Power Grid on Alert After Two Cybersecurity Warnings Issued this Week

Array
(
    [field_blog_author] => Array
        (
            [#theme] => field
            [#weight] => 0
            [#title] => Blog Author
            [#access] => 1
            [#label_display] => hidden
            [#view_mode] => full
            [#language] => und
            [#field_name] => field_blog_author
            [#field_type] => text
            [#field_translatable] => 0
            [#entity_type] => node
            [#bundle] => wp_blog
            [#object] => stdClass Object
                (
                    [vid] => 5483
                    [uid] => 115
                    [title] => Power Grid on Alert After Two Cybersecurity Warnings Issued this Week
                    [log] => 
                    [status] => 1
                    [comment] => 1
                    [promote] => 0
                    [sticky] => 0
                    [nid] => 3644
                    [type] => wp_blog
                    [language] => und
                    [created] => 1497468733
                    [changed] => 1508251625
                    [tnid] => 0
                    [translate] => 0
                    [revision_timestamp] => 1508251625
                    [revision_uid] => 76
                    [body] => Array
                        (
                            [und] => Array
                                (
                                    [0] => Array
                                        (
                                            [value] => 

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[summary] => [format] => full_html [safe_value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[safe_summary] => ) ) ) [taxonomy_wp_blog_tags] => Array ( ) [field_intro_image] => Array ( [und] => Array ( [0] => Array ( [fid] => 1993 [uid] => 115 [filename] => Image Courtesy of Christoph Scholz.jpg [uri] => public://Image Courtesy of Christoph Scholz.jpg [filemime] => image/jpeg [filesize] => 130131 [status] => 1 [timestamp] => 1497468733 [focus_rect] => [crop_rect] => [rdf_mapping] => Array ( ) [alt] => [title] => [width] => 640 [height] => 427 ) ) ) [field_blog_author] => Array ( [und] => Array ( [0] => Array ( [value] => Christina Simeone [format] => [safe_value] => Christina Simeone ) ) ) [field_image_caption] => Array ( [und] => Array ( [0] => Array ( [value] => Image Courtesy of Christoph Scholz [format] => [safe_value] => Image Courtesy of Christoph Scholz ) ) ) [field_set_as_featured_] => Array ( [und] => Array ( [0] => Array ( [value] => no ) ) ) [field_authors] => Array ( [und] => Array ( [0] => Array ( [target_id] => 62 ) ) ) [field_addthis] => Array ( [und] => Array ( [0] => Array ( [value] => Dummy value ) ) ) [metatags] => Array ( [und] => Array ( [robots] => Array ( [value] => Array ( [0] => 0 [index] => 0 [follow] => 0 [noindex] => 0 [nofollow] => 0 [noarchive] => 0 [nosnippet] => 0 [noodp] => 0 [noydir] => 0 [noimageindex] => 0 [notranslate] => 0 ) ) ) ) [rdf_mapping] => Array ( [rdftype] => Array ( [0] => sioc:Item [1] => foaf:Document ) [title] => Array ( [predicates] => Array ( [0] => dc:title ) ) [created] => Array ( [predicates] => Array ( [0] => dc:date [1] => dc:created ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [changed] => Array ( [predicates] => Array ( [0] => dc:modified ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [body] => Array ( [predicates] => Array ( [0] => content:encoded ) ) [uid] => Array ( [predicates] => Array ( [0] => sioc:has_creator ) [type] => rel ) [name] => Array ( [predicates] => Array ( [0] => foaf:name ) ) [comment_count] => Array ( [predicates] => Array ( [0] => sioc:num_replies ) [datatype] => xsd:integer ) [last_activity] => Array ( [predicates] => Array ( [0] => sioc:last_activity_date ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) ) [path] => Array ( [pathauto] => 1 ) [cid] => 0 [last_comment_timestamp] => 1497468733 [last_comment_name] => [last_comment_uid] => 115 [comment_count] => 0 [name] => Christina Simeone [picture] => 0 [data] => b:0; [entity_view_prepared] => 1 ) [#items] => Array ( [0] => Array ( [value] => Christina Simeone [format] => [safe_value] => Christina Simeone ) ) [#formatter] => text_default [0] => Array ( [#markup] => Christina Simeone ) ) [links] => Array ( [#theme] => links__node [#pre_render] => Array ( [0] => drupal_pre_render_links ) [#attributes] => Array ( [class] => Array ( [0] => links [1] => inline ) ) [node] => Array ( [#theme] => links__node__node [#links] => Array ( ) [#attributes] => Array ( [class] => Array ( [0] => links [1] => inline ) ) ) [comment] => Array ( [#theme] => links__node__comment [#links] => Array ( ) [#attributes] => Array ( [class] => Array ( [0] => links [1] => inline ) ) ) ) [comments] => Array ( ) [field_intro_image] => Array ( [#theme] => field [#weight] => 1 [#title] => Intro Image [#access] => 1 [#label_display] => hidden [#view_mode] => full [#language] => und [#field_name] => field_intro_image [#field_type] => image [#field_translatable] => 0 [#entity_type] => node [#bundle] => wp_blog [#object] => stdClass Object ( [vid] => 5483 [uid] => 115 [title] => Power Grid on Alert After Two Cybersecurity Warnings Issued this Week [log] => [status] => 1 [comment] => 1 [promote] => 0 [sticky] => 0 [nid] => 3644 [type] => wp_blog [language] => und [created] => 1497468733 [changed] => 1508251625 [tnid] => 0 [translate] => 0 [revision_timestamp] => 1508251625 [revision_uid] => 76 [body] => Array ( [und] => Array ( [0] => Array ( [value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[summary] => [format] => full_html [safe_value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[safe_summary] => ) ) ) [taxonomy_wp_blog_tags] => Array ( ) [field_intro_image] => Array ( [und] => Array ( [0] => Array ( [fid] => 1993 [uid] => 115 [filename] => Image Courtesy of Christoph Scholz.jpg [uri] => public://Image Courtesy of Christoph Scholz.jpg [filemime] => image/jpeg [filesize] => 130131 [status] => 1 [timestamp] => 1497468733 [focus_rect] => [crop_rect] => [rdf_mapping] => Array ( ) [alt] => [title] => [width] => 640 [height] => 427 ) ) ) [field_blog_author] => Array ( [und] => Array ( [0] => Array ( [value] => Christina Simeone [format] => [safe_value] => Christina Simeone ) ) ) [field_image_caption] => Array ( [und] => Array ( [0] => Array ( [value] => Image Courtesy of Christoph Scholz [format] => [safe_value] => Image Courtesy of Christoph Scholz ) ) ) [field_set_as_featured_] => Array ( [und] => Array ( [0] => Array ( [value] => no ) ) ) [field_authors] => Array ( [und] => Array ( [0] => Array ( [target_id] => 62 ) ) ) [field_addthis] => Array ( [und] => Array ( [0] => Array ( [value] => Dummy value ) ) ) [metatags] => Array ( [und] => Array ( [robots] => Array ( [value] => Array ( [0] => 0 [index] => 0 [follow] => 0 [noindex] => 0 [nofollow] => 0 [noarchive] => 0 [nosnippet] => 0 [noodp] => 0 [noydir] => 0 [noimageindex] => 0 [notranslate] => 0 ) ) ) ) [rdf_mapping] => Array ( [rdftype] => Array ( [0] => sioc:Item [1] => foaf:Document ) [title] => Array ( [predicates] => Array ( [0] => dc:title ) ) [created] => Array ( [predicates] => Array ( [0] => dc:date [1] => dc:created ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [changed] => Array ( [predicates] => Array ( [0] => dc:modified ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [body] => Array ( [predicates] => Array ( [0] => content:encoded ) ) [uid] => Array ( [predicates] => Array ( [0] => sioc:has_creator ) [type] => rel ) [name] => Array ( [predicates] => Array ( [0] => foaf:name ) ) [comment_count] => Array ( [predicates] => Array ( [0] => sioc:num_replies ) [datatype] => xsd:integer ) [last_activity] => Array ( [predicates] => Array ( [0] => sioc:last_activity_date ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) ) [path] => Array ( [pathauto] => 1 ) [cid] => 0 [last_comment_timestamp] => 1497468733 [last_comment_name] => [last_comment_uid] => 115 [comment_count] => 0 [name] => Christina Simeone [picture] => 0 [data] => b:0; [entity_view_prepared] => 1 ) [#items] => Array ( [0] => Array ( [fid] => 1993 [uid] => 115 [filename] => Image Courtesy of Christoph Scholz.jpg [uri] => public://Image Courtesy of Christoph Scholz.jpg [filemime] => image/jpeg [filesize] => 130131 [status] => 1 [timestamp] => 1497468733 [focus_rect] => [crop_rect] => [rdf_mapping] => Array ( ) [alt] => [title] => [width] => 640 [height] => 427 ) ) [#formatter] => image [0] => Array ( [#theme] => image_formatter [#item] => Array ( [fid] => 1993 [uid] => 115 [filename] => Image Courtesy of Christoph Scholz.jpg [uri] => public://Image Courtesy of Christoph Scholz.jpg [filemime] => image/jpeg [filesize] => 130131 [status] => 1 [timestamp] => 1497468733 [focus_rect] => [crop_rect] => [rdf_mapping] => Array ( ) [alt] => [title] => [width] => 640 [height] => 427 ) [#image_style] => content_width [#path] => ) ) [field_image_caption] => Array ( [#theme] => field [#weight] => 2 [#title] => Image Caption [#access] => 1 [#label_display] => hidden [#view_mode] => full [#language] => und [#field_name] => field_image_caption [#field_type] => text [#field_translatable] => 0 [#entity_type] => node [#bundle] => wp_blog [#object] => stdClass Object ( [vid] => 5483 [uid] => 115 [title] => Power Grid on Alert After Two Cybersecurity Warnings Issued this Week [log] => [status] => 1 [comment] => 1 [promote] => 0 [sticky] => 0 [nid] => 3644 [type] => wp_blog [language] => und [created] => 1497468733 [changed] => 1508251625 [tnid] => 0 [translate] => 0 [revision_timestamp] => 1508251625 [revision_uid] => 76 [body] => Array ( [und] => Array ( [0] => Array ( [value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[summary] => [format] => full_html [safe_value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[safe_summary] => ) ) ) [taxonomy_wp_blog_tags] => Array ( ) [field_intro_image] => Array ( [und] => Array ( [0] => Array ( [fid] => 1993 [uid] => 115 [filename] => Image Courtesy of Christoph Scholz.jpg [uri] => public://Image Courtesy of Christoph Scholz.jpg [filemime] => image/jpeg [filesize] => 130131 [status] => 1 [timestamp] => 1497468733 [focus_rect] => [crop_rect] => [rdf_mapping] => Array ( ) [alt] => [title] => [width] => 640 [height] => 427 ) ) ) [field_blog_author] => Array ( [und] => Array ( [0] => Array ( [value] => Christina Simeone [format] => [safe_value] => Christina Simeone ) ) ) [field_image_caption] => Array ( [und] => Array ( [0] => Array ( [value] => Image Courtesy of Christoph Scholz [format] => [safe_value] => Image Courtesy of Christoph Scholz ) ) ) [field_set_as_featured_] => Array ( [und] => Array ( [0] => Array ( [value] => no ) ) ) [field_authors] => Array ( [und] => Array ( [0] => Array ( [target_id] => 62 ) ) ) [field_addthis] => Array ( [und] => Array ( [0] => Array ( [value] => Dummy value ) ) ) [metatags] => Array ( [und] => Array ( [robots] => Array ( [value] => Array ( [0] => 0 [index] => 0 [follow] => 0 [noindex] => 0 [nofollow] => 0 [noarchive] => 0 [nosnippet] => 0 [noodp] => 0 [noydir] => 0 [noimageindex] => 0 [notranslate] => 0 ) ) ) ) [rdf_mapping] => Array ( [rdftype] => Array ( [0] => sioc:Item [1] => foaf:Document ) [title] => Array ( [predicates] => Array ( [0] => dc:title ) ) [created] => Array ( [predicates] => Array ( [0] => dc:date [1] => dc:created ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [changed] => Array ( [predicates] => Array ( [0] => dc:modified ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [body] => Array ( [predicates] => Array ( [0] => content:encoded ) ) [uid] => Array ( [predicates] => Array ( [0] => sioc:has_creator ) [type] => rel ) [name] => Array ( [predicates] => Array ( [0] => foaf:name ) ) [comment_count] => Array ( [predicates] => Array ( [0] => sioc:num_replies ) [datatype] => xsd:integer ) [last_activity] => Array ( [predicates] => Array ( [0] => sioc:last_activity_date ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) ) [path] => Array ( [pathauto] => 1 ) [cid] => 0 [last_comment_timestamp] => 1497468733 [last_comment_name] => [last_comment_uid] => 115 [comment_count] => 0 [name] => Christina Simeone [picture] => 0 [data] => b:0; [entity_view_prepared] => 1 ) [#items] => Array ( [0] => Array ( [value] => Image Courtesy of Christoph Scholz [format] => [safe_value] => Image Courtesy of Christoph Scholz ) ) [#formatter] => text_default [0] => Array ( [#markup] => Image Courtesy of Christoph Scholz ) ) [body] => Array ( [#theme] => field [#weight] => 3 [#title] => Body [#access] => 1 [#label_display] => hidden [#view_mode] => full [#language] => und [#field_name] => body [#field_type] => text_with_summary [#field_translatable] => 0 [#entity_type] => node [#bundle] => wp_blog [#object] => stdClass Object ( [vid] => 5483 [uid] => 115 [title] => Power Grid on Alert After Two Cybersecurity Warnings Issued this Week [log] => [status] => 1 [comment] => 1 [promote] => 0 [sticky] => 0 [nid] => 3644 [type] => wp_blog [language] => und [created] => 1497468733 [changed] => 1508251625 [tnid] => 0 [translate] => 0 [revision_timestamp] => 1508251625 [revision_uid] => 76 [body] => Array ( [und] => Array ( [0] => Array ( [value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[summary] => [format] => full_html [safe_value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[safe_summary] => ) ) ) [taxonomy_wp_blog_tags] => Array ( ) [field_intro_image] => Array ( [und] => Array ( [0] => Array ( [fid] => 1993 [uid] => 115 [filename] => Image Courtesy of Christoph Scholz.jpg [uri] => public://Image Courtesy of Christoph Scholz.jpg [filemime] => image/jpeg [filesize] => 130131 [status] => 1 [timestamp] => 1497468733 [focus_rect] => [crop_rect] => [rdf_mapping] => Array ( ) [alt] => [title] => [width] => 640 [height] => 427 ) ) ) [field_blog_author] => Array ( [und] => Array ( [0] => Array ( [value] => Christina Simeone [format] => [safe_value] => Christina Simeone ) ) ) [field_image_caption] => Array ( [und] => Array ( [0] => Array ( [value] => Image Courtesy of Christoph Scholz [format] => [safe_value] => Image Courtesy of Christoph Scholz ) ) ) [field_set_as_featured_] => Array ( [und] => Array ( [0] => Array ( [value] => no ) ) ) [field_authors] => Array ( [und] => Array ( [0] => Array ( [target_id] => 62 ) ) ) [field_addthis] => Array ( [und] => Array ( [0] => Array ( [value] => Dummy value ) ) ) [metatags] => Array ( [und] => Array ( [robots] => Array ( [value] => Array ( [0] => 0 [index] => 0 [follow] => 0 [noindex] => 0 [nofollow] => 0 [noarchive] => 0 [nosnippet] => 0 [noodp] => 0 [noydir] => 0 [noimageindex] => 0 [notranslate] => 0 ) ) ) ) [rdf_mapping] => Array ( [rdftype] => Array ( [0] => sioc:Item [1] => foaf:Document ) [title] => Array ( [predicates] => Array ( [0] => dc:title ) ) [created] => Array ( [predicates] => Array ( [0] => dc:date [1] => dc:created ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [changed] => Array ( [predicates] => Array ( [0] => dc:modified ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) [body] => Array ( [predicates] => Array ( [0] => content:encoded ) ) [uid] => Array ( [predicates] => Array ( [0] => sioc:has_creator ) [type] => rel ) [name] => Array ( [predicates] => Array ( [0] => foaf:name ) ) [comment_count] => Array ( [predicates] => Array ( [0] => sioc:num_replies ) [datatype] => xsd:integer ) [last_activity] => Array ( [predicates] => Array ( [0] => sioc:last_activity_date ) [datatype] => xsd:dateTime [callback] => date_iso8601 ) ) [path] => Array ( [pathauto] => 1 ) [cid] => 0 [last_comment_timestamp] => 1497468733 [last_comment_name] => [last_comment_uid] => 115 [comment_count] => 0 [name] => Christina Simeone [picture] => 0 [data] => b:0; [entity_view_prepared] => 1 ) [#items] => Array ( [0] => Array ( [value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[summary] => [format] => full_html [safe_value] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

[safe_summary] => ) ) [#formatter] => text_default [0] => Array ( [#markup] =>

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

) ) [submitted_by] => Array ( [0] => Array ( ) [#weight] => 7 [#access] => ) )
Posted by
Christina Simeone
on June 14, 2017
Image Courtesy of Christoph Scholz

This week, two different cybersecurity warnings were issued in the U.S., flagging significant potential threats to the electricity grid.

The first threat is ‘CrashOverride’, a malware program associated with Russia that was specifically designed and successfully used (outside the U.S.) to target electric power grid infrastructure.  The second threat is ‘DeltaCharlie’, a malware program associated with North Korea that targets critical infrastructure and other sectors.

Electrum’s CrashOverride

On June 13, the North American Reliability Corporation (NERC) issued a Level-1 Alert to share critical reliability information and recommended actions with key organizations in the electricity industry – such as electric generators, distributors, transmission owners, and balancing authorities – associated with the cybersecurity threat.

It started when the Slovakian cybersecurity firm, ESET, found dangerous malware, they called ‘Industroyer’. ESET believes this program was involved in the December 2016 cyber-attack on the Ukrainian grid (specifically de-energizing a transmission substation) that caused an hour-long blackout in the capital of Kiev.  ESET found that ‘Industroyer’ has the ability of “…directly controlling electricity substation switches and circuit breakers…The potential impact may range from simply turning off power distribution, triggering a cascade of failures, to more serious damage to equipment.”

ESET declared the malware to be the most dangerous cyber threat to industrial control systems since Stuxnet, which brought down Iran’s nuclear program.

ESET notified the U.S. cyber security firm, Dragos, on June 8 about the threat, seeking validation of ESET’s results. Dragos and ESET both released reports on the malware on June 12.  The Dragos report renames the malware ‘CrashOverride’ and provides an analysis of power system threats. Dragos links CrashOveride to a cyber-espionage group they track, Electrum, that apparently has ties to Russia.

The Department of Homeland Security (DHS) also issued an alert about CrashOveride, to a broader audience and NERC released a statement that no instances of the malware had yet been reported in North America.

Hidden Cobra’s DeltaCharlie

On June 13, DHS and the Federal Bureau of Investigation (FBI) jointly issued an alert on the malware ‘DeltaCharlie,’ developed by Hidden Cobra.  Hidden Cobra is the U.S. government’s name for cyber activity led by the North Korean government. Others call the group the ‘Guardians of Peace’ or the ‘Lazarus Group’, which were responsible for the 2014 hack on Sony Pictures.  

The joint release stated Hidden Cobra has and continues to target, “media, aerospace, financial, and critical infrastructure sectors” in the U.S. and globally. This group of actors has successfully leveraged their capabilities to extract data or cause disruptions in the past, commonly targeting older versions of Microsoft windows operating systems.

DeltaCharlie has been used to manage distributed denial of service (DDOS) botnet infrastructure.  DDOS attacks flood targeted servers with high volumes of web traffic all at once, overloading the capacity of the servers and crowding out legitimate website traffic. As an example, DDOS attacks have targeted servers hosting Twitter, Spotify, Netflix, Airbnb, and others notable websites. The DeltaCharlie infrastructure was originally identified by a coalition of security companies led by Novetta in 2016, and is now linked to North Korea.

Waiting to Exhale

So, this all sounds extremely concerning.

Are we moving towards the “Zero Days” future (referring to the Alex Gibney documentary warning of large scale cyber-attacks)? Are cyber technologies and activists becoming more sophisticated and distributed, respectively, than our ability to defend against them?

If there is any recent good news pertaining to cyberattacks and the electricity grid, it would be the June 9 release of a joint report from FERC and NERC analyzing the ability of the electricity grid to recover from blackouts – e.g. from a cyber-attack or weather event – absent certain digital grid monitoring and recovery technologies.

The study examined only a handful of participants, but did find these entities were able to manually restore normal operations – absent digital technologies – though the process was time consuming.

A little piece of mind in an otherwise crazy week!

Our blog highlights the research, opinions, and insights of individual authors. It does not represent the voice of the Kleinman Center as a whole.