EU Smart Meters Spur Growth in the Customer Analytics Market


eu smart grid

Substation Relay Protection Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today

EU Smart Meter Analytics integrates AMI data with grid edge platforms, enabling back-office efficiency, revenue assurance, and customer insights via cloud and PaaS solutions, while system integration cuts costs and improves utility performance.

 

Key Points

EU smart meter analytics uses AMI data and cloud to improve utility performance, revenue assurance, and outcomes.

✅ AMI underpins grid edge analytics and utility IT/OT integration

✅ Cloud and PaaS reduce costs and scale data-driven applications

✅ Focus shifts from meter rollout to back-office and revenue analytics

 

Europe's investment in smart meters has begun to open up the market for analytics that benefit both utilities and customers.

Two new reports from GTM Research demonstrate the substantial investment in both advanced metering infrastructure (AMI) and specific customer analytics segments -- the first report analyzes the progress of AMI deployment in Europe, while the second is a comprehensive assessment of analytics use cases, including AI in utility operations, enabled by or interacting with AMI.

The Third Energy Package mandated EU member states to perform a cost-benefit analysis to evaluate the economic viability of deploying smart meters and broader grid modernization costs across member states. Two-thirds of the member states found there was a net positive result, while seven members found negative or inconclusive results.

“The mandate spurred AMI deployment in the EU, but all member states are deploying some AMI. Even without an overall positive cost-benefit outcome, utilities found pockets of customers where there is a positive business case for AMI,” said Paulina Tarrant, research associate at GTM Research and lead author of “Racing to 2020: European Policy, Deployment and Market Share Primer.”

Annual AMI contracting peaked in 2013 -- two years after the mandate -- with 29 million contracted that year. Today, 100 million meters have been contracted overall. As member states reach their respective targets, the AMI market will cool in Europe and spending on analytics and applications will continue to ramp up, aligning with efforts to invest in smarter infrastructure across the sector, Tarrant noted.

Between 2017 and 2021, more than $30 billion will be spent on utility back-office and revenue-assurance analytics in the EU, reflecting the shift toward the digital grid architecture, according to GTM Research’s Grid Edge Customer Utility Analytics Ecosystems: Competitive Analysis, Forecasts and Case Studies.

The report examines the broad landscape of customer analytics showing how AMI interacts with the larger IT/OT environment of a utility.

“The benefits of AMI expand beyond revenue assurance -- in fact, AMI represents the backbone of many customer utility analytics and grid edge solutions,” said Timotej Gavrilovic, author of the Grid Edge Customer Utility Ecosystems report.

Integration is key, according to the report.

“Technology providers are integrating data sets, solutions and systems and partnering with others to provide a one-stop shop serving broad utility needs, increasing efficiencies and reducing costs,” Gavrilovic said. “Cloud-based deployments and platform-as-a-service offerings are becoming commonplace, creating an opportunity for utilities to balance the cost versus performance tradeoff to optimize their analytics systems and applications.”

A diverse array of customer analytics applications is a critical foundation for demonstrating the positive cost-benefit of AMI.

“Advanced analytics and applications are key to ensuring that AMI investments provide a positive return after smart meters are initiated,” said Tarrant. “Improved billing and revenue assurance was not enough everywhere to show customer benefit -- these analytics packages will leverage the distributed network infrastructure, including advanced inverters used with distributed energy resources, and subsequent increased data access, uniting the electricity markets of the EU.”

Related News

BC Hydro hoping to be able to charge customers time of use rates

BC Hydro Time-of-Use Rates propose off-peak credits and peak surcharges, with 5 cent/kWh differentials, encouraging demand shifting, EV charging at night, and smart meter adoption, pending BC Utilities Commission review in an optional opt-in program.

 

Key Points

Optional pricing that credits 5 cents/kWh off-peak and adds 5 cents/kWh during 4-9 p.m. peak to encourage load shifting.

✅ Off-peak credit: 11 p.m.-7 a.m., 5 cents/kWh savings

✅ Peak surcharge: 4-9 p.m., additional 5 cents/kWh

✅ Opt-in only; BCUC review; suits EV charging and flexible loads

 

BC Hydro is looking to charge customers less for electricity during off peak hours and more during the busiest times of the day, reflecting holiday electricity demand as well.

The BC Utilities Commission is currently reviewing the application that if approved would see customers receive a credit of 5 cents per kilowatt hour for electricity used from 11 p.m. to 7 a.m.

