| 
		 
		U.S. Energy Department helping power 
		firms defend against cyber attacks 
		
		 
		Send a link to a friend  
 
		
		
		 [July 08, 2017] 
		By Jim Finkle, Scott DiSavino and Timothy Gardner 
		 
		(Reuters) - The U.S. Department of Energy 
		said on Friday it is helping U.S. firms defend against a hacking 
		campaign that targeted power companies including at least one nuclear 
		plant, saying the attacks have not impacted electricity generation or 
		the grid. 
		 
		News of the attacks surfaced a week ago when Reuters reported that the 
		U.S. Department of Homeland Security and Federal Bureau of Investigation 
		issued a June 28 alert to industrial firms, warning them of hacking 
		targeting the nuclear, power and critical infrastructure sectors. 
		 
		"DOE is working with our government and industry partners to mitigate 
		any impact from a cyber intrusion affecting entities in the energy 
		sector," a Department of Energy representative said in an email to 
		Reuters. "At this time, there has been no impact to systems controlling 
		U.S. energy infrastructure. Any potential impact appears to be limited 
		to administrative and business networks." 
		 
		It was not clear who was responsible for the hacks. The joint report by 
		the DHS and the FBI did not identify the attackers, though it described 
		the hacks as "an advanced persistent threat," a term that U.S. officials 
		typically but not always use to describe attacks by culprits. 
		 
		The DOE discussed its response to the attacks after Bloomberg News 
		reported on Friday that the Wolf Creek nuclear facility in Kansas was 
		among at least a dozen U.S. power firms breached in the attack, citing 
		current and former U.S. officials who were not named. 
		
		  
		
		A representative with the Wolf Creek Nuclear Operating Corp declined to 
		say if the plant was hacked, but said it continued to operate safely. 
		 
		"There has been absolutely no operational impact to Wolf Creek. The 
		reason that is true is because the operational computer systems are 
		completely separate from the corporate network," company spokeswoman 
		Jenny Hageman said via email. 
		 
		A separate Homeland Security technical bulletin issued on June 28 
		included details of code used in a hacking tool that suggest the hackers 
		sought to use the password of a Wolf Creek employee to access the 
		network. 
		 
		Hageman declined to say if hackers had gained access to that employee's 
		account. The employee could not be reached for comment. 
		 
		The June 28 alert said that hackers have been observed using tainted 
		emails to harvest credentials to gain access to networks of their 
		targets. 
		 
		
            [to top of second column]  | 
            
             
            
			  
            
			A man types on a computer keyboard in front of the displayed cyber 
			code in this illustration picture taken on March 1, 2017. 
			REUTERS/Kacper Pempel/Illustration/File Photo 
            
			  
			"Historically, cyber actors have strategically targeted the energy 
			sector with various goals ranging from cyber espionage to the 
			ability to disrupt energy systems in the event of a hostile 
			conflict," the report said. 
			 
			David Lochbaum, a nuclear expert at the nonprofit group Union of 
			Concerned Scientists, said reactors have a certain amount of 
			immunity from cyber attacks because their operation systems are 
			separate from digital business networks. But over time it would not 
			be impossible for hackers to potentially do harm. 
			 
			"Perhaps the biggest vulnerability nuclear plants face from hackers 
			would be their getting information on plant designs and work 
			schedules with which to conduct a physical attack," Lochbaum said. 
			 
			The DOE said it has shared information about this incident with 
			industry, including technical details on the attack and mitigation 
			suggestions. 
			 
			"Security professionals from government and industry are working 
			closely to share information so energy system operators can defend 
			their systems," the agency representative said. 
			 
			Earlier, the FBI and DHS issued a joint statement saying "There is 
			no indication of a threat to public safety" because the impact 
			appears limited to administrative and business networks. 
			 
			The Nuclear Regulatory Commission has not received any notifications 
			of a cyber event that has affected critical systems at a nuclear 
			plant, said spokesman Scott Burnell. 
			 
			A nuclear industry spokesman told Reuters last Saturday that hackers 
			have never gained access to a nuclear plant. 
			 
			(Reporting by Jim Finkle in Toronto, Scott DiSavino in New York and 
			Timothy Gardner in Washington; Additional reporting by Dustin Volz 
			in Washington and Joseph Menn in San Francisco; Editing by Bernard 
			Orr) 
			
			[© 2017 Thomson Reuters. All rights 
			reserved.] 
			Copyright 2017 Reuters. All rights reserved. This material may not be published, 
			broadcast, rewritten or redistributed. 
			
			
			   |