US Hackers Penetrate Russia's Electric Grid

The New York Times has published a news story which claims that the US military hackers have been attacking Russian power plants while  Russian sources have  said it is possible that its electrical grid has been and contiues to be under cyber-attack by the US.

Kremlin spokesman Dmitry Peskov said reports that US cyber-soldiers had put computer viruses on its electrical grid was a "hypothetical possibility". 

In its report the newspaper said American "code" had been deployed inside many elements of Russia's power network. Mr Peskov said President Trump had dismissed the allegations made in the Times, calling them "fake news".  Donald Trump has erupted in fury describing the article as a “virtual act of treason”.

According to a three-month investigation by the New York Times says that sophisticated malware has been implanted into Russia’s electricity system.

The Kremlin spokesman added: "If one assumes that some government agencies do this without informing the head of state, then of course this may indicate that cyber-war against Russia might be a hypothetical possibility." He said "vital areas" of Russia's economy were under continuous attack, but it had managed to counter the intrusions so they did no damage.

The NYT story was questioned by Thomas Rid, a political scientist from the Johns Hopkins School of Advanced International Studies, who said it made no sense because "publicity burns capabilities". 

The story would prompt Russia to search its power network extensively for malicious code, he said, making it likely that any viruses would be found. He added that the Russian power grid was big and "exceedingly complex" making it very hard for cyber-attackers to get in and leave any virus in place for a long time.

The malicious code was reportedly inserted by soldiers of the US Cyber Command. This group of military hackers is permitted to carry out "clandestine military activity" on computer networks under the aegis of the National Defense Authorisation Act, which was passed in 2018.

The US has been probing Russian power systems since 2012, reported the NYT, but was now more interested in finding weaknesses and inserting viruses.

BBC:         Telegraph:          Guardian

You Might Also Read: 

A New Age of Warfare:

The New Sophistication Of Nation-State Hacking:

 

 

« SMEs Need A Disaster Recovery Plan
Alarming Trends In Data Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Dectar

Dectar

Dectar (formerly 4Securitas) is a cybersecurity company that provides solutions that predict, detect, defend and react against cybersecurity threats.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

CRYPTIQ

CRYPTIQ

CRYPTIQ empowers businesses to navigate the ever-evolving cybersecurity landscape with confidence and clarity.