Security

Office network at the European Network of Transmission System Operators for Electricity (ENTSO-E) breached

The European Network of Transmission System Operators for Electricity (ENTSO-E) disclose a security breach this week.

The European Network of Transmission System Operators for Electricity (ENTSO-E) revealed this week that threat actors penetrated its network.

ENTSO-E, the European Network of Transmission System Operators, represents 43 electricity transmission system operators (TSOs) from 36 countries across Europe, thus extending beyond EU borders. ENTSO-E was established and given legal mandates by the EU’s Third Package for the Internal energy market in 2009, which aims at further liberalising the gas and electricity markets in the EU.

ENTSO-E works with TSO on the definition of Europe’s energy and climate strategy. According to the organization, the attack only impacted the office network and did not affect any operational TSO system.

“A risk assessment has been performed and contingency plans are now in place to reduce the risk and impact of any further attacks,” reads the statement published by the company. “Our TSO members have been informed and we continue to monitor and assess the situation.”

Some of the affected TSOs also published security advisories ([1], [2], [3]) about the security incident and explained that hackers did not breach their networks.

“The incident only affects file exchange policies between Fingrid and ENTSO-E. We have instructed our staff based on the information received from ENTSO-E and we have implemented technical preparedness measures accordingly.” reported Finland’s TSO, Fingrid.

The attack is worrisome because threat actors have targeted a centralized authority in the attempt to impact one of the European electrical grids.

Another element of concern is the timing of the attack, in this period the Coronavirus outbreak is having an important impact on organizations and their personnel. In many cases, employees ordinary working to defend the organizations are involved in smart-working with a significant impact on their productivity and efficiency. The overall process could suffer important changes advantaging the attackers.

“An attacker may access these organizations to harvest sensitive information about supported entities. This may facilitate information gathering and target development operations while avoiding any direct access to the victims.” reads a post published by security firm Dragos. “As a result, the attacker would effectively expose information from several organizations at the same time through a single intrusion.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hackin, ENTSO-E)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

5 hours ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

9 hours ago

U.S. CISA adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration Manager, and Apple devices flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration…

11 hours ago

Odido confirms massive breach; 6.2 Million customers impacted

Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID…

24 hours ago

ApolloMD data breach impacts 626,540 people

A May 2025 cyberattack on ApolloMD exposed the personal data of over 626,000 patients linked…

1 day ago

LummaStealer activity spikes post-law enforcement disruption

Bitdefender reports a surge in LummaStealer activity, showing the MaaS infostealer rebounded after 2025 law…

1 day ago

This website uses cookies.