Kaspersky Lab Discovers Russian Hacker Infrastructure


russian hacking code

CSA Z462 Arc Flash Training - Electrical Safety Essentials

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today

Crouching Yeti APT targets energy infrastructure with watering-hole attacks, compromising servers to steal credentials and stage intrusions; Kaspersky Lab links the Energetic Bear group to ICS threats across Russia, US, Europe, and Turkey.

 

Key Points

Crouching Yeti APT, aka Energetic Bear, is a threat group that targets energy firms using watering-hole attacks.

✅ Targets energy infrastructure via watering-hole compromises

✅ Uses open-source tools and backdoored sshd for persistence

✅ Scans global servers to stage intrusions and steal credentials

 

A hacker collective known for attacking industrial companies around the world have had some of their infrastructure identified by Russian security specialists.

Kaspersky Lab said that it has discovered a number of servers compromised by the group, belonging to different organisations based in Russia, the US, and Turkey, as well as European countries.

The Russian-speaking hackers, known as Crouching Yeti or Energetic Bear, mostly focus on energy facilities, as seen in reports of infiltration of the U.S. power grid targeting critical infrastructure, for the main purpose of stealing valuable data from victim systems.

 

Hacked servers

Crouching Yeti is described as an advanced persistent threat (APT) group that Kaspersky Lab has been tracking since 2010.

#google#

Kaspersky Lab said that the servers it has compromised are not just limited to industrial companies. The servers were hit in 2016 and 2017 with different intentions. Some were compromised to gain access to other resources or to be used as intermediaries to conduct attacks on other resources.

Others, including those hosting Russian websites, were used as watering holes.

It is a common tactic for Crouching Yeti to utilise watering hole attacks where the attackers inject websites with a link redirecting visitors to a malicious server.

“In the process of analysing infected servers, researchers identified numerous websites and servers used by organisations in Russia, US, Europe, Asia and Latin America that the attackers had scanned with various tools, possibly to find a server that could be used to establish a foothold for hosting the attackers’ tools and to subsequently develop an attack,” said the security specialists in a blog posting.

“The range of websites and servers that captured the attention of the intruders is extensive,” the firm said. “Kaspersky Lab researchers found that the attackers had scanned numerous websites of different types, including online stores and services, public organisations, NGOs, manufacturing, etc.

Kaspersky Lab said that the hackers used publicly available malicious tools, designed for analysing servers, and for seeking out and collecting information. The researchers also found a modified sshd file with a preinstalled backdoor. This was used to replace the original file and could be authorised with a ‘master password’.

“Crouching Yeti is a notorious Russian-speaking group that has been active for many years and is still successfully targeting industrial organisations through watering hole attacks, among other techniques,” explained Vladimir Dashchenko, head of vulnerability research group at Kaspersky Lab ICS CERT.

 

Russian government?

“Our findings show that the group compromised servers not only for establishing watering holes, but also for further scanning, and they actively used open-sourced tools that made it much harder to identify them afterwards,” he said.

“The group’s activities, such as initial data collection, the theft of authentication data, and the scanning of resources, are used to launch further attacks,” said Dashchenko. “The diversity of infected servers and scanned resources suggests the group may operate in the interests of the third parties.”

This may well tie into a similar conclusion from a rival security vendor.

In 2014 CrowdStrike claimed that the ‘Energetic Bear’ group was also tracked in Symantec's Dragonfly research and had been hacking foreign companies on behalf of the Russian state.

The security vendor had said the group had been carrying out attacks on foreign companies since 2012, with reports of breaches at U.S. power plants that underscored the campaign, and there was evidence that these operations were sanctioned by the Russian government.

Last month the United States for the first time publicly accused Russia in a condemnation of Russian grid hacking of attacks against the American power grid.

Symantec meanwhile warned last year of a resurgence in cyber attacks on European and US energy companies, including reports of access to U.S. utility control rooms that could result in widespread power outages.

And last July the UK’s National Cyber Security Centre (NCSC) acknowledged it was investigating a broad wave of attacks on companies in the British energy and manufacturing sectors.

