Kill Switches Secretly Installed In Solar Panels

Chinese “kill switches” have been discovered hidden in American solar farms, triggering urgent warnings over US national energy security and prompting calls to suspend the deployment of renewable energy generation in the UK.

The kill switches, identified as cellular radios, are embedded within power inverters manufactured by Chinese companies and sold to US power generators

Power inverters are critical components in solar and wind energy systems. They act as the vital link between renewable energy sources and the wider electricity grid, converting the generated power into a usable form.

The presence of these remotely cyber controlled devices raises the possibility of potential vulnerabilities within the power grid. 

Power inverters play a critical role in solar and wind farms by converting energy into a form compatible with the national grid, making them a key point of vulnerability if compromised.Tampering with this type of equipment allows China the power to trigger blackouts across the West, and could be a way of destroying the grid.

China has dismissed the allegations as a smear campaign, but the discovery has triggered alarm within the US government and is expected to prompt a similar UK security checks.

Net Zero Implementation & Fears Of Chinese Control of Energy Infrastructure

There have benn serious requests for a pause in the UK’s green energy expansion have intensified following reports that Chinese-made components capable of remote shutdown, dubbed “kill switches”, were found in US solar farms.

Indeed, concerns are mounting as Chinese companies dominate the global supply of power inverters, batteries, and solar panels, key components used widely across Western energy systems. Chinese firms apparently supply around 50% of the world’s solar inverters and in 2023, two companies, Huawei and Sungrow, controlled more than 50% of the global market.

Huawwei has previously fallen under suspicion of covertly embedded devices in its 5G telecommunications technology, prompting its removal from telecoms infrastructure in the UK and numerous other Western jurisdictions.

The European Solar Manufacturing Council estimates that over 200GW of Europe’s solar capacity, which is equivalent to the output of 200 nuclear power stations, relies on Chinese-manufactured inverters. Recent blackouts in Spain and Portugal are believed to have been triggered by the sudden loss of only 2GW of generation, highlighting the system’s vulnerability.

Telegraph   |     Daily Mail   |     Reuters     |   Tech Digest  |  Reddit   |     Facebook     |   Share Talk

Image: Aldward Castillo

You Might Also Read: 

Present Danger: Cyber Attacks On Power Grids:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Examining The NIS2 Directive From Outside The EU
Security Performance Metrics Fall Short »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Daisy Corporate Services

Daisy Corporate Services

Daisy is one of the largest providers of communications and IT solutions across the UK, with a portfolio spanning unified communications, cloud, cyber security and resilience.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.