US Hackers Penetrate Russia's Electric Grid

The New York Times has published a news story which claims that the US military hackers have been attacking Russian power plants while  Russian sources have  said it is possible that its electrical grid has been and contiues to be under cyber-attack by the US.

Kremlin spokesman Dmitry Peskov said reports that US cyber-soldiers had put computer viruses on its electrical grid was a "hypothetical possibility". 

In its report the newspaper said American "code" had been deployed inside many elements of Russia's power network. Mr Peskov said President Trump had dismissed the allegations made in the Times, calling them "fake news".  Donald Trump has erupted in fury describing the article as a “virtual act of treason”.

According to a three-month investigation by the New York Times says that sophisticated malware has been implanted into Russia’s electricity system.

The Kremlin spokesman added: "If one assumes that some government agencies do this without informing the head of state, then of course this may indicate that cyber-war against Russia might be a hypothetical possibility." He said "vital areas" of Russia's economy were under continuous attack, but it had managed to counter the intrusions so they did no damage.

The NYT story was questioned by Thomas Rid, a political scientist from the Johns Hopkins School of Advanced International Studies, who said it made no sense because "publicity burns capabilities". 

The story would prompt Russia to search its power network extensively for malicious code, he said, making it likely that any viruses would be found. He added that the Russian power grid was big and "exceedingly complex" making it very hard for cyber-attackers to get in and leave any virus in place for a long time.

The malicious code was reportedly inserted by soldiers of the US Cyber Command. This group of military hackers is permitted to carry out "clandestine military activity" on computer networks under the aegis of the National Defense Authorisation Act, which was passed in 2018.

The US has been probing Russian power systems since 2012, reported the NYT, but was now more interested in finding weaknesses and inserting viruses.

BBC:         Telegraph:          Guardian

You Might Also Read: 

A New Age of Warfare:

The New Sophistication Of Nation-State Hacking:

 

 

« SMEs Need A Disaster Recovery Plan
Alarming Trends In Data Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

National Cybersecurity Society (NCSS)

National Cybersecurity Society (NCSS)

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

CyCraft Technology Corp

CyCraft Technology Corp

CyCraft is an AI company that forges the future of cybersecurity resilience through autonomous systems and human-AI collaboration.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.