prioritizes hazards, critical loads, and public safety first

✅ Deploys crews, contractors, and equipment across affected areas

✅ Addresses climate risks without costly undergrounding expansion

 

Call it the straw that broke the llama's back.

The loss of power during recent Fraser Valley ice storms meant Jennifer Quick, who lives on a Mission farm, had no running water, couldn't cook with appliances and still had to tend to a daughter sick with stomach flu.

As if that wasn't enough, she had to endure the sight of her shivering llamas.

"I brought them outside at one point and when I brought them back in, they had icicles on their fur," she said, adding the animals stayed in the warmth of their barn from then on.

For three and a half days, Quick and her family were among more than 160,000 BC Hydro customers in the Fraser Valley left in the dark after ice storms whipped through the region.

BC Hydro expects to get all customers back online Tuesday, five days after the storm hit.

And with another storm possibly on the horizon, the utility is defending its response to the treacherous weather, noting that windstorm power outages can be widespread.

BC Hydro spokesperson Mora Scott said the utility has a "best in class" storm response system, similar to PG&E winter storm prep in the U.S.

"In a typical storm situation we normally have 95 per cent of our customers back up within 24 hours. Ice storms are different and obviously this was an atypical storm for us," she said.

Scott said that in this case, the utility got power back on for 75 per cent of customers within 24 hours. It took the work of 450 employees called in from around B.C., working around the clock, a mobilization echoed by Sudbury Hydro crews after a storm, she said.

The work was complicated by trees falling near crews, icy roads, low visibility and even substations so frozen over the ice had to be melted off with blowtorches.

She said that in the long term, BC Hydro has no plans to make changes to how it responds to extreme ice storms or how infrastructure is built.

"Seeing ice build up in the Lower Mainland like this is a rare event," she said. "So to build for extremes like that probably doesn't make a lot of sense."

 

Climate change will bring storms

But CBC meteorologist Johanna Wagstaffe said that might not always be the case as climate change continues to impact our planet.

"The less severe winter events, like light snowfall, will happen less often," she said. "But the disruptive events — like last week's storm — will actually happen more often and we are already seeing this shift happen."

Marc Eliesen, a former CEO of BC Hydro in the early 1990s, said the utility needs to keep that in mind when planning for worst-case scenarios.

"This [storm] is a condition characteristic of the weather in the east, particularly in Ontario and Quebec, where freezing rain outages in Quebec are more common, which is organized to deal with freezing rain and heavy snow on the lines," he said. "This is a new phenomenon for British Columbia."

Eliesen questions whether BC Hydro has adequate equipment and crew training to deal with ice storms if they become more frequent, pointing to Hydro One storm restoration in Ontario as a comparison.

 

'Always something we can learn'

Scott disagrees with some of Eliesen's points.

She said some of the crews called in to deal with the recent storm come from northern B.C. and the Interior and have plenty of experience with snow.

"There's always something we can learn in every major storm situation," she said.

The idea of putting power lines underground was raised by some CBC readers and listeners, but Scott said running underground lines is five to 10 times the cost of running lines on pole, so it is done sparingly. Besides, equipment like substations and transmission lines need to be kept aboveground.

Meanwhile, Wagstaffe said that beginning Thursday, wintry weather could return to the Lower Mainland.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified