Department of Energy hacked 159 times between 2010 and 2014

According to a review of federal records obtained by USA Today, the US Department of Energy is among the most targeted government organizations in the US.

The US Department of Energy manages information of strategic importance for a potential attacker, it oversees the operations of power grid, nuclear arsenal, and national labs. The data show that the Department of Energy has been hacked 159 times between 2010 and 2014, I reported early 2013 a major cyber attack on the networks at headquarters located in Washington DC. The news was published by The Washington Free Beacon, at the time of the announcement a total of 14 servers and 20 workstations at the headquarters were penetrated, it seems that also personal information of hundreds of Department of Energy employees were exposed.

Back to the present, the data acquired by the USA Today through the Freedom of Information Act, demonstrate that the Department of Energy is under constant siege, the experts reported 1,131 attempted cyberattacks during a 48 month period, unfortunately 159 of those attempts appear to have been successful.

The officials at the Department of Energy hasn’t provided further information related to the cyber attacks, in particular of the type and volume of the data related to the nation’s power grid or nuclear weapons stockpile likely accessed or stolen by the attackers.

“The Department of Energy has all the same problems as just about every other agency, the same problems that were highlighted” Tenable Network Security strategist Cris Thomas told Homeland Security Today, referencing the massive hack into OPM computers earlier this summer that saw 22 million Social Security numbers stolen.

“Basic fundamental security practices are either not properly implemented, not enforced or just plain missing,” Thomas continued. “The overall state of insecurity at the DOE was revealed by a report released by the Office of Inspector General just last year which found numerous default or easily guessed passwords on user workstations among other issues. These were some of the same exact problems that were found at OPM.”

The DoE is considerable as a strategic target due the information it manages on the critical infrastructure of the country, the complexity of the techniques adopted by attackers led to thinks that state sponsored APT groups are responsible for the attacks. The data obtained by the USA Today are aligned with the findings of the ICS-CERT MONITOR report related to the period September 2014 – February 2015 issued in March by the DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).

According to the report, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) received and responded to 245 incidents in Fiscal Year 2014, more than half of the incidents reported by asset owners and industry partners involved sophisticated APT. ICS/SCADA system were also targeted by other categories of threat actors, including cyber criminals, insider threats and hacktivists.

Pierluigi Paganini

(Security Affairs – US Department of Energy, security)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer

Trend Micro fixed multiple vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer…

2 hours ago

Paragon Graphite Spyware used a zero-day exploit to hack at least two journalists’ iPhones<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Security researchers at Citizen Lab revealed that Paragon's Graphite spyware can hack fully updated iPhones…

13 hours ago

SinoTrack GPS device flaws allow remote vehicle control and location tracking

Two vulnerabilities in SinoTrack GPS devices can allow remote vehicle control and location tracking by…

21 hours ago

U.S. CISA adds Wazuh, and WebDAV flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wazuh, and WebDAV flaws to its Known…

24 hours ago

Exposed eyes: 40,000 security cameras vulnerable to remote hacking

Over 40,000 internet-exposed security cameras worldwide are vulnerable to remote hacking, posing serious privacy and…

1 day ago

Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown

INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied…

1 day ago