Technology 5 min read

Latest Hacking Attack Compromises U.S. Power Grid Operations

The latest hacking attack on the U.S. power grid was allegedly perpetrated by Dragonfly to gather information and was discovered by Symantec.

Boulder Power Plant | Carol Jacobs-Carre | Flickr.com

Boulder Power Plant | Carol Jacobs-Carre | Flickr.com

The United States is now facing serious security threat as a latest hacking attack gave cyber criminals access to energy companies which control major parts of the power grid that supplies electricity to millions of its citizens.

Aside from the United States, European energy companies were also targeted by this latest hacking attack. The incident was uncovered by Symantec, a U.S.-based cybersecurity firm. In a post published by Symantec on its website, the security company said:

“The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations.”

Further investigation suggests that the hacking incident was executed by a group known as Dragonfly. According to Symantec, the group has been in operation since 2011 but went dark in 2014 when the company and other online security researchers exposed them.

#Dragonfly staged latest hacking attack which targets #US power grid networks!Click To Tweet

Latest Hacking Attack by Dragonfly is Troubling

For the past two years, cyber attackers have shown keen interest on the energy sector. It should be noted that in July, an unknown group of hackers executed a campaign to infiltrate several nuclear power plants and energy companies in the U.S.

While the identity of the said hackers was not exposed, people familiar with the case claimed that the techniques utilized by the group resembled those of the Russian hacking group known as Energetic Bear.

Another notable energy hacking incident happened in Ukraine in 2015 and 2016 were cyber attackers caused massive power outages that affected hundreds of thousands of people. Other European countries also confirmed several attempts at hacking their electricity grids.

With the case of Dragonfly, it appears that the group is interested in two things: learning how energy facilities work and gaining access to the operational systems themselves. The cyber criminals’ latest hacking attack has potentially given them the ability to sabotage or gain control of power grid systems.

“There’s a difference between being a step away from conducting sabotage and actually being in a position to conduct sabotage … being able to flip the switch on power generation,” says Eric Chien, a Symantec security analyst in a statement to Wired.

“We’re now talking about on-the-ground technical evidence this could happen in the US, and there’s nothing left standing in the way except the motivation of some actor out in the world,” he went on to say.

The Dragonfly 2.0 Campaign

According to Symantec, the evidence they obtained shows that Dragonfly 2.0 campaign has been ongoing since 2015. The security firm also pointed out a significant increase in the campaign’s activity this 2017.

The escalation is deemed by experts as troubling because operational networks can often wield significant influence over the stability of the electric grid they’re responsible for.

An outline of the Dragonfly group’s latest hacking attack activities. | Symantec | symantec.com

Apparently, cyber criminals who have access to an energy company’s power grid operation could pose as de facto operators of the company’s energy assets. Such control can give the attackers power over the breakers inside the companies’ infrastructure, and the ability to hijack energy health monitor systems.

If that is not alarming enough, the latest hacking attack provides an opportunity for the hackers to create failures in multiple grid-connected operational networks that could lead to a major blackout, pretty much like the Northeast Blackout of 2003.

How were the power grid networks got infiltrated by hackers? Symantec explained:

“As it did in its prior campaign between 2011 and 2014, Dragonfly 2.0 uses a variety of infection vectors in an effort to gain access to a victim’s network, including malicious emails, watering hole attacks, and Trojanized software.

The group conducted further targeted malicious email campaigns during 2016 and into 2017. The emails contained very specific content related to the energy sector, as well as some related to general business concerns. Once opened, the attached malicious document would attempt to leak victims’ network credentials to a server outside of the targeted organization.”

Aside from malicious emails, the attackers also used “watering hole attacks to harvest network credentials, by compromising websites that were likely to be visited by those involved in the energy sector.”

After stealing credentials, the attackers executed a series of follow-up attacks against their target organizations. In one scenario, Backdoor.Goodor, which provides attackers remote access to a victim’s machine, was said to have been installed on a victim’s machine via PowerShell, 11 days after visiting a compromised server.

According to a report from The Guardian, the group appears to be more interested in information-gathering. However, Symantec warns that a quiet beginning is often a prelude to deliberate attempts at sabotage.

“Sabotage attacks are typically preceded by an intelligence-gathering phase where attackers collect information about target networks and systems and acquire credentials that will be used in later campaigns.”

Right now, security experts are having a hard time identifying where the latest hacking attack and the group behind it originated. Some of the codes found in the Dragonfly campaign were said to be in Russian and French.

“Conflicting evidence and what appear to be attempts at misattribution make it difficult to definitively state where this attack group is based or who is behind it,” Symantec said.

Were you alarmed by this latest hacking attack on the U.S. energy sector? Why or why not? Let us know in the comment section below!

Found this article interesting?

Let Rechelle Ann Fuertes know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.


Profile Image

Rechelle Ann Fuertes

Rechelle is an SEO content producer, technical writer, researcher, social media manager, and visual artist. She enjoys traveling and spending time anywhere near the sea with family and friends.

Comments (0)
Most Recent most recent
You
Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.