Customers would be charged an additional 5 cents per kWh for electricity used during the on-peak period from 4 p.m. to 9 p.m., and in Ontario, there were no peak-rate cuts for self-isolating customers during early pandemic response.

There would be no credit or additional charge will be applied to usage during the off-peak period from 7 a.m. to 4 p.m. and 9 p.m. to 11 p.m.

“We know the way our customers are using power is changing and they want more options,” BC Hydro spokesperson Susie Rieder said.

“It is optional and we know it may not work for everyone.”

For example, if a customer has an electric vehicle it will be cheaper to plug the car in after 9 p.m., similar to Ontario's ultra-low overnight plan offerings, rather than immediately after returning home from a standard work day.

If approved, the time of use rates would only apply to customers who opt in to the program, whereas Ontario provided electricity relief during COVID-19.

During the pandemic, Ontario extended off-peak electricity rates to help households and small businesses.

The regulatory review process is expected to take about one year.

Other jurisdictions, including Ontario's ultra-low overnight pricing, currently offer off peak rates. One of the challenges is that consumers change in hopes of altering their behaviour, but in reality, end up paying more.

“The cheapest electrical grid system is one with consistent demand and the issue of course is our consumption is not flat,” energyrates.ca founder Joel MacDonald said.

“There is a 5 cent reduction in off peak times, there is a 5 cent increase in peak times, you would have to switch 50 per cent of your load.”

 

Related News

View more

After alert on Russian hacking, a renewed focus on protecting U.S. power grid

U.S. Power Grid Cybersecurity combats DHS-FBI flagged threats to energy infrastructure, with PJM Interconnection using ICS/SCADA segmentation, phishing defenses, incident response, and resilience exercises against Russia-linked attacks and pipeline intrusions.

 

Key Points

Strategies, controls, and training that protect U.S. electric infrastructure from cyber threats and disruptions.

✅ ICS/SCADA network segmentation and zero-trust architecture

✅ Employee phishing drills and incident response playbooks

✅ DOE-led grid exercises and threat intelligence sharing

 

The joint alert from the FBI and Department of Homeland Security last month warning that Russia was hacking into critical U.S. energy infrastructure, as outlined in six essential reads on Russian hacks from recent coverage, came as no surprise to the nation’s largest grid operator, PJM Interconnection.

“You will never stop people from trying to get into your systems. That isn’t even something we try to do.” said PJM Chief Information Officer, Tom O’Brien. “People will always try to get into your systems. The question is, what controls do you have to not allow them to penetrate? And how do you respond in the event they actually do get into your system?”

PJM is the regional transmission organization for 65 million people, covering 13 states, including Pennsylvania, and Washington D.C.

On a rainy day in early April, about 10 people were working inside PJM’s main control center, outside Philadelphia, closely monitoring floor-to-ceiling digital displays showing real-time information from the electric power sector throughout PJM’s territory in the mid-Atlantic and parts of the midwest, amid reports that hackers accessed control rooms at U.S. utilities.

#google#

Donnie Bielak, a reliability engineering manager, was overseeing things from his office, perched one floor up.

“This is a very large, orchestrated effort that goes unnoticed most of the time,” Bielak said. “That’s a good thing.”

But the industry certainly did take notice in late 2015 and early 2016, when hackers successfully disrupted power to the Ukrainian grid. The outages lasted a few hours and affected about 225,000 customers. It was the first publicly-known case of a cyber attack causing major disruptions to a power grid. It was widely blamed on Russia.

One of the many lessons of the Ukraine attacks was a reminder to people who work on critical infrastructure to keep an eye out for odd communications.

“A very large percentage of entry points to attacks are coming through emails,” O’Brien said. “That’s why PJM, as well as many others, have aggressive phishing campaigns. We’re training our employees.”

O’Brien doesn’t want to get into specifics about how PJM deals with cyber threats. But one common way to limit exposure is by having separate systems: For example, industrial controls in a power plant are not connected to corporate business networks, a separation underscored after breaches at U.S. power plants prompted reviews across the sector.

Since 2011, North American grid operators and government agencies have also done large, security exercises every two years. Thousands of people practice how they’d respond to a coordinated physical or cyber event, including rising substation attacks that highlight resilience gaps.

So far, nothing like that has happened in the U.S. It’s possible, but not likely, according to Robert M. Lee, a former military intelligence analyst, who runs the industrial cybersecurity firm Dragos.

