The seven young men sitting before some of Capitol Hill’s most powerful lawmakers weren’t graduate students or junior analysts from some think tank. No, Space Rogue, Kingpin, Mudge and the others were hackers who had come from the mysterious environs of cyberspace to deliver a terrifying warning to the world.
The making of a vulnerable Internet: This story is the third of a multi-part project on the Internet’s inherent vulnerabilities and why they may never be fixed.
Your computers, they told the panel of senators in May 1998, are not safe — not the software, not the hardware, not the networks that link them together. The companies that build these things don’t care, the hackers continued, and they have no reason to care because failure costs them nothing. And the federal government has neither the skill nor the will to do anything about it.
First it was a cutoff of Russian natural gas, now Ukraine faces Moscow’s suspension of coal deliveries as winter approaches. As a result, Kiev has been forced to declare a state of emergency in its electricity market as it faces the onset of a dark, frigid winter.
Historically, Ukraine has been self-sufficient in coal, but fighting between government forces and pro-Russian separatists in eastern Ukraine’s Donetsk and Luhansk regions has closed more than half the coal mines there and shut down rail lines needed to ship coal to power plants, according to Europe’s coal association, Eurocoal.
Because of the fighting, Ukraine had been relying on coal from Russia, but on Nov. 24 its largest energy company, DTEK, said Moscow had suspended those imports three days earlier. Ukraine has imported about 1.3 million tons of Russian coal since August. Continue reading
WASHINGTON – U.S. and European energy companies have become the target of a “Dragonfly” virus out of Eastern Europe that goes after energy grids, major electricity generation firms, petroleum pipelines operators and energy industrial equipment providers.
Unearthed by the cyber security firm Symantec, Dragonfly has been in operation since at least 2011. Its malware software allows its operators to not only monitor in real time, but also disrupt and even sabotage wind turbines, gas pipelines and power plants – all with the click of a computer mouse.
The attacks have disrupted industrial control system equipment providers by installing the malware during downloaded updates for computers running the ICS equipment. Continue reading
Two power plants in the US were affected by malware attacks in 2012, a security authority has said.
In its latest quarterly newsletter, the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) said “common and sophisticated” attacks had taken place.
Malware had infected each plant’s system after being inadvertently brought in on a USB stick, it said. Continue reading