Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Warns of Potential Cyber Attack on Electric Grid

FBI Warns of Potential Cyber Attack on Electric Grid

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed to be threatened by similar attacks.

On December 23rd, 2015, workers at a Ukrainian power plant distribution center bore witness to hackers taking control of their computers. The criminals used the machines to shut down heat and power for over 230,000 citizens. Even though the power outage only lasted somewhere between one-to-six hours, several control centers remained in tatters following the attack. In addition to turning off the power, the hackers also took the opportunity to overwrite critical firmware, leaving 16 substations unresponsive to remote commands. As you can imagine, this made it exceptionally difficult to resolve. It should be noted that this was the first confirmed instance of hackers successfully bringing down a power grid, and it was the result of a careful, meticulous operation.

The malware in question, dubbed BlackOut, is known to be Russian in origin. Yet, security analysts don’t want to point fingers at anyone particular. Instead, it’s being assumed that the attack was carried out by several different parties, who were each responsible for different stages of the infiltration. These varying threats worked together to bring about the resulting blackout. If one thing’s for certain, it’s the fact that this attack wasn’t a simple opportunistic hack; rather, it was a carefully plotted strike that could have potentially caused much more damage than it actually did. The only question left is, what was the intent of the attack?

What this shows us is that, for instance, an attack on the United States’ infrastructure, though improbable, is certainly a possibility. Researchers found that the systems used by the United States are actually less secure than the systems put into place by the Ukraine. In order to close up any potential for such a devastating attack, the FBI has begun a campaign that’s designed to raise awareness of the issue. This campaign includes briefings and other exercises geared toward informing electrical power companies of what the risks are.

As you might expect, the reason that these attacks are so effective nowadays is because the power infrastructure of the United States is aging. Digital security wasn’t a necessity back when the infrastructure was first established, but with the changing times, it becomes a possibility that must be prepared for. Therefore, it’s only a matter of time before some, with or without purpose, finds their way into the power grid and causes damage. As things stand now, there has been at least a dozen reported breaches of the power grid, so the possibility is very real.

What this shows us is that old technology components that aren’t designed for future threats can become outdated and risky to use. As always, we recommend that you always keep your organization’s technology as up-to-date as possible, and to take advantage of powerful security solutions designed to keep your systems secure from potential threats.

Evolve IT recommends that your organization implement a Unified Threat Management (UTM) solution. You can think of it as a convenient device that combines several enterprise-level technologies to keep your business safe from all manners of threats. To learn more, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 15 June 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Computer Upgrade Efficiency Workplace Tips Google Smartphone Windows 10 IT Support Mobile Devices Innovation Gmail Network Security Ransomware Hardware WiFi Facebook The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking Operating System Android Two-factor Authentication History Apple Small Business Phishing App Best Practice Alert Mobile Computing Big Data communications Safety Networking Unified Threat Management Data storage Quick Tips Data Windows Smartphones Experience Firewall Content Filtering Mobile Device Management Money Network Cybercrime Website Managed Service Provider Outlook Employer-Employee Relationship Wireless Technology Customer Service Social Printer Browser Virtual Desktop Monitors Wireless Unified Communications Router Securty Office 365 Document Management Encryption SaaS Displays VoIP Law Enforcement Analytics Saving Money Cortana Lithium-ion battery Proactive IT intranet End of Support Network Congestion Save Money Music Social Networking Writing Public Speaking IP Address Cryptocurrency Virtualization Laptop IBM Education Government Google Docs Augmented Reality Cleaning Keyboard Holiday Processors Search Black Market User YouTube Hard Drives LiFi Retail Staffing Office Tips Remote Computing BYOD Shortcut Downtime Help Desk DDoS Passwords Streaming Media Heating/Cooling Visible Light Communication Word Managed IT services Disaster Micrsooft Business Growth Data Management Robot Advertising Business Management Bluetooth Recovery Society Sports Spam Automation Google Wallet Competition Presentation Information Technology Entrepreneur Memory Running Cable Domains Windows 8 Internet of Things Windows XP Deep Learning IT Services Hosted Solution Hacker Artificial Intelligence BDR Documents Tech Support Compliance Vendor Management Drones Application
QR-Code