News

DoS-attack in the US caused power station failure

According to Department of Energy (DOE) report for the first quarter of 2019, some incident caused electrical outages.

“On March 5, an unidentified power company fell victim to a “cyber event” that interfered with operations but stopped short of causing blackouts, according to a DOE filing this week”, — specified in the message.

As says the document, incident took place on the unnamed power station under the jurisdiction of the Western Electricity Coordination Council (WECC).

WECC monitors and controls electrical networks in the series of Western states, including California (Kern and Los-Angeles districts), Utah (Slat-Lake-City district) and Wyoming (Convers district).

Incident occurred on March 5 this year. Blackouts began at 9:12 and finished at 18:57 local time.

Report does not contain any other details.

However, few days ago DOE official confirmed that the event “did not impact generation, the reliability of the grid or cause any customer outages“.

In December 2015, Russian hackers used stolen credentials to enter system and trigger TDOS-attack to target three distributive utilities in Ukraine, for a short time switching off lights for about four million people – it was first attack of such type.

Distributing power plant in Ukraine, which was attacked by Russian hackers in December 2015
Distributing power plant in Ukraine, which was attacked by Russian hackers in December 2015

Incident in March does not seem to be a part of some coordinated planned campaign, though previously could not be suggested at all that cyberattack can threatens US electrical system that makes incident worth attention.

According to E&E News, attack was performed by exploitation of DoS – vulnerability that already has a patch. What equipment contained vulnerability, is not reported.

The DOS event reflects a concerning uptick in attacks — sophisticated or not — targeting critical infrastructure facilities worldwide, according to Lior Frenkel, CEO and co-founder of industrial cybersecurity firm Waterfall Security Solutions. Tools once exclusively available to nation-state hacking teams have passed into the hands of criminal organizations and the general public, he observed.

“Grid cyberevents like that of March 5 are bound to happen at an increasing rate. Targets need to understand the world has changed”, — he warned.

Source: https://www.eenews.net

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button