U.S. Energy Department helping power
firms defend against cyber attacks
Send a link to a friend
[July 08, 2017]
By Jim Finkle, Scott DiSavino and Timothy Gardner
(Reuters) - The U.S. Department of Energy
said on Friday it is helping U.S. firms defend against a hacking
campaign that targeted power companies including at least one nuclear
plant, saying the attacks have not impacted electricity generation or
the grid.
News of the attacks surfaced a week ago when Reuters reported that the
U.S. Department of Homeland Security and Federal Bureau of Investigation
issued a June 28 alert to industrial firms, warning them of hacking
targeting the nuclear, power and critical infrastructure sectors.
"DOE is working with our government and industry partners to mitigate
any impact from a cyber intrusion affecting entities in the energy
sector," a Department of Energy representative said in an email to
Reuters. "At this time, there has been no impact to systems controlling
U.S. energy infrastructure. Any potential impact appears to be limited
to administrative and business networks."
It was not clear who was responsible for the hacks. The joint report by
the DHS and the FBI did not identify the attackers, though it described
the hacks as "an advanced persistent threat," a term that U.S. officials
typically but not always use to describe attacks by culprits.
The DOE discussed its response to the attacks after Bloomberg News
reported on Friday that the Wolf Creek nuclear facility in Kansas was
among at least a dozen U.S. power firms breached in the attack, citing
current and former U.S. officials who were not named.

A representative with the Wolf Creek Nuclear Operating Corp declined to
say if the plant was hacked, but said it continued to operate safely.
"There has been absolutely no operational impact to Wolf Creek. The
reason that is true is because the operational computer systems are
completely separate from the corporate network," company spokeswoman
Jenny Hageman said via email.
A separate Homeland Security technical bulletin issued on June 28
included details of code used in a hacking tool that suggest the hackers
sought to use the password of a Wolf Creek employee to access the
network.
Hageman declined to say if hackers had gained access to that employee's
account. The employee could not be reached for comment.
The June 28 alert said that hackers have been observed using tainted
emails to harvest credentials to gain access to networks of their
targets.
[to top of second column] |

A man types on a computer keyboard in front of the displayed cyber
code in this illustration picture taken on March 1, 2017.
REUTERS/Kacper Pempel/Illustration/File Photo

"Historically, cyber actors have strategically targeted the energy
sector with various goals ranging from cyber espionage to the
ability to disrupt energy systems in the event of a hostile
conflict," the report said.
David Lochbaum, a nuclear expert at the nonprofit group Union of
Concerned Scientists, said reactors have a certain amount of
immunity from cyber attacks because their operation systems are
separate from digital business networks. But over time it would not
be impossible for hackers to potentially do harm.
"Perhaps the biggest vulnerability nuclear plants face from hackers
would be their getting information on plant designs and work
schedules with which to conduct a physical attack," Lochbaum said.
The DOE said it has shared information about this incident with
industry, including technical details on the attack and mitigation
suggestions.
"Security professionals from government and industry are working
closely to share information so energy system operators can defend
their systems," the agency representative said.
Earlier, the FBI and DHS issued a joint statement saying "There is
no indication of a threat to public safety" because the impact
appears limited to administrative and business networks.
The Nuclear Regulatory Commission has not received any notifications
of a cyber event that has affected critical systems at a nuclear
plant, said spokesman Scott Burnell.
A nuclear industry spokesman told Reuters last Saturday that hackers
have never gained access to a nuclear plant.
(Reporting by Jim Finkle in Toronto, Scott DiSavino in New York and
Timothy Gardner in Washington; Additional reporting by Dustin Volz
in Washington and Joseph Menn in San Francisco; Editing by Bernard
Orr)
[© 2017 Thomson Reuters. All rights
reserved.]
Copyright 2017 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
 |