Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Warns of Potential Cyber Attack on Electric Grid

FBI Warns of Potential Cyber Attack on Electric Grid

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed to be threatened by similar attacks.

On December 23rd, 2015, workers at a Ukrainian power plant distribution center bore witness to hackers taking control of their computers. The criminals used the machines to shut down heat and power for over 230,000 citizens. Even though the power outage only lasted somewhere between one-to-six hours, several control centers remained in tatters following the attack. In addition to turning off the power, the hackers also took the opportunity to overwrite critical firmware, leaving 16 substations unresponsive to remote commands. As you can imagine, this made it exceptionally difficult to resolve. It should be noted that this was the first confirmed instance of hackers successfully bringing down a power grid, and it was the result of a careful, meticulous operation.

The malware in question, dubbed BlackOut, is known to be Russian in origin. Yet, security analysts don’t want to point fingers at anyone particular. Instead, it’s being assumed that the attack was carried out by several different parties, who were each responsible for different stages of the infiltration. These varying threats worked together to bring about the resulting blackout. If one thing’s for certain, it’s the fact that this attack wasn’t a simple opportunistic hack; rather, it was a carefully plotted strike that could have potentially caused much more damage than it actually did. The only question left is, what was the intent of the attack?

What this shows us is that, for instance, an attack on the United States’ infrastructure, though improbable, is certainly a possibility. Researchers found that the systems used by the United States are actually less secure than the systems put into place by the Ukraine. In order to close up any potential for such a devastating attack, the FBI has begun a campaign that’s designed to raise awareness of the issue. This campaign includes briefings and other exercises geared toward informing electrical power companies of what the risks are.

As you might expect, the reason that these attacks are so effective nowadays is because the power infrastructure of the United States is aging. Digital security wasn’t a necessity back when the infrastructure was first established, but with the changing times, it becomes a possibility that must be prepared for. Therefore, it’s only a matter of time before some, with or without purpose, finds their way into the power grid and causes damage. As things stand now, there has been at least a dozen reported breaches of the power grid, so the possibility is very real.

What this shows us is that old technology components that aren’t designed for future threats can become outdated and risky to use. As always, we recommend that you always keep your organization’s technology as up-to-date as possible, and to take advantage of powerful security solutions designed to keep your systems secure from potential threats.

Evolve IT recommends that your organization implement a Unified Threat Management (UTM) solution. You can think of it as a convenient device that combines several enterprise-level technologies to keep your business safe from all manners of threats. To learn more, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Computer Google Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Network Security Ransomware Gmail Hardware Business Continuity The Internet of Things Social Media Disaster Recovery Communication Bandwidth Hacking WiFi Facebook Operating System Microsoft Office Office Backup Apps Website Best Practice Alert Networking Data storage Smartphones Windows Employer-Employee Relationship Data Experience Two-factor Authentication History Small Business Phishing App Mobile Device Management Money Network Mobile Computing Big Data communications Safety Unified Threat Management Managed Service Provider Outlook Quick Tips Wireless Technology Android Firewall Apple Content Filtering Cybercrime End of Support Cortana Proactive IT Competition Network Congestion Presentation Entrepreneur Writing Domains Save Money Music Hacker Cryptocurrency Laptop IBM Application Google Docs Customer Service Education Retail Cleaning Holiday YouTube Processors Black Market Office Tips LiFi Router Staffing Managed IT services Office 365 BYOD Downtime Streaming Media Help Desk Passwords Micrsooft Analytics Visible Light Communication Disaster Saving Money Bluetooth Lithium-ion battery intranet Data Management Business Growth Robot Advertising Recovery Automation Memory Society Sports Social Networking Spam Google Wallet Public Speaking IP Address Information Technology Virtualization Running Cable Deep Learning BDR Windows 8 Internet of Things Windows XP Government IT Services Hosted Solution Augmented Reality Artificial Intelligence Keyboard Documents Vendor Management Search Tech Support User Compliance Hard Drives Drones Monitors Remote Computing Social Shortcut DDoS Printer Browser Heating/Cooling Virtual Desktop Word Wireless Displays Unified Communications Securty Document Management Encryption SaaS Business Management VoIP Law Enforcement
QR-Code