FBI: Renewable energy systems vulnerable to cyber attacks


The FBI has issued an official alert to the public about the potential for malicious cyber actors to disrupt power generation, steal intellectual property, or hold critical information for ransom within the U.S. renewable energy sector.

The warning comes as federal and local governments increasingly advocate for renewable energies, expanding the industry and creating more opportunities for cyber threats. According to the FBI, a 2019 incident underscored these risks when a private company lost visibility into approximately 500 megawatts of its wind and photovoltaic sites across California, Utah, and Wyoming due to a denial-of-service attack exploiting an unpatched firewall.

Read more…
Source: MSN News


Sign up for our Newsletter


Related:

  • US sanctions Chinese cybersecurity firm for firewall hacks targeting critical infrastructure

    December 10, 2024

    The U.S. sanctioned a Chinese cybersecurity company and one of its employees for exploiting a zero-day vulnerability in Sophos firewalls to target U.S. organizations. On Tuesday, the U.S. Treasury Department said Guan Tianfeng, an employee of Sichuan Silence, used the vulnerability to compromise approximately 81,000 firewalls in April 2020. The hacking campaign, detailed by Sophos in ...

  • Exxon lobbyist investigated over hack-and-leak of environmentalist emails

    November 27, 2024

    The FBI has been investigating a longtime Exxon Mobil consultant over the contractor’s alleged role in a hack-and-leak operation that targeted hundreds of the oil company’s biggest critics, according to three people familiar with the matter. The operation involved mercenary hackers who successfully breached the email accounts of environmental activists and others, the sources told Reuters. ...

  • UK Nuclear body opens cyber security hub

    November 27, 2024

    A nuclear body has launched a cyber security hub to help protect itself from IT threats. The Nuclear Decommissioning Authority (NDA) opened the centre at Herdus House in Moor Row, near the Sellafield nuclear plant in Cumbria. It said the Group Cyberspace Collaboration Centre (GCCC) provided a space for experts to share knowledge on how to ...

  • FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications

    November 19, 2024

    In July 2024, the operational technology (OT)-centric malware FrostyGoop/BUSTLEBERM became publicly known, after attackers used it to disrupt critical infrastructure. The outage occurred after the Cyber Security Situation Center (CSSC), affiliated with the Security Service of Ukraine, disclosed details of an attack on a municipal energy company in Ukraine in early 2024. FrostyGoop is the ninth ...

  • Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East

    November 11, 2024

    Recently, Trend Micro has been tracking Earth Simnavaz (also known as APT34 and OilRig), a cyber espionage group. This group primarily targets organizations in the energy sector, particularly those involved in oil and gas, as well as other infrastructure. It is known for using sophisticated tactics, techniques, and procedures (TTPs) to gain unauthorized access to networks ...

  • Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia

    October 18, 2024

    Last December, Kaspersky researchers discovered a new group targeting Russian businesses and government agencies with ransomware. Further investigation into this group’s activity suggests a connection to other groups currently targeting Russia. Kaspersky researchers have seen overlaps not only in indicators of compromise and tools, but also tactics, techniques, and procedures (TTPs). Moreover, the infrastructure partially overlaps ...