 

Related News

Related News

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

How IRENA Study Will Resolve Philippines’ Electricity Crisis

Philippines Renewable Energy Mini-Grids address rising electricity demand, rolling blackouts, off-grid electrification, and decentralized power in an archipelago, leveraging solar, wind, and hybrid systems to close the generation capacity gap and expand household access.

 

Key Points

Decentralized solar, wind, and hybrid systems powering off-grid areas to relieve shortages and expand access.

✅ Targets 2.3M unelectrified homes with reliable clean power

✅ Mitigates rolling blackouts via modular mini-grid deployments

✅ Supports energy access, resilience, and grid decentralization

 

The reason why IRENA made its study in the Philippines is because of the country’s demand for electricity is on a steady rise while the generating capacity lags behind. To provide households the electricity, the government is constrained to implement rolling blackouts in some regions. By 2030, the demand for electricity is projected to reach 30 million kilowatts as compared to 17 million kilowatts which is its current generating capacity.

One of the country’s biggest conglomerations, San Miguel Corporation is accountable for almost 20% of power output. It has power plants that has a 900,000-kW generation capacity. Another corporation in the energy sector, Aboitiz Power, has augmented its facilities as well to keep up with the demand. As a matter fact, even foreign players such as Tokyo Electric Power and Marubeni, as a result of the gradual privatization of the power industry which started in 2001, have built power plants in the country, a challenge mirrored in other regions where electricity for all demands greater investment, yet the power supply remains short.

And so, the IRENA came up with the study entitled “Accelerating the Deployment of Renewable Energy Mini-Grids for Off-Grid Electrification – A Study on the Philippines” to provide a clearer picture of what the current state of the crisis is and lay out possible solutions. It showed that as of 2016, a record year for renewables worldwide, the Philippines has approximately 2.3 million households without electricity. With only 89.6 percent of household electrification, that leaves about 2.36 million homes either with limited power of four to six hours each day or totally without electricity.

By the end of 2017, the Philippine government will have provided 90% of Philippine households with electricity. It is worth mentioning that in 2014, the National Capital Region together with two other regions had received 90 percent electrification. However, some areas are still unable to access power that’s within or above the national average. IRENA’s study has become a source of valuable information and analysis to the Philippines’ power systems and identified ways on how to surmount the challenges involving power systems decentralization, with renewable energy funding supporting those mini-grids which are either powered in parts or in full by renewable energy resources. This, however, does not discount the fact that providing electricity in every household still is an on-going struggle. Considering that the Philippines is an archipelago, providing enough, dependable, and clean modern energy to the entire country, including the remote and isolated islands is difficult. The onset of renewable energy is a viable and cost-effective option to support the implementation of mini-grids, as shown by Ireland's green electricity targets rising rapidly.

 

 

Related News

View more

Tesla’s Powerwall as the beating heart of your home

GMP Tesla Powerwall Program replaces utility meters with smart battery storage, enabling virtual power plant services, demand response, and resilient homes, integrating solar readiness, EV charging support, and smart grid controls across Vermont households.

 

Key Points

Green Mountain Power uses Tesla Powerwalls as smart meters, creating a VPP for demand response and home backup.

✅ $30 monthly for 10 years or $3,000 upfront for two units

✅ Utility controls batteries for peak shaving and demand response

✅ Enables backup power, solar readiness, and EV charging support

 

There are more than 100 million single-family homes in the United States of America. If each of these homes were to have two 13.5 kWh Tesla Powerwalls, that would total 2.7 Terawatt-hours worth of electricity stored. Prior research has suggested that this volume of energy storage could get us halfway to the 5.4 TWh of storage needed to let the nation get 80% of its electricity from solar and wind, as states like California increasingly turn to grid batteries to support the transition.

Vermont utility Green Mountain Power (GMP) seeks to remove standard electric utility metering hardware and replace it with the equipment inside of a Tesla Powerwall, as part of a broader digital grid evolution underway. Mary Powell, President and CEO of Green Mountain Power, says, “We have a vision of a battery system in every single home” and they’ve got a patent pending software solution to make it happen.

The Resilient Home program will install two standard Tesla Powerwalls each in 250 homes in GMP’s service area. The homeowner will pay either $30 a month for ten years ($3,600), or $3,000 up front. At the end of the ten year period, payments end, but the unit can stay in the home for an additional five years – or as long as it has a usable life.