“The more complex the system, the harder it is to have a scalable attack,” said Lee, who co-authored a report analyzing the Ukraine attacks. “If you wanted to take out a power generation station– that isn’t the most complex thing. Let’s say you cause an hour of outage. But now you want to cause two months of outages? That’s an exponential increase in effort required.”

For example, he said, it would very difficult for hackers to knock out power to the entire east coast for a long time. But briefly disrupting a major city is easier. That’s the sort of thing that keeps him up at night.

“I worry about an adversary getting into, maybe, Washington D.C.’s portion of the grid, taking down power for 30 minutes,” he said.

The Department of Energy is creating a new office focused on cybersecurity and emergency response, following the U.S. government’s condemnation of power grid hacking by Russia.

Deterrence may be one reason why there has not yet been a major attack on the U.S. grid, said John MacWilliams, a former senior DOE official who’s now a fellow at Columbia University’s Center on Global Energy Policy.

“That’s obviously an act of war,” he said. “We have the capability of responding either through cyber mechanisms or kinetic military.”

In the meantime, small-scale incidents keep happening.

This spring, another cyber attack targeted natural gas pipelines. Four companies shut down their computer systems, just in case, but they say no service was disrupted.

 

Related News

View more

Power Outage Affects 13,000 in North Seattle

North Seattle Power Outage disrupts 13,000 in Ballard, Northgate, and Lake City as Seattle City Light crews repair equipment failures. Aging infrastructure, smart grid upgrades, microgrids, and emergency preparedness highlight resilience and reliability challenges.

 

Key Points

A major outage affecting 13,000 in North Seattle from equipment failures and aging grid, prompting repairs and planning.

✅ 13,000 customers in Ballard, Northgate, Lake City affected

✅ Cause: equipment failures and aging infrastructure

✅ Crews, smart grid upgrades, and preparedness improve resilience

 

On a recent Wednesday morning, a significant power outage struck a large area of North Seattle, affecting approximately 13,000 residents and businesses. This incident not only disrupted daily routines, as seen in a recent London outage, but also raised questions about infrastructure reliability and emergency preparedness in urban settings.

Overview of the Outage

The outage began around 9 a.m., with initial reports indicating that neighborhoods including Ballard, Northgate, and parts of Lake City were impacted. Utility company Seattle City Light quickly dispatched crews to identify the cause of the outage and restore power as soon as possible. By noon, the utility reported that repairs were underway, with crews working diligently to restore service to those affected.

Such outages can occur for various reasons, including severe weather, such as windstorm-related failures, equipment failure, or accidents involving utility poles. In this instance, the utility confirmed that a series of equipment failures contributed to the widespread disruption. The situation was exacerbated by the age of some infrastructure in the area, highlighting ongoing concerns about the need for modernization and upgrades.

Community Impact

The power outage caused significant disruptions for residents and local businesses. Many households faced challenges as their morning routines were interrupted—everything from preparing breakfast to working from home became more complicated without electricity. Schools in the affected areas also faced challenges, as some had to adjust their schedules and operations.

Local businesses, particularly those dependent on refrigeration and electronic payment systems, felt the immediate impact. Restaurants struggled to serve customers without power, while grocery stores dealt with potential food spoilage, leading to concerns about lost inventory and revenue. The outage underscored the vulnerability of businesses to infrastructure failures, as recent Toronto outages have shown, prompting discussions about contingency plans and backup systems.

Emergency Response

Seattle City Light’s swift response was crucial in minimizing the outage's impact. Utility crews worked through the day to restore power, and the company provided regular updates to the community, keeping residents informed about progress and estimated restoration times. This transparent communication was essential in alleviating some of the frustration among those affected, and contrasts with extended outages in Houston that heightened public concern.

Furthermore, the outage served as a reminder of the importance of emergency preparedness for both individuals and local governments, and of utility disaster planning that supports resilience. Many residents were left unprepared for an extended outage, prompting discussions about personal emergency kits, alternative power sources, and community resources available during such incidents. Local officials encouraged residents to stay informed about power outages and to have a plan in place for emergencies.

Broader Implications for Infrastructure

This incident highlights the broader challenges facing urban infrastructure. Many cities, including Seattle, are grappling with aging power grids that struggle to keep up with modern demands, and power failures can disrupt transit systems like the London Underground during peak hours. Experts suggest that regular assessments and updates to infrastructure are critical to ensuring reliability and resilience against both natural and human-made disruptions.

