Hacking

sPower it the first renewable energy provider hit by a cyber attack that caused communications outages

sPower, a US-based renewable energy provider, was the victim of a cyber attack that disconnected the US power grid operator from its power generation station.

sPower, a Utah-based renewable energy provider was hit by a cyber attack, the incident took place in March.

This is the first time that a cyber attack hit a renewable energy provider causing the temporary interruption of communications with several solar and wind installations.

“These interruptions had no impact to generation and did not cause electrical system separation,” Lara Hamsher, government relations and communications manager at sPower, said in an emailed statement.

The incident was confirmed by documents obtained under the Freedom of Information Act.

According to sPower, the attack did not affect any critical control system and power generation. 

“The attack left operators at the company, sPower, unable to communicate with a dozen generation sites for five-minute intervals over the course of several hours on March 5. Each generation site experienced just one communication outage.” reported the website CyberScoop. “It is believed to be the first cybersecurity incident on record that caused a “disruption” in the U.S. power industry, as defined by the Department of Energy.”

Threat actors exploited a known flaw in Cisco firewalls to disrupt communications over a span of about 12 hours, according to the emergency report sPower filed with the Department of Energy.

The attackers carried out Denial-of-service attacks flooding target devices or websites with malicious traffic to caused them to crash.

According to the E&E News website that first reported the news of a ‘Cyber event’ that disrupted U.S. grid networks, the attack was not targeted.

Hackers were only focused on exploiting the flaws in Cisco firewalls used by organizations in every industry.

“The cybersecurity incident is the first confirmed to have caused “interruptions of electrical system operations,” based on DOE records. Experts say the hackers behind the attack may not have known they were affecting the power grid, based on the fact that Cisco firewalls are used in a range of industries and are a popular target of opportunity when left exposed to the internet.” reported the E&E News website

sPower patched outdated Cisco firewalls to stop the attack and prevent future incidents, the company also launched an internal investigation to determine the extent of the attack.

sPower has reviewed log files and has found no evidence of a breach beyond the [denial-of-service] attack,” said Matthew Tarduogno, an official in DOE’s Office of Cybersecurity, Energy Security and Emergency Response, in a March 8 email obtained by E&E News. “Additionally, the incident did not have any impacts on operations.” continues E&E News.

DOE confirmed that at the time is not aware of any related incidents in the energy sector.

The incident demonstrates that a trivial cyber attack could cause severe damages to power grids, the attack, in fact, is not sophisticated.

Dealing with sophisticated cyberattacks on electric infrastructure we cannot forget what has happened in Ukraine in 2015. At the time, a sophisticated cyber attack launched by Russia-linked hackers left hundreds of thousands of people into darkness.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – power grid, sPower)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Google addressed 2 Chrome zero-days demonstrated at Pwn2Own 2024

Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…

9 hours ago

INC Ransom stole 3TB of data from the National Health Service (NHS) of Scotland

The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…

13 hours ago

CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the…

18 hours ago

The DDR Advantage: Real-Time Data Defense

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build…

21 hours ago

Finnish police linked APT31 to the 2021 parliament attack

The Finnish Police attributed the attack against the parliament that occurred in March 2021 to…

1 day ago

TheMoon bot infected 40,000 devices in January and February

A new variant of TheMoon malware infected thousands of outdated small office and home office…

1 day ago

This website uses cookies.