A single Powerwall costs approximately $6,800, making this a major discount.

GMP notes that the home must have reliable internet access to allow GMP and Tesla to communicate with the Powerwall. GMP will control the functions of the Powerwall, effectively operating a virtual power plant across participating homes, expanding the scope of programs like those that saved the state’s ratepayers more than $500,000 during peak demand events last year. The utility specifically notes that customers agree to share stored energy with GMP on several peak demand days each year.

The hardware can be designed to interact with current backup generators during power outages, or emerging fuel cell solutions that maintain battery charge longer during extended outages, however, the units will not charge from the generator. As noted the utility will be making use of the hardware during normal operating times, however, during a power outage the private home owner will be able to use the electricity to back up both their house and top off their car.

The utility told pv magazine USA that the Powerwalls are standard from the factory, with GMP’s patent pending software solution being the special sauce (has a hint of recent UL certifications). GMP said the program will also get home owners “adoption ready” for solar power, including microgrid energy storage markets, and other smart devices.

Sonnen’s ecoLinx is already directly interacting with a home’s electrical panel (literally throwing wifi enabled circuit breakers). Now with Tesla Powerwalls being used to replace utility meters, we see one further layer of integration that will lead to design changes that will drive residential solar toward $1/W. Electric utilities are also experimenting with controlling module level electronics and smart solar inverters in 100% residential penetration situations. And of course, considering that California is requiring solar – and probably storage in the future – in all new homes, we should expect to see further experimentation in this model. Off grid solar inverter manufacturers already include electric panels with their offerings.

If we add in the electric car, and have vehicle-to-grid abilities, we start to see a very strong amount of electricity generation and energy storage, helping to keep the lights on during grid stress, potentially happening in more than 100 million residential power plants. Resilient homes indeed.

 

Related News

View more

New York Achieves Solar Energy Goals Ahead of Schedule

New York Solar Milestone accelerates renewable energy adoption, meeting targets early with 8,000 MW capacity powering 1.1 million homes, boosting green jobs, community solar, battery storage, and grid reliability under the CLCPA clean energy framework.

 

Key Points

It is New York achieving its solar goal early, powering 1.1M homes and advancing CLCPA renewable targets.

✅ 8,000 MW installed, enough to power about 1.1M homes

✅ CLCPA targets: 70 percent renewables by 2030

✅ Community solar, storage, and green jobs scaling statewide

 

In a remarkable display of commitment to renewable energy, New York has achieved its solar energy targets a year ahead of schedule, marking a significant milestone in the state's clean energy journey, and aligning with a national trend where renewables reached a record 28% in April nationwide. With the addition of solar power capacity capable of powering over a million homes, New York is not just setting the pace for solar adoption but is also establishing itself as a leader in the fight against climate change.

A Commitment to Renewable Energy

New York’s ambitious clean energy agenda is part of a broader effort to reduce greenhouse gas emissions and transition to sustainable energy sources. The state's goal, established under the Climate Leadership and Community Protection Act (CLCPA), aims for 70% of its electricity to come from renewable sources by 2030. With the recent advancements in solar energy, including contracts for 23 renewable projects totaling 2.3 GW, New York is well on its way to achieving that goal, demonstrating that aggressive policy frameworks can lead to tangible results.

The Numbers Speak for Themselves

As of now, New York has successfully installed more than 8,000 megawatts (MW) of solar energy capacity, supported by large-scale energy projects underway across New York that are expanding the grid. This achievement translates to enough electricity to power approximately 1.1 million homes, showcasing the state's investment in harnessing the sun’s power. The rapid expansion of solar installations reflects both increasing consumer interest and supportive policies that facilitate growth in the renewable energy sector.

Economic Benefits and Job Creation

The surge in solar energy capacity has not only environmental implications but also significant economic benefits. The solar industry in New York has become a substantial job creator, employing tens of thousands of individuals across various sectors. From manufacturing solar panels to installation and maintenance, the job opportunities associated with this growth are diverse and vital for local economies.

Moreover, as solar installations increase, the state benefits from reduced electricity costs over time. By investing in renewable energy, New York is paving the way for a more resilient and sustainable energy future, while simultaneously providing economic opportunities for its residents.

