Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Warns of Potential Cyber Attack on Electric Grid

FBI Warns of Potential Cyber Attack on Electric Grid

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed to be threatened by similar attacks.

On December 23rd, 2015, workers at a Ukrainian power plant distribution center bore witness to hackers taking control of their computers. The criminals used the machines to shut down heat and power for over 230,000 citizens. Even though the power outage only lasted somewhere between one-to-six hours, several control centers remained in tatters following the attack. In addition to turning off the power, the hackers also took the opportunity to overwrite critical firmware, leaving 16 substations unresponsive to remote commands. As you can imagine, this made it exceptionally difficult to resolve. It should be noted that this was the first confirmed instance of hackers successfully bringing down a power grid, and it was the result of a careful, meticulous operation.

The malware in question, dubbed BlackOut, is known to be Russian in origin. Yet, security analysts don’t want to point fingers at anyone particular. Instead, it’s being assumed that the attack was carried out by several different parties, who were each responsible for different stages of the infiltration. These varying threats worked together to bring about the resulting blackout. If one thing’s for certain, it’s the fact that this attack wasn’t a simple opportunistic hack; rather, it was a carefully plotted strike that could have potentially caused much more damage than it actually did. The only question left is, what was the intent of the attack?

What this shows us is that, for instance, an attack on the United States’ infrastructure, though improbable, is certainly a possibility. Researchers found that the systems used by the United States are actually less secure than the systems put into place by the Ukraine. In order to close up any potential for such a devastating attack, the FBI has begun a campaign that’s designed to raise awareness of the issue. This campaign includes briefings and other exercises geared toward informing electrical power companies of what the risks are.

As you might expect, the reason that these attacks are so effective nowadays is because the power infrastructure of the United States is aging. Digital security wasn’t a necessity back when the infrastructure was first established, but with the changing times, it becomes a possibility that must be prepared for. Therefore, it’s only a matter of time before some, with or without purpose, finds their way into the power grid and causes damage. As things stand now, there has been at least a dozen reported breaches of the power grid, so the possibility is very real.

What this shows us is that old technology components that aren’t designed for future threats can become outdated and risky to use. As always, we recommend that you always keep your organization’s technology as up-to-date as possible, and to take advantage of powerful security solutions designed to keep your systems secure from potential threats.

Evolve IT recommends that your organization implement a Unified Threat Management (UTM) solution. You can think of it as a convenient device that combines several enterprise-level technologies to keep your business safe from all manners of threats. To learn more, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 25 October 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Business Malware Software Business Computing User Tips Microsoft Upgrade Efficiency Workplace Tips Google Computer Hosted Solutions Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Gmail Network Security Ransomware Microsoft Office Office Backup Apps Business Continuity Operating System Disaster Recovery Communication Hacking The Internet of Things WiFi Social Media Facebook Bandwidth Smartphones Data Windows Mobile Computing Experience communications Big Data Safety Unified Threat Management Quick Tips Mobile Device Management Money Network Firewall Managed Service Provider Outlook Content Filtering Cybercrime Website Wireless Technology Android Apple Employer-Employee Relationship Best Practice Two-factor Authentication History Alert Small Business Phishing Networking Data storage App Laptop Saving Money Analytics Cryptocurrency Lithium-ion battery intranet IBM Google Docs Education Holiday Retail Cleaning Black Market YouTube Social Networking Processors Office Tips Public Speaking LiFi Staffing Virtualization Downtime Managed IT services IP Address BYOD Passwords Streaming Media Help Desk Micrsooft Visible Light Communication Government Disaster Keyboard Bluetooth Augmented Reality Search Business Growth User Data Management Recovery Automation Robot Hard Drives Advertising Society Shortcut Sports Memory Remote Computing DDoS Google Wallet Spam Running Cable Deep Learning Heating/Cooling Information Technology Word Windows 8 Internet of Things BDR Hosted Solution Windows XP IT Services Documents Vendor Management Artificial Intelligence Business Management Tech Support Compliance Drones Competition Monitors Presentation Social Entrepreneur Printer Browser Domains Virtual Desktop Wireless Securty Displays Hacker Unified Communications Document Management Encryption Law Enforcement Application SaaS VoIP End of Support Customer Service Proactive IT Cortana Network Congestion Router Writing Save Money Office 365 Music
QR-Code