Home / News

Russian Hackers Have Penetrated U.S. Electric Utilities

U.S. federal government officials have revealed Russian hackers have been able to gain access to the networks of electric utilities in the country, according to a report by The Wall Street Journal. “Hundreds of victims” have been claimed by a Russian state-sponsored group known as Dragonfly or Energetic Bear. According to the DHS officials, the attackers initiated the campaign by targeting employees of the utility companies’ suppliers. Using spear-phishing emails and watering-hole attacks, the hackers were able to gain access to the suppliers’ networks and steal suppliers’ credentials to access the utility networks.

By CircleID Reporter

CircleID’s internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us.

Visit Page

Filed Under

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Comments

The wrong right of access Phil Howard  –  Jul 26, 2018 4:46 PM

Suppliers should not have direct access to utility networks, ever.  Utility staff should become fully trained on whatever is being supplied whether it be software or a pole transformer.  Any case where the utility has to get vendor help should always result in not only the vendor being supervised (to do the sign-ins) during this assistance, but also an adjustment to training to include the root of this issue so utility staff alone can deal with it directly in the future.  Whether access is a key to enter a substation or sign in to a control system for anything, only a minimal number of staff should ever have access.  Vendors need to be providing this level of security as an integral part of anything, especially if it can be networked.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

Related

Topics

Cybersecurity

Sponsored byVerisign

Domain Management

Sponsored byMarkMonitor

IPv4 Markets

Sponsored byIPXO

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byAppdetex