Community Engagement and Accessibility

New York's solar success is also tied to its efforts to engage communities and increase access to renewable energy. Initiatives such as community solar programs allow residents who may not have the means or space to install solar panels on their homes to benefit from solar energy. These programs provide an inclusive approach, ensuring that low-income households and underserved communities have access to clean energy solutions.

The state has also implemented various incentives to encourage solar adoption, including tax credits, rebates, and financing options. These efforts not only promote environmental sustainability but also aim to make solar energy more accessible to all New Yorkers, furthering the commitment to equity in the energy transition.

Innovations and Future Prospects

New York's solar achievements are complemented by ongoing innovations in technology and energy storage solutions. The integration of battery storage systems is becoming increasingly important, reflecting growth in solar and storage in the coming years, and allowing for the capture and storage of solar energy for use during non-sunny periods. This technology enhances grid reliability and supports the state’s goal of transitioning to a fully sustainable energy system.

Looking ahead, New York aims to continue this momentum. The state is exploring additional strategies to increase renewable energy capacity, including plans to investigate sites for offshore wind across its coastline, and other clean energy technologies. By diversifying its renewable energy portfolio, New York is positioning itself to meet and even exceed future energy demands while reducing its carbon footprint.

A Model for Other States

New York’s success story serves as a model for other states aiming to enhance their renewable energy capabilities, with its approval of the biggest offshore wind farm underscoring that leadership. The combination of strong policy frameworks, community engagement, and technological innovation can inspire similar initiatives nationwide. As more states look to address climate change, New York’s proactive approach can provide valuable insights into effective strategies for solar energy deployment.

New York’s achievement of its solar energy goals a year ahead of schedule is a testament to the state's unwavering commitment to sustainability and renewable energy. With the capacity to power over a million homes, this milestone not only signifies progress in clean energy adoption but also highlights the potential for economic growth and community engagement. As New York continues on its path toward a greener future, and stays on the road to 100% renewables by mid-century, it sets a powerful example for others to follow, proving that ambitious renewable energy goals can indeed become a reality.

 

Related News

View more

Dutch produce more green electricity but target still a long way off

Netherlands renewable energy progress highlights rising wind energy and solar power output, delivering 17 billion kWh of green electricity from sustainable sources, yet trailing EU targets, with wind providing 60% and solar 34%.

 

Key Points

It is the country's growth in green electricity, led by wind and solar, yet short of EU targets at 13.8% of generation.

✅ 17 billion kWh green output; 13.8% of total generation

✅ Wind energy up 16% to 9.6 billion kWh; 60% of green power

✅ Solar power up about 13%; 34% of renewable production

 

The Netherlands is generating more electricity from sustainable sources as US renewable record 28% in April underscores broader momentum but is still far from reaching its targets, the national statistics office CBS said on Friday.

In total, the Netherlands produced 17 billion kilowatts of green energy last year, a rise of 10% on 2016. Sustainable sources now account for 13.8 per cent of energy generation, even as solar reshapes prices in Northern Europe across the region.

The biggest growth was in wind energy – up 16 per cent to 9.6 billion kWh – or the equivalent of energy for three million households. Wind energy now accounts for 60 per cent of green Dutch power. The amount of solar power, which accounts for 34% of green energy production, rose almost 13 per cent, and Dutch solar outpaces Canada according to recent reports.

In January, European statistics agency Eurostat said the Netherlands is near the bottom of a new table on renewable energy use in Europe. The EU has a target of a fifth of all energy use from green sources by 2020 and – while some countries have reached their own targets, including Germany's 50% clean power milestones – the Dutch, French and Irish need to increase their rates by at least 6%, Eurostat said, and Ireland has set green electricity goals for the next four years to close the gap.

 

Related News

View more

Russia-Ukraine Agreement on Power Plant Attacks Possible

Russia-Ukraine Energy Ceasefire explores halting strikes on power plants, safeguarding energy infrastructure and grids, easing humanitarian crises, stabilizing European markets, and advancing diplomatic talks on security, resilience, and critical infrastructure protection.

