Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Warns of Potential Cyber Attack on Electric Grid

FBI Warns of Potential Cyber Attack on Electric Grid

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed to be threatened by similar attacks.

On December 23rd, 2015, workers at a Ukrainian power plant distribution center bore witness to hackers taking control of their computers. The criminals used the machines to shut down heat and power for over 230,000 citizens. Even though the power outage only lasted somewhere between one-to-six hours, several control centers remained in tatters following the attack. In addition to turning off the power, the hackers also took the opportunity to overwrite critical firmware, leaving 16 substations unresponsive to remote commands. As you can imagine, this made it exceptionally difficult to resolve. It should be noted that this was the first confirmed instance of hackers successfully bringing down a power grid, and it was the result of a careful, meticulous operation.

The malware in question, dubbed BlackOut, is known to be Russian in origin. Yet, security analysts don’t want to point fingers at anyone particular. Instead, it’s being assumed that the attack was carried out by several different parties, who were each responsible for different stages of the infiltration. These varying threats worked together to bring about the resulting blackout. If one thing’s for certain, it’s the fact that this attack wasn’t a simple opportunistic hack; rather, it was a carefully plotted strike that could have potentially caused much more damage than it actually did. The only question left is, what was the intent of the attack?

What this shows us is that, for instance, an attack on the United States’ infrastructure, though improbable, is certainly a possibility. Researchers found that the systems used by the United States are actually less secure than the systems put into place by the Ukraine. In order to close up any potential for such a devastating attack, the FBI has begun a campaign that’s designed to raise awareness of the issue. This campaign includes briefings and other exercises geared toward informing electrical power companies of what the risks are.

As you might expect, the reason that these attacks are so effective nowadays is because the power infrastructure of the United States is aging. Digital security wasn’t a necessity back when the infrastructure was first established, but with the changing times, it becomes a possibility that must be prepared for. Therefore, it’s only a matter of time before some, with or without purpose, finds their way into the power grid and causes damage. As things stand now, there has been at least a dozen reported breaches of the power grid, so the possibility is very real.

What this shows us is that old technology components that aren’t designed for future threats can become outdated and risky to use. As always, we recommend that you always keep your organization’s technology as up-to-date as possible, and to take advantage of powerful security solutions designed to keep your systems secure from potential threats.

Evolve IT recommends that your organization implement a Unified Threat Management (UTM) solution. You can think of it as a convenient device that combines several enterprise-level technologies to keep your business safe from all manners of threats. To learn more, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Google Hosted Solutions Microsoft Upgrade Efficiency Computer Workplace Tips IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Hardware Network Security Ransomware Apps Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Cybercrime Website Mobile Device Management Money Network Smartphones Employer-Employee Relationship Managed Service Provider Outlook Two-factor Authentication History Small Business Phishing App Wireless Technology Android Apple Mobile Computing communications Big Data Safety Unified Threat Management Best Practice Quick Tips Alert Networking Data storage Data Firewall Windows Experience Content Filtering Black Market YouTube Processors End of Support Office Tips LiFi Business Management Staffing Downtime BYOD Passwords Competition Streaming Media Help Desk Writing Micrsooft Presentation Visible Light Communication Entrepreneur Disaster Domains Business Growth Data Management Recovery Robot Hacker Advertising Society Sports Google Wallet Application Spam Retail Running Cable Customer Service Information Technology Windows 8 Internet of Things Hosted Solution Windows XP IT Services Managed IT services Router Documents Artificial Intelligence Office 365 Tech Support Compliance Drones Bluetooth Saving Money Analytics Social Lithium-ion battery Printer Browser intranet Automation Virtual Desktop Wireless Memory Securty Unified Communications Document Management Encryption Social Networking Deep Learning Law Enforcement Public Speaking SaaS VoIP BDR Virtualization IP Address Proactive IT Cortana Vendor Management Network Congestion Government Keyboard Augmented Reality Save Money Search Music User Monitors Hard Drives Shortcut Laptop Remote Computing Cryptocurrency DDoS IBM Displays Google Docs Heating/Cooling Education Word Holiday Cleaning
QR-Code