In response to increasing frequency and severity of power outages, including widespread windstorm outages in Quebec, there is a growing call for investment in modern technologies and infrastructure. Smart grid technology, for instance, can enhance monitoring and maintenance, allowing utilities to respond more effectively to outages. Additionally, renewable energy sources and microgrid systems could offer more resilience and reduce reliance on centralized power sources.

The recent power outage in North Seattle was a significant event that affected thousands of residents and businesses. While the immediate response by Seattle City Light was commendable, the incident raised important questions about infrastructure reliability and emergency preparedness. As cities continue to grow and evolve, the need for modernized power systems and improved contingency planning will be crucial to ensuring that communities can withstand future disruptions.

As residents reflect on this experience, it serves as a reminder of the interconnectedness of urban living and the critical importance of reliable infrastructure in maintaining daily life. With proactive measures, cities can work towards minimizing the impact of such outages and building a more resilient future for their communities.

 

Related News

View more

CAA Quebec Shines at the Quebec Electric Vehicle Show

CAA Quebec Electric Mobility spotlights EV adoption, charging infrastructure, consumer education, and sustainability, highlighting policy collaboration, model showcases, and greener transport solutions from the Quebec Electric Vehicle Show to accelerate climate goals and practical ownership.

 

Key Points

CAA Quebec's program advancing EV education, charging network advocacy, and collaboration for sustainable transport.

✅ Consumer education demystifying EV range and charging

✅ Hands-on showcases of new EV models and safety tech

✅ Advocacy for faster, wider public charging networks

 

The Quebec Electric Vehicle Show has emerged as a significant event for the automotive industry, drawing attention from enthusiasts, industry experts, and consumers alike, similar to events like Everything Electric in Vancouver that amplify public interest. This year, CAA Quebec took center stage, showcasing its commitment to promoting electric vehicles (EVs) and sustainable transportation solutions.

A Strong Commitment to Electric Mobility

CAA Quebec’s participation in the show underscores its dedication to facilitating the transition to electric mobility. With the rising concerns over climate change and the increasing popularity of electric vehicles, as Canada pursues ambitious EV targets nationwide, organizations like CAA are pivotal in educating the public about the benefits and practicality of EV ownership. At the show, CAA Quebec offered valuable insights into the latest trends in electric mobility, including advancements in technology, charging infrastructure, and the overall impact on the environment.

Educational Initiatives

One of the highlights of CAA Quebec's presentation was its focus on education. The organization hosted informative sessions aimed at demystifying electric vehicles for the average consumer. Many potential buyers are still apprehensive about making the switch from traditional gasoline-powered cars. CAA Quebec addressed common misconceptions about EVs, such as range anxiety and charging challenges, providing attendees with the knowledge they need to make informed decisions.

The sessions included expert panels discussing the future of electric vehicles, with insights from automotive industry leaders and environmental experts, and addressing debates such as experts questioning Quebec's EV push that shape policy discussions.

Showcasing Innovative EVs

CAA Quebec also showcased a variety of electric vehicles from different manufacturers, giving attendees the chance to see and experience the latest models firsthand, similar to a popular EV event in Regina that drew strong community interest. This hands-on approach allowed potential buyers to explore the features of EVs, from performance metrics to safety technologies. By allowing consumers to interact with the vehicles, CAA Quebec helped to bridge the gap between interest and action, encouraging more people to consider an electric vehicle as their next purchase.

Addressing Infrastructure Challenges

A significant barrier to the widespread adoption of electric vehicles remains the availability of charging infrastructure. CAA Quebec took the opportunity to address this critical issue during the show. The organization has been actively involved in advocating for improved charging networks across Quebec, emphasizing the need for more public charging stations and faster charging options, where examples like BC's Electric Highway illustrate how corridor charging can ease long-distance travel concerns.

Collaboration with Government and Industry

CAA Quebec’s efforts are bolstered by collaboration with both government and industry stakeholders. The organization is working closely with provincial authorities to develop policies that support the growth of electric vehicle infrastructure. Additionally, partnerships with automotive manufacturers are paving the way for more sustainable practices in vehicle production and distribution, and utilities exploring vehicle-to-grid pilots in Nova Scotia to enhance grid resilience.

