Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Warns of Potential Cyber Attack on Electric Grid

FBI Warns of Potential Cyber Attack on Electric Grid

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed to be threatened by similar attacks.

On December 23rd, 2015, workers at a Ukrainian power plant distribution center bore witness to hackers taking control of their computers. The criminals used the machines to shut down heat and power for over 230,000 citizens. Even though the power outage only lasted somewhere between one-to-six hours, several control centers remained in tatters following the attack. In addition to turning off the power, the hackers also took the opportunity to overwrite critical firmware, leaving 16 substations unresponsive to remote commands. As you can imagine, this made it exceptionally difficult to resolve. It should be noted that this was the first confirmed instance of hackers successfully bringing down a power grid, and it was the result of a careful, meticulous operation.

The malware in question, dubbed BlackOut, is known to be Russian in origin. Yet, security analysts don’t want to point fingers at anyone particular. Instead, it’s being assumed that the attack was carried out by several different parties, who were each responsible for different stages of the infiltration. These varying threats worked together to bring about the resulting blackout. If one thing’s for certain, it’s the fact that this attack wasn’t a simple opportunistic hack; rather, it was a carefully plotted strike that could have potentially caused much more damage than it actually did. The only question left is, what was the intent of the attack?

What this shows us is that, for instance, an attack on the United States’ infrastructure, though improbable, is certainly a possibility. Researchers found that the systems used by the United States are actually less secure than the systems put into place by the Ukraine. In order to close up any potential for such a devastating attack, the FBI has begun a campaign that’s designed to raise awareness of the issue. This campaign includes briefings and other exercises geared toward informing electrical power companies of what the risks are.

As you might expect, the reason that these attacks are so effective nowadays is because the power infrastructure of the United States is aging. Digital security wasn’t a necessity back when the infrastructure was first established, but with the changing times, it becomes a possibility that must be prepared for. Therefore, it’s only a matter of time before some, with or without purpose, finds their way into the power grid and causes damage. As things stand now, there has been at least a dozen reported breaches of the power grid, so the possibility is very real.

What this shows us is that old technology components that aren’t designed for future threats can become outdated and risky to use. As always, we recommend that you always keep your organization’s technology as up-to-date as possible, and to take advantage of powerful security solutions designed to keep your systems secure from potential threats.

Evolve IT recommends that your organization implement a Unified Threat Management (UTM) solution. You can think of it as a convenient device that combines several enterprise-level technologies to keep your business safe from all manners of threats. To learn more, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Efficiency Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Microsoft Office The Internet of Things Office Social Media Backup Apps Bandwidth Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System Android Quick Tips Apple Best Practice Firewall Alert Content Filtering Networking Cybercrime Data storage Website Windows Data Experience Employer-Employee Relationship History Two-factor Authentication Mobile Device Management Money Network Smartphones Small Business Phishing App Managed Service Provider Outlook Mobile Computing Big Data communications Safety Unified Threat Management Wireless Technology IP Address Social Virtualization Automation Printer Browser Virtual Desktop Government Wireless Memory Augmented Reality Unified Communications Keyboard Securty Deep Learning Search Document Management User Encryption Hard Drives SaaS VoIP BDR Law Enforcement Remote Computing Shortcut Cortana Vendor Management DDoS Proactive IT Network Congestion Heating/Cooling Word Save Money Monitors Music Business Management Cryptocurrency Laptop IBM Displays Competition Google Docs Presentation Education Entrepreneur Domains Cleaning Holiday YouTube Processors End of Support Black Market Office Tips Hacker LiFi Staffing BYOD Downtime Application Streaming Media Help Desk Writing Passwords Micrsooft Customer Service Visible Light Communication Disaster Data Management Business Growth Robot Advertising Router Recovery Office 365 Society Sports Spam Retail Google Wallet Analytics Information Technology Running Cable Saving Money intranet Lithium-ion battery Windows 8 Internet of Things Windows XP IT Services Managed IT services Hosted Solution Artificial Intelligence Documents Social Networking Tech Support Compliance Public Speaking Bluetooth Drones
QR-Code