INTERNATIONAL ENERGY PARTNERSHIP
  • Home
  • About
    • Our Team
    • Our Methodology
  • News
  • Contact

Energetic Bear Hits Hundreds of Energy Companies

7/2/2014

0 Comments

 
Hundreds of American and European energy companies have been infected by a cyber weapon called "Energetic Bear" over the last 18 months. The malware was originally designed for espionage purposes to monitor energy consumption, but recently evolved to be able to shut down physical plants and facilities. It has the capacity to cripple wind turbines, gas pipelines, and power plants.
It's believed to have been created a state-sponsored group in Eastern Europe, likely backed by Russia. The malware infected 3 leading specialist manufacturers of industrial control systems, and then infiltrated the energy companies through software updates sent from the manufacturers. Contaminated software from one of these manufacturers was distributed to more than 250 industrial systems, so the extent of the infection is quite large.

The malware is most active in Spain and the U.S., as well as France, Italy, and Germany.

According to security firm KCS Group, "to target a whole sector like this at the level they are doing just for strategic data and control speaks of some form of government sanction. These are people working with Fapsi [Russia's electronic spying agency] working to support mother Russia."

With the proliferation of smaller scale renewable energy sources monitored by smart grids, the amount of opportunities for attack have grown. Smart meters, installed to give consumers and companies alike a better idea of how to increase energy efficiency, have added to the potential pool of targets as well.

Companies and politicians have been slow to protect against these new threats. Earlier in the year, President Obama signed an executive order to assess risks to the smart grids and scout out potential vulnerabilities. Dominion Resources of Virginia has also announced a plan to spend $500 million over the next few years to reinforce critical cyber-infrastructure against such attacks.
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Archives

    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013

Powered by Create your own unique website with customizable templates.
  • Home
  • About
    • Our Team
    • Our Methodology
  • News
  • Contact