{"id":2419,"date":"2010-02-19T00:00:00","date_gmt":"2010-02-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/02\/19\/spike-in-power-grid-attacks-likely-in-next-12-months\/"},"modified":"2021-12-30T11:41:18","modified_gmt":"2021-12-30T11:41:18","slug":"spike-in-power-grid-attacks-likely-in-next-12-months","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/02\/19\/spike-in-power-grid-attacks-likely-in-next-12-months\/","title":{"rendered":"Spike In Power Grid Attacks Likely In Next 12 Months"},"content":{"rendered":"<p>Attacks against the power grid are likely to rise and intensify during the next 12 months as smart grid research and pilot projects advance, according to utility security experts and a recently published report that analyzes threats to critical infrastructure.  The so-called Project Grey Goose Report on Critical Infrastructure points to state and\/or non-state sponsored hackers from the Russian Federation of Independent States, Turkey, and China as the main threats to targeting and hacking into energy providers and other critical infrastructure networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Some companies say there&#8217;s never been a successful attack against the grid, but that&#8217;s not true,&#8221; he says.<\/p>\n<p>Doug Preece, senior manager for smart energy services at Capgemini, says he expects an uptick in hacking of smart grid devices during the next 12 months as more smart-grid pilot projects are launched at energy firms.  &#8220;A closed communications network was difficult to breach.&#8221;  &#8220;Their communications will be predominantly wireless, and it&#8217;s assumed they will be sniffed, penetrated, hacked, and service will be denied &#8230;So we&#8217;re designing mitigation techniques and security to address these things,&#8221; he says.<\/p>\n<p>The best-case scenario of attack would be someone poking around the network for vulnerabilities so he can cut his energy bill, for example, says Eric Knapp, vice president of technical marketing for NitroSecurity.  &#8220;The worst-case scenario would be an attacker compromising [the smart grid] and then controlling the distribution of power,&#8221; he says.<\/p>\n<p>Patricia Titus, chief information security officer for Unisys Federal Systems and former CISO for the Transportation Security Administration (TSA), says energy firms need to &#8220;take a breath&#8221; and determine whether adopting smart grid technology will exacerbate or solve problems.<\/p>\n<p>And it&#8217;s not that existing SCADA systems are all insulated from attack, even with their private lines.<\/p>\n<p>The Grey Goose report calls out Russia, Turkish hackers, and China as the top threats to the power grid.<\/p>\n<p>It just opens up another window that requires a higher level of sophistication [to breach].&#8221;<\/p>\n<p>http:\/\/www.darkreading.com\/security\/vulnerabilities\/showArticle.jhtml?articleID=223000369<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2419","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2419"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2419\/revisions"}],"predecessor-version":[{"id":4906,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2419\/revisions\/4906"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}