A Bright Future for Electric Vehicles

The Quebec Electric Vehicle Show highlighted not only the current state of electric mobility but also its promising future, reflected in growing interest in EVs in southern Alberta and other provinces. With the support of organizations like CAA Quebec, consumers are becoming more aware of the benefits of electric vehicles. This awareness is crucial as Quebec aims to achieve its ambitious climate goals, including a significant reduction in greenhouse gas emissions.

CAA Quebec's presence at the Quebec Electric Vehicle Show exemplifies its leadership in promoting electric vehicles and sustainable transportation. By focusing on education, showcasing innovative models, and advocating for improved infrastructure, CAA Quebec is helping to pave the way for a greener future. As the automotive landscape continues to evolve, the insights and initiatives presented at the show will play a vital role in guiding consumers towards embracing electric mobility. The future is electric, and with organizations like CAA Quebec at the helm, that future looks promising.

 

Related News

View more

Ontario looks to build on electricity deal with Quebec

Ontario-Quebec Electricity Deal explores hydro imports, terawatt hours, electricity costs, greenhouse gas cuts, and baseload impacts, amid debates on Pickering nuclear operations and competitive procurement in Ontario's long-term energy planning.

 

Key Points

A proposed hydro import deal from Quebec, balancing costs, emissions, and reliability for Ontario electricity customers.

✅ Draft 20-year, 8 TWh offer reported by La Presse disputed

✅ Ontario seeks lower costs and GHG cuts versus alternatives

✅ Not a baseload replacement; Pickering closure not planned

 

Ontario is negotiating a possible energy swap agreement to buy electricity from Quebec, but the government is disputing a published report that it is preparing to sign a deal for enough electricity to power a city the size of Ottawa.

La Presse reported Tuesday that it obtained a copy of a draft, 20-year deal that says Ontario would buy eight terawatt hours a year from Quebec – about 6 per cent of Ontario’s consumption – whether the electricity is consumed or not.

Ontario Energy Minister Glenn Thibeault’s office said the province is in discussions to build on an agreement signed last year for Ontario to import up to two terawatt hours of electricity a year from Quebec.

 

But his office released a letter dated late last month to his Quebec counterpart, in which Mr. Thibeault said the offer extended in June was unacceptable because it would increase the average residential electricity bill by $30 a year.

“I am hopeful that your continued support and efforts will help to further discussions between our jurisdictions that could lead to an agreement that is in the best interest of both Ontario and Quebec,” Mr. Thibeault wrote July 27 to Pierre Arcand.

Ontario would prepare a “term sheet” for the next stage of discussions ahead of the two ministers meeting at the Energy and Mines Ministers Conference later this month in New Brunswick, Mr. Thibeault wrote.

Any future agreements with Quebec will have to provide a reduction in Ontario electricity rates compared with other alternatives and demonstrate measurable reductions in greenhouse gas emissions, he wrote.

Progressive Conservative Leader Patrick Brown said Ontario doesn’t need eight terawatt hours of additional power and suggested it means the Liberal government is considering closing power facilities such as the Pickering nuclear plant early.

A senior Energy Ministry official said that is not on the table. The government has said it intends to keep operating two units at Pickering until 2022, and the other four units until 2024.

Even if the Quebec offer had been accepted, the energy official said, that power wouldn’t have replaced any of Ontario’s baseload power because it couldn’t have been counted on 24 hours a day, 365 days a year.

The Society of Energy Professionals said Mr. Thibeault was right to reject the deal, but called on him to release the Long-Term Energy Plan – which was supposed to be out this spring – before continuing negotiations.

Some commentators have argued for broader reforms to address Ontario's hydro system challenges, urging policymakers to review all options as negotiations proceed.

The Ontario Energy Association said the reported deal would run counter to the government’s stated energy objectives amid concerns over electricity prices in the province.

“Ontarians will not get the benefit of competition to ensure it is the best of all possible options for the province, and companies who have invested in Ontario and have employees here will not get the opportunity to provide alternatives,” president and chief executive Vince Brescia said in a statement. “Competitive processes should be used for any new significant system capacity in Ontario.”

The Association of Power Producers of Ontario said it is concerned the government is even considering deals that would “threaten to undercut a competitive marketplace and long-term planning.”

“Ontario already has a surplus of energy, so it’s very difficult to see how this deal or any other sole-source deal with Quebec could benefit the province and its ratepayers,” association president and CEO David Butters said in a statement.

The Ontario Waterpower Association also said such a deal with Quebec would “present a significant challenge to continued investment in waterpower in Ontario.”

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified