ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

FBI Warns of Potential Cyber Attack on Electric Grid

FBI Warns of Potential Cyber Attack on Electric Grid

While it’s not particularly common for hackers to attack physical infrastructure, the few that have occurred have been known to be quite catastrophic. For example, the Ukrainian power infrastructure was taken out by hackers just last year, leaving hundreds of thousands of citizens without power for several hours. In fact, now western countries are believed to be threatened by similar attacks.

On December 23rd, 2015, workers at a Ukrainian power plant distribution center bore witness to hackers taking control of their computers. The criminals used the machines to shut down heat and power for over 230,000 citizens. Even though the power outage only lasted somewhere between one-to-six hours, several control centers remained in tatters following the attack. In addition to turning off the power, the hackers also took the opportunity to overwrite critical firmware, leaving 16 substations unresponsive to remote commands. As you can imagine, this made it exceptionally difficult to resolve. It should be noted that this was the first confirmed instance of hackers successfully bringing down a power grid, and it was the result of a careful, meticulous operation.

The malware in question, dubbed BlackOut, is known to be Russian in origin. Yet, security analysts don’t want to point fingers at anyone particular. Instead, it’s being assumed that the attack was carried out by several different parties, who were each responsible for different stages of the infiltration. These varying threats worked together to bring about the resulting blackout. If one thing’s for certain, it’s the fact that this attack wasn’t a simple opportunistic hack; rather, it was a carefully plotted strike that could have potentially caused much more damage than it actually did. The only question left is, what was the intent of the attack?

What this shows us is that, for instance, an attack on the United States’ infrastructure, though improbable, is certainly a possibility. Researchers found that the systems used by the United States are actually less secure than the systems put into place by the Ukraine. In order to close up any potential for such a devastating attack, the FBI has begun a campaign that’s designed to raise awareness of the issue. This campaign includes briefings and other exercises geared toward informing electrical power companies of what the risks are.

As you might expect, the reason that these attacks are so effective nowadays is because the power infrastructure of the United States is aging. Digital security wasn’t a necessity back when the infrastructure was first established, but with the changing times, it becomes a possibility that must be prepared for. Therefore, it’s only a matter of time before some, with or without purpose, finds their way into the power grid and causes damage. As things stand now, there has been at least a dozen reported breaches of the power grid, so the possibility is very real.

What this shows us is that old technology components that aren’t designed for future threats can become outdated and risky to use. As always, we recommend that you always keep your organization’s technology as up-to-date as possible, and to take advantage of powerful security solutions designed to keep your systems secure from potential threats.

ClearView IT recommends that your organization implement a Unified Threat Management (UTM) solution. You can think of it as a convenient device that combines several enterprise-level technologies to keep your business safe from all manners of threats. To learn more, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Windows 10 Facebook Disaster Recovery Passwords Holiday Covid-19 Managed Service Apps IT Support Browser Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Gadgets Server Bandwidth WiFi Encryption Blockchain App Virtualization Mobile Device Management Business Technology Information Remote Spam Employee/Employer Relationship History Apple Information Technology Budget Gmail Office Two-factor Authentication Office 365 Health Access Control Analytics Data Security Cybercrime Wi-Fi BDR Big Data Conferencing Employer-Employee Relationship Cost Management Vendor Hacker Document Management Voice over Internet Protocol Remote Computing Compliance Patch Management Save Money Remote Monitoring Help Desk Hacking IT Management Training Applications Retail Money Alert Vulnerabilities Customer Service Legal Unified Threat Management Hiring/Firing Firewall Data storage Outlook Mobile Office Augmented Reality Password Word Managed Services IBM Website Data loss Project Management BYOD Computing Search... Vendor Management Hard Drive Best Practice Twitter VPN Law Enforcement End of Support Update Monitoring Social Printer Sports SaaS DDoS User Healthcare Remote Workers iPhone Education Cortana Paperless Office Windows 7 Free Resource Travel Antivirus Content Filtering Virtual Reality Chrome Maintenance Social Engineering Cryptocurrency Black Market How To Router Cleaning Mobile Computing Robot The Internet of Things Websites Windows 11 YouTube Marketing Mobility Meetings Running Cable Data Breach Laptop Google Maps Scam Storage Downtime Automobile Safety Cooperation Video Conferencing How To Tech Terms Microchip Virtual Machines Virtual Desktop Experience Flexibility Computer Repair Multi-factor Authentication Managed IT Digital HIPAA Professional Services Identity Theft Hack Notifications Saving Time Taxes Unified Communications Disaster Managed Services Provider Google Docs Computers Bitcoin Virtual Private Network Bluetooth Telephone Lithium-ion battery Distributed Denial of Service Office Tips Physical Security Current Events Private Cloud Memory Excel Solutions Processors PowerPoint Administration Start Menu Presentation Integration Downloads Politics Images 101 Computer Care Specifications Display Machine Learning Settings IT Consultant Vulnerability Virtual Assistant Solid State Drive Software as a Service Data Protection Employees Customer Relationship Management Avoiding Downtime Co-Managed IT Wireless Technology eWaste Entertainment Chromebook Drones Holidays Processor Username Environment Windows 8 Virtual Machine Heating/Cooling Corporate Profile Scams Reviews Social Networking Startup Optimization Freedom of Information Windows XP Knowledge email scam Teamwork Television Relocation Telephony Navigation 2FA Displays Employer Employee Relationship Addiction Advertising Data Storage Tech Support Mobile Security Hypervisor Work/Life Balance Cabling Tablet Cables User Tip Shopping G Suite Legislation News Medical IT Troubleshooting SQL Server Mouse VoIP Evernote Paperless Tracking Network Management PCI DSS Licensing In Internet of Things Hacks Point of Sale Proxy Server Gig Economy Network Congestion Web Server Emails Humor Fake News Computing Infrastructure Azure SharePoint Staffing Reliable Computing Business Communications Writing Digital Payment Service Level Agreement Internet Service Provider IP Address Worker Shortcuts Management Regulations Compliance Device security Managed IT Service Access Wireless Headphones Memes Microsoft Excel Business Owner Business Cards Scalability Time Management Tech Human Resources Public Cloud Going Green Net Neutrality Text Messaging Be Proactive Error Financial Data Proactive IT Administrator Audit Bring Your Own Device Spyware Bookmark Risk Management IT Download Piracy Recovery Term Google Apps Competition File Sharing Workplace Strategies Telework Music HTML Redundancy Microsoft 365 LiFi Cache Browsers Smartwatch Entrepreneur Nanotechnology Communitications Upload Procurement Inbound Marketing Software License Documents Unified Threat Management Google Play Application Workers Social Network FinTech Business Intelligence Botnet Printing Rental Service Data Analysis CES Micrsooft CCTV Screen Reader IT Assessment Trends Supply Chain Management Mobile Technology Value Securty Touchscreen Security Cameras Flash Domains Telephone Systems Smart Technology Customer Resource management Organization Business Growth Computer Malfunction Electronic Payment Devices Cyber security Emergency Tip of the week Vendor Mangement Fileless Malware Smart Devices Gamification Remote Working Company Culture Samsung Banking Uninterrupted Power Supply Telephone System AI Google Wallet Webcam Regulations Trend Micro Phone System Transportation Messenger Business Mangement Directions Digital Security Cameras Deep Learning Backup and Disaster Recovery Electronic Health Records Content Desktop Wasting Time Public Speaking Tablets Business Metrics Supply Chain Electronic Medical Records Hosted Solution Accountants eCommerce Modem Streaming Media Google Calendar Books Videos Keyboard Supercomputer Database Surveillance Society Managing Costs Computer Accessories Virus Hard Drives Language Workplace Health IT intranet Motion Sickness Equifax SSID Hard Drive Disposal Employer/Employee Relationships Comparison Wireless Reading Google Drive Media Shortcut Monitors Tactics Development Visible Light Communication

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?