 

Key Points

A proposed pact to halt strikes on power plants, protect energy infrastructure, and stabilize grids and security.

✅ Shields power plants and grid infrastructure from attacks

✅ Eases humanitarian strain and improves winter resilience

✅ Supports European energy security and market stability

 

In a significant diplomatic development amid ongoing conflict, Russia and Ukraine are reportedly exploring the possibility of reaching an agreement to halt attacks on each other’s power plants. This potential cessation of hostilities could have far-reaching implications for the energy security and stability of both nations, as well as for the broader European energy landscape.

The Context of Energy Warfare

The conflict between Russia and Ukraine has escalated into what many analysts term "energy warfare," where both sides have targeted each other’s energy infrastructure. Such actions not only aim to undermine the adversary’s military capabilities but also have profound effects on civilian populations, leading to widespread power outages and humanitarian crises. Energy infrastructure has become a focal point in the conflict, with power plants and grids frequently damaged or destroyed.

The ongoing hostilities have raised concerns about energy security in Europe, with some warning of an energy nightmare if disruptions escalate, especially as many countries in the region rely on energy supplies from Russia. The attacks on power facilities exacerbate vulnerabilities in the energy supply chain, prompting calls for a ceasefire that encompasses energy infrastructure.

The Humanitarian Implications

The humanitarian impact of the conflict has been staggering, with millions of civilians affected by power outages, heating shortages, and disrupted access to essential services. The winter months, in particular, pose a grave challenge, as Ukraine prepares for winter amid ongoing energy constraints for vulnerable populations. A potential agreement to cease attacks on power plants could provide much-needed relief and stability for civilians caught in the crossfire.

International organizations, including the United Nations and various humanitarian NGOs, have been vocal in urging both parties to prioritize civilian safety and to protect critical infrastructure. Any agreement reached could facilitate aid efforts and enhance the overall humanitarian situation in affected areas.

Diplomatic Efforts and Negotiations

Reports indicate that diplomatic channels are being utilized to explore this potential agreement. While the specifics of the negotiations remain unclear, the idea of protecting energy infrastructure has been gaining traction among international diplomats. Key players, including European nations and the United States, with debates over U.S. energy security shaping positions, may play a pivotal role in mediating discussions.

Negotiating a ceasefire concerning energy infrastructure could serve as a preliminary step toward broader peace talks. By demonstrating goodwill through a tangible agreement, both parties might foster an environment conducive to further negotiations on other contentious issues in the conflict.

The Broader European Energy Landscape

The ramifications of an agreement between Russia and Ukraine extend beyond their borders. The stability of energy supplies in Europe is inextricably linked to the dynamics of the conflict, and the posture of certain EU states, such as Hungary's energy alliance with Russia, also shapes outcomes across the region. Many European nations have been grappling with rising energy prices and supply uncertainties, particularly in light of reduced gas supplies from Russia.

A halt to attacks on power plants could alleviate some of the strain on energy markets, which have experienced price hikes and instability in recent months, helping to stabilize prices and improve energy security for neighboring countries. Furthermore, it could pave the way for increased cooperation on energy issues, such as joint projects for renewable energy development or grid interconnections.

Future Considerations

While the prospect of an agreement is encouraging, skepticism remains about the willingness of both parties to adhere to such terms. The historical context of mistrust and previous violations of ceasefires, as both sides have accused each other of violations in recent months, raises questions about the durability of any potential pact. Continued dialogue and monitoring by international entities will be essential to ensure compliance and to build confidence between the parties.

Moreover, as discussions progress, it will be crucial to consider the long-term implications for energy policy in both Russia and Ukraine. The conflict has already prompted Ukraine to seek alternative energy sources and reduce its dependence on Russian gas, turning to electricity imports to keep the lights on, while Russia is exploring new markets for its energy exports.

The potential agreement between Russia and Ukraine to stop targeting each other’s power plants represents a glimmer of hope in a protracted conflict characterized by violence and humanitarian suffering. As both nations explore this diplomatic avenue, the implications for energy security, civilian safety, and the broader European energy landscape could be profound. Continued international support and monitoring will be vital to ensure that any agreement reached translates into real-world benefits for affected populations and contributes to a more stable energy future for the region.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified