Russians hacked into US electric utilities: 6 essential reads


russian hackers

NFPA 70e Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today

U.S. power grid cyberattacks expose critical infrastructure to Russian hackers, DHS warns, targeting SCADA, smart grid sensors, and utilities; NERC CIP defenses, microgrids, and resilience planning aim to mitigate outages and supply chain disruptions.

 

Key Points

U.S. power grid cyberattacks target utility control systems, risking outages, disruption, requiring stronger defenses.

✅ Russian access to utilities and SCADA raises outage risk

✅ NERC CIP, DHS, and utilities expand cyber defenses

✅ Microgrids and renewables enhance resilience, islanding capability

 

The U.S. Department of Homeland Security has revealed that Russian government hackers accessed control rooms at hundreds of U.S. electrical utility companies, gaining far more access to the operations of many more companies than previously disclosed by federal officials.

Securing the electrical grid, upon which is built almost the entirety of modern society, is a monumental challenge. Several experts have explained aspects of the task, potential solutions and the risks of failure for The Conversation:

 

1. What’s at stake?

The scale of disruption would depend, in part, on how much damage the attackers wanted to do. But a major cyberattack on the electricity grid could send surges through the grid, much as solar storms have done.

Those events, explains Rochester Institute of Technology space weather scholar Roger Dube, cause power surges, damaging transmission equipment. One solar storm in March 1989, he writes, left “6 million people without power for nine hours … [and] destroyed a large transformer at a New Jersey nuclear plant. Even though a spare transformer was nearby, it still took six months to remove and replace the melted unit.”

More serious attacks, like larger solar storms, could knock out manufacturing plants that build replacement electrical equipment, gas pumps to fuel trucks to deliver the material and even “the machinery that extracts oil from the ground and refines it into usable fuel. … Even systems that seem non-technological, like public water supplies, would shut down: Their pumps and purification systems need electricity.”

In the most severe cases, with fuel-starved transportation stalled and other basic infrastructure not working, “[p]eople in developed countries would find themselves with no running water, no sewage systems, no refrigerated food, and no way to get any food or other necessities transported from far away. People in places with more basic economies would also be without needed supplies from afar.”

 

2. It wouldn’t be the first time

Russia has penetrated other countries’ electricity grids in the past, and used its access to do real damage. In the middle of winter 2015, for instance, a Russian cyberattack shut off the power to Ukraine’s capital in the middle of winter 2015.

Power grid scholar Michael McElfresh at Santa Clara University discusses what happened to cause hundreds of thousands of Ukrainians to lose power for several hours, and notes that U.S. utilities use software similar to their Ukrainian counterparts – and therefore share the same vulnerabilities.

 

3. Security work is ongoing

These threats aren’t new, write grid security experts Manimaran Govindarasu from Iowa State and Adam Hahn from Washington State University. There are a lot of people planning defenses, including the U.S. government, as substation attacks are growing across the country. And the “North American Electric Reliability Corporation, which oversees the grid in the U.S. and Canada, has rules … for how electric companies must protect the power grid both physically and electronically.” The group holds training exercises in which utility companies practice responding to attacks.

 

4. There are more vulnerabilities now

Grid researcher McElfresh also explains that the grid is increasingly complex, with with thousands of companies responsible for different aspects of generating, transmission, and delivery to customers. In addition, new technologies have led companies to incorporate more sensors and other “smart grid” technologies. He describes how that, as a recent power grid report card underscores, “has created many more access points for penetrating into the grid computer systems.”

 

5. It’s time to ramp up efforts

The depth of access and potential control over electrical systems means there has never been a better time than right now to step up grid security amid a renewed focus on protecting the grid among policymakers and utilities, writes public-utility researcher Theodore Kury at the University of Florida. He notes that many of those efforts may also help protect the grid from storm damage and other disasters.

 

6. A possible solution could be smaller grids

One protective effort was identified by electrical engineer Joshua Pearce at Michigan Technological University, who has studied ways to protect electricity supplies to U.S. military bases both within the country and abroad. He found that the Pentagon has already begun testing systems, as the military ramps up preparation for major grid hacks, that combine solar-panel arrays with large-capacity batteries. “The equipment is connected together – and to buildings it serves – in what is called a ‘microgrid,’ which is normally connected to the regular commercial power grid but can be disconnected and become self-sustaining when disaster strikes.”

He found that microgrid systems could make military bases more resilient in the face of cyberattacks, criminals or terrorists and natural disasters – and even help the military “generate all of its electricity from distributed renewable sources by 2025 … which would provide energy reliability and decrease costs, [and] largely eliminate a major group of very real threats to national security.”

Related News

Four Major Types of Substation Integration Service Providers Account for More than $1 Billion in Annual Revenues

Substation Automation Services help electric utilities modernize through integration, EPC engineering, protective relaying, communications and security, with CAPEX and OPEX insights and a growing global market for third-party providers worldwide rapidly.

 

Key Points

Engineering, integration, and EPC support modernizing utility substations with protection, control, and secure communications

✅ Third-party engineering, EPC, and OEM services for utilities

✅ Integration of multi-vendor devices and platforms

✅ Focus on relays, communications, security, CAPEX-OPEX

 

The Newton-Evans Research Company has released additional findings from its newly published four volume research series entitled: The World Market for Substation Automation and Integration Programs in Electric Utilities: 2017-2020.

This report series has observed four major types of professional third-party service providers that assist electric utilities with substation modernization. These firms range from (1) smaller local or regional engineering consultancies with substation engineering resources to (2) major global participants in EPC work, to (3) the engineering services units of manufacturers of substation devices and platforms, to (4) substation integration specialist firms that source and integrate devices from multiple manufacturers for utility and industrial clients, and often provide substation automation training to support implementation.

2016 Global Share Estimates for Professional Services Providers of Electric Power Substation Integration and Automation Activities

The North American market report (Volume One) includes survey participation from 65 large and midsize US and Canadian electric utilities while the international market report (Volume Two) includes survey participation from 32 unique utilities in 20 countries around the world. In addition to the baseline survey questions, the report includes 2017 substation survey findings on four additional specific topics: communications issues; protective relaying trends; security topics and the CAPEX/OPEX outlook for substation modernization.

Volume Three is the detailed market synopsis and global outlook for substation automation and integration:

Section One of the report provides top-level views of substation modernization, automation & integration and the emerging digital grid landscape, and a narrative market synopsis.

Section Two provides mid-year 2017 estimates of population, electric power generation capacity, transmission substations, including the 2 GW UK substation commissioning as a benchmark, and primary MV distribution substations for more than 120 countries in eight world regions. Information on substation related expenditures and spending for protection and control for each major world region and several major countries is also provided.

Section Three provides information on NGO funding resources for substation modernization among developing nations.

Section Four of this report volume includes North American market share estimates for 2016 shipments of many substation automation-related devices and equipment, such as trends in the digital relay market for utilities.

The Supplier Profiles report (Volume Four) provides descriptive information on the substation modernization offerings of more than 90 product and services companies, covering leading players in the transformer market as well.

 

Related News

View more

Energy Efficiency and Demand Response Can Nearly Level Southeast Electricity Demand for More than a Decade

Southeast Electricity Demand Forecast examines how energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response shape grid needs, stabilize load through 2030, shift peaks, and inform utility planning across the region.

 

Key Points

An outlook of load shaped by efficiency, solar, EVs, with demand response keeping usage steady through 2030.

✅ Stabilizes regional demand through 2030 under accelerated adoption

✅ Energy efficiency and demand response are primary levers

✅ EVs and heat pumps drive growth post 2030; shift winter peaks

 

Electricity markets in the Southeast are facing many changes on the customer side of the meter. In a new report released today, we look at how energy efficiency, photovoltaics (solar electricity), electric vehicles, heat pumps, and demand response (shifting loads from periods of high demand) might affect electricity needs in the Southeast.

We find that if all of these resources are pursued on an accelerated basis, electricity demand in the region can be stabilized until about 2030.

After that, demand will likely grow in the following decade because of increased market penetration of electric vehicles and heat pumps, but energy planners will have time to deal with this growth if these projections are borne out. We also find that energy efficiency and demand response can be vital for managing electricity supply and demand in the region and that these resources can help contain energy demand growth, reducing the impact of expensive new generation on consumer wallets.

 

National trends

This is the second ACEEE report looking at regional electricity demand. In 2016, we published a study on electricity consumption in New England, finding an even more pronounced effect. For New England, with even more aggressive pursuit of energy efficiency and these other resources, consumption was projected to decline through about 2030, before rebounding in the following decade.

These regional trends fit into a broader national pattern. In the United States, electricity consumption has been characterized by flat electricity demand for the past decade. Increased energy efficiency efforts have contributed to this lack of consumption growth, even as the US economy has grown since the Great Recession. Recently, the US Energy Information Administration (EIA – a branch of the US Department of Energy) released data on US electricity consumption in 2016, finding that 2016 consumption was 0.3% below 2015 consumption, and other analysts reported a 1% slide in 2023 on milder weather.

 

Five scenarios for the Southeast

ACEEE’s new study focuses on the Southeast because it is very different from New England, with warmer weather, more economic growth, and less-aggressive energy efficiency and distributed energy policies than the Northeast. For the Southeast, we examined five scenarios: a business-as-usual scenario; two alternative scenarios with progressively higher levels of energy efficiency, photovoltaics informed by a solar strategy for the South that is emerging regionally, electric vehicles, heat pumps, and demand response; and two scenarios combining high numbers of electric vehicles and heat pumps with more modest levels of the other resources. This figure presents electricity demand for each of these scenarios:

Over the 2016-2040 period, we project that average annual growth will range from 0.1% to 1.0%, depending on the scenario, much slower than historic growth in the region. Energy efficiency is generally the biggest contributor to changes in projected 2040 electricity consumption relative to the business-as-usual scenario, as shown in the figure below, which presents our accelerated scenario that is based on levels of energy efficiency and other resources now targeted by leading states and utilities in the Southeast.

To date, Entergy Arkansas has achieved the annual efficiency savings as a percent of sales shown in the accelerated scenario and Progress Energy (a division of Duke Energy) has nearly achieved those savings in both North and South Carolina. Sixteen states outside the Southeast have also achieved these savings statewide.

The efficiency savings shown in the aggressive scenario have been proposed by the Arkansas PSC. This level of savings has already been achieved by Arizona as well as six other states. Likewise, the demand response savings we model have been achieved by more than 10 utilities, including four in the Southeast. The levels of photovoltaic, electric vehicle, and heat pump penetration are more speculative and are subject to significant uncertainty.

We also examined trends in summer and winter peak demand. Most utilities in the Southeast have historically had peak demand in the summer, often seeing heatwave-driven surges that stress operations across the Eastern U.S., but our analysis shows that winter peaks will be more likely in the region as photovoltaics and demand response reduce summer peaks and heat pumps increase winter peaks.

 

Why it’s vital to plan broadly

Our analysis illustrates the importance of incorporating energy efficiency, demand response, and photovoltaics into utility planning forecasts as utility trends to watch continue to evolve. Failing to include these resources leads to much higher forecasts, resulting in excess utility system investments, unnecessarily increasing customer electricity rates. Our analysis also illustrates the importance of including electric vehicles and heat pumps in long-term forecasts. While these technologies will have moderate impacts over the next 10 years, they could become increasingly important in the long run.

We are entering a dynamic period of substantial uncertainty for long-term electricity sales and system peaks, highlighted by COVID-19 demand shifts that upended typical patterns. We need to carefully observe and analyze developments in energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response over the next few years. As these technologies advance, we can create policies to reduce energy bills, system costs, and harmful emissions, drawing on grid reliability strategies tested in Texas, while growing the Southeast’s economy. Resource planners should be sure to incorporate these emerging trends and policies into their long-term forecasts and planning.

 

Related News

View more

Russia to Ban Bitcoin Mining Amid Electricity Deficit

Russia Bitcoin Mining Ban highlights electricity deficits, grid stability concerns, and sustainability challenges, prompting stricter cryptocurrency regulation as mining operations in Siberia face shutdowns, relocations, and renewed focus on energy efficiency and resource allocation.

 

Key Points

Policy halting Bitcoin mining in key regions to ease electricity deficits, stabilize the grid, and prioritize energy.

✅ Targets high-load regions like Siberia facing electricity deficits

✅ Protects residential and industrial energy security, limits outages

✅ Prompts miner relocations, regulation, and potential renewables

 

In a significant shift in its stance on cryptocurrency, Russia has announced plans to ban Bitcoin mining in several key regions, primarily due to rising electricity deficits. This move highlights the ongoing tensions between energy management and the growing demand for cryptocurrency mining, which has sparked a robust debate about sustainability and resource allocation in the country.

Background on Bitcoin Mining in Russia

Russia has long been a major player in the global cryptocurrency landscape, particularly in Bitcoin mining. The country’s vast and diverse geography offers ample opportunities for mining, with several regions boasting low electricity costs and cooler climates that are conducive to operating the high-powered computers used for mining, similar to Iceland's mining boom in cold regions.

However, the boom in mining activities has put a strain on local electricity grids, as seen with BC Hydro suspensions in Canada, particularly as demand for energy continues to rise. This situation has become increasingly untenable, leading government officials to reconsider the viability of allowing large-scale mining operations.

Reasons for the Ban

The decision to ban Bitcoin mining in certain regions stems from a growing electricity deficit that has been exacerbated by both rising temperatures and increased energy consumption. Reports indicate that some regions are struggling to meet domestic energy needs, and jurisdictions like Manitoba's pause on crypto connections reflect similar grid concerns, particularly during peak consumption periods. Officials have expressed concern that continuing to support cryptocurrency mining could lead to blackouts and further strain on the electrical infrastructure.

Additionally, this ban is seen as a measure to redirect energy resources toward more critical sectors, including residential heating and industrial needs. By curbing Bitcoin mining, the government aims to prioritize the energy security of its citizens and maintain stability within its energy markets and the wider global electricity market dynamics.

Regional Impact

The regions targeted by the ban include areas that have seen a significant influx of mining operations, often attracted by the low costs of electricity. For instance, Siberia, known for its abundant natural resources and inexpensive power, has become a major center for miners. The ban is likely to have profound implications for local economies that have come to rely on the influx of investments from cryptocurrency companies.

Many miners are expected to be affected financially as they may have to halt operations or relocate to regions with more favorable regulations. This could lead to job losses and a decline in local business activities that have sprung up around the mining industry, such as hardware suppliers and tech services.

Broader Implications for Cryptocurrency in Russia

This ban reflects a broader trend within Russia’s approach to cryptocurrencies. While the government has been cautious about outright banning digital currencies, it has simultaneously sought to regulate the industry more stringently. Recent legislation has aimed to establish a legal framework for cryptocurrencies, focusing on taxation and oversight while navigating the balance between innovation and regulation.

As other countries around the world grapple with the implications of cryptocurrency mining, Russia’s decision adds to the narrative of the challenges associated with energy consumption in this sector. The international community is increasingly aware of the environmental impact of Bitcoin mining, which has come under fire for its significant energy use and carbon footprint.

Future of Mining in Russia

Looking ahead, the future of Bitcoin mining in Russia remains uncertain. While some regions may implement strict bans, others could potentially embrace a more regulated approach to mining, provided it aligns with energy availability and environmental considerations. The country’s vast landscape offers opportunities for innovative solutions, such as utilizing renewable energy sources, even as India's solar growth slows amid rising coal generation, to power mining operations.

As global attitudes toward cryptocurrency evolve, Russia will likely continue to adapt its policies in response to both domestic energy needs and international pressures, including Europe's shift away from Russian energy that influence policy choices. The balance between fostering a competitive cryptocurrency market and ensuring energy sustainability will be a key challenge for Russian policymakers moving forward.

Russia’s decision to ban Bitcoin mining in key regions marks a pivotal moment in the intersection of cryptocurrency and energy management. As the nation navigates its energy deficits, the implications for the mining industry and the broader cryptocurrency landscape will be significant. This move not only underscores the need for responsible energy consumption in the digital age but also reflects the complexities of integrating emerging technologies within existing frameworks of governance and infrastructure. As the situation unfolds, all eyes will be on how Russia balances innovation with sustainability in its approach to cryptocurrency.

 

Related News

View more

The Implications of Decarbonizing Canada's Electricity Grid

Canada Electricity Grid Decarbonization advances net-zero goals by expanding renewable energy (wind, solar, hydro), boosting grid reliability with battery storage, and aligning policy, efficiency, and investment to cut emissions and strengthen energy security.

 

Key Points

Canada's shift to low-carbon power using renewables and storage to cut emissions and improve grid reliability.

✅ Invest in wind, solar, hydro, and transmission upgrades

✅ Deploy battery storage to balance intermittent generation

✅ Support just transition, jobs, and energy efficiency

 

As Canada moves towards a more sustainable future, decarbonizing its electricity grid has emerged as a pivotal goal. The transition aims to reduce greenhouse gas emissions, promote renewable energy sources, and ultimately support global climate targets, with cleaning up Canada's electricity widely viewed as critical to meeting those pledges. However, the implications of this transition are multifaceted, impacting the economy, energy reliability, and the lives of Canadians.

Understanding Decarbonization

Decarbonization refers to the process of reducing carbon emissions produced from various sources, primarily fossil fuels. In Canada, the electricity grid is heavily reliant on natural gas, coal, and oil, which contribute significantly to carbon emissions. The Canadian government has committed to achieving net-zero by 2050 through federal and provincial collaboration, with the electricity sector playing a crucial role in this initiative. The strategy includes increasing the use of renewable energy sources such as wind, solar, and hydroelectric power.

Economic Considerations

Transitioning to a decarbonized electricity grid presents both challenges and opportunities for Canada’s economy. On one hand, the initial costs of investing in renewable energy infrastructure can be substantial. This includes not only the construction of renewable energy plants but also the necessary upgrades to the grid to accommodate new technologies. According to the Fraser Institute analysis, these investments could lead to increased electricity prices, impacting consumers and businesses alike.

However, the shift to a decarbonized grid can also stimulate economic growth. The renewable energy sector is a rapidly growing industry that, as Canada’s race to net-zero accelerates, promises job creation in manufacturing, installation, and maintenance of renewable technologies. Moreover, as technological advancements reduce the cost of renewable energy, the long-term savings on fuel costs can benefit both consumers and businesses. The challenge lies in balancing these economic factors to ensure a smooth transition.

Reliability and Energy Security

A significant concern regarding the decarbonization of the electricity grid is maintaining reliability and energy security, especially as an IEA report indicates Canada will need substantially more electricity to achieve net-zero goals, requiring careful system planning.

To address this challenge, the implementation of energy storage solutions and grid enhancements will be essential. Advances in battery technology and energy storage systems can help manage supply and demand effectively, ensuring that energy remains available even during periods of low renewable output. Additionally, integrating a diverse mix of energy sources, including hydroelectric power, can enhance the reliability of the grid.

Social Impacts

The decarbonization process also carries significant social implications. Communities that currently depend on fossil fuel industries may face economic challenges as the transition progresses, and the Canadian Gas Association has warned of potential economy-wide costs for switching to electricity, underscoring the need for a just transition.

Furthermore, there is a need for public engagement and education on the benefits and challenges of decarbonization. Canadians must understand how changes in energy policy will affect their daily lives, from electricity prices to job opportunities. Fostering a sense of community involvement can help build support for renewable energy initiatives and ensure that diverse voices are heard in the planning process.

Policy Recommendations

For Canada to successfully decarbonize its electricity grid, and building on recent electricity progress across provinces nationwide, robust and forward-thinking policies must be implemented. This includes investment in research and development to advance renewable technologies and improve energy storage solutions. Additionally, policies should encourage public-private partnerships to share the financial burden of infrastructure investments.

Governments at all levels should also promote energy efficiency measures to reduce overall demand, making the transition more manageable. Incentives for consumers to adopt renewable energy solutions, such as solar panels, can further accelerate the shift towards a decarbonized grid.

Decarbonizing Canada's electricity grid presents a complex yet necessary challenge. While there are economic, reliability, and social considerations to navigate, the potential benefits of a cleaner, more sustainable energy future are substantial. By implementing thoughtful policies and fostering community engagement, Canada can lead the way in creating an electricity grid that not only meets the needs of its citizens but also contributes to global efforts in combating climate change.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Kaspersky Lab Discovers Russian Hacker Infrastructure

Crouching Yeti APT targets energy infrastructure with watering-hole attacks, compromising servers to steal credentials and stage intrusions; Kaspersky Lab links the Energetic Bear group to ICS threats across Russia, US, Europe, and Turkey.

 

Key Points

Crouching Yeti APT, aka Energetic Bear, is a threat group that targets energy firms using watering-hole attacks.

✅ Targets energy infrastructure via watering-hole compromises

✅ Uses open-source tools and backdoored sshd for persistence

✅ Scans global servers to stage intrusions and steal credentials

 

A hacker collective known for attacking industrial companies around the world have had some of their infrastructure identified by Russian security specialists.

Kaspersky Lab said that it has discovered a number of servers compromised by the group, belonging to different organisations based in Russia, the US, and Turkey, as well as European countries.

The Russian-speaking hackers, known as Crouching Yeti or Energetic Bear, mostly focus on energy facilities, as seen in reports of infiltration of the U.S. power grid targeting critical infrastructure, for the main purpose of stealing valuable data from victim systems.

 

Hacked servers

Crouching Yeti is described as an advanced persistent threat (APT) group that Kaspersky Lab has been tracking since 2010.

#google#

Kaspersky Lab said that the servers it has compromised are not just limited to industrial companies. The servers were hit in 2016 and 2017 with different intentions. Some were compromised to gain access to other resources or to be used as intermediaries to conduct attacks on other resources.

Others, including those hosting Russian websites, were used as watering holes.

It is a common tactic for Crouching Yeti to utilise watering hole attacks where the attackers inject websites with a link redirecting visitors to a malicious server.

“In the process of analysing infected servers, researchers identified numerous websites and servers used by organisations in Russia, US, Europe, Asia and Latin America that the attackers had scanned with various tools, possibly to find a server that could be used to establish a foothold for hosting the attackers’ tools and to subsequently develop an attack,” said the security specialists in a blog posting.

“The range of websites and servers that captured the attention of the intruders is extensive,” the firm said. “Kaspersky Lab researchers found that the attackers had scanned numerous websites of different types, including online stores and services, public organisations, NGOs, manufacturing, etc.

Kaspersky Lab said that the hackers used publicly available malicious tools, designed for analysing servers, and for seeking out and collecting information. The researchers also found a modified sshd file with a preinstalled backdoor. This was used to replace the original file and could be authorised with a ‘master password’.

“Crouching Yeti is a notorious Russian-speaking group that has been active for many years and is still successfully targeting industrial organisations through watering hole attacks, among other techniques,” explained Vladimir Dashchenko, head of vulnerability research group at Kaspersky Lab ICS CERT.

 

Russian government?

“Our findings show that the group compromised servers not only for establishing watering holes, but also for further scanning, and they actively used open-sourced tools that made it much harder to identify them afterwards,” he said.

“The group’s activities, such as initial data collection, the theft of authentication data, and the scanning of resources, are used to launch further attacks,” said Dashchenko. “The diversity of infected servers and scanned resources suggests the group may operate in the interests of the third parties.”

This may well tie into a similar conclusion from a rival security vendor.

In 2014 CrowdStrike claimed that the ‘Energetic Bear’ group was also tracked in Symantec's Dragonfly research and had been hacking foreign companies on behalf of the Russian state.

The security vendor had said the group had been carrying out attacks on foreign companies since 2012, with reports of breaches at U.S. power plants that underscored the campaign, and there was evidence that these operations were sanctioned by the Russian government.

Last month the United States for the first time publicly accused Russia in a condemnation of Russian grid hacking of attacks against the American power grid.

Symantec meanwhile warned last year of a resurgence in cyber attacks on European and US energy companies, including reports of access to U.S. utility control rooms that could result in widespread power outages.

And last July the UK’s National Cyber Security Centre (NCSC) acknowledged it was investigating a broad wave of attacks on companies in the British energy and manufacturing sectors.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified