Forester Network | By: Laura Sanchez | GPE – July 21, 2017:

It began innocently enough—a resume sent via email in Microsoft Word document format. But what transpired once power plant managers opened the files was unquestionably sinister.

Originally posted July 10, 2017: Authorities report that since May 2017, hackers have targeted the computer networks of several companies that manage and operate and energy facilities throughout the US. But last week, Wolf Creek Nuclear Operating Corporation, a Kansas nuclear power plant management firm was one of them.

A joint report recently issued by the Department of Homeland Security and the Federal Bureau of Investigation indicates that the plant’s cyber security barriers were breached. The infiltration attempt targeted personnel with system access credentials in an effort to map out computer networks for future attacks—situations that could lead to dangerous explosions, fires, or material spills.

Electric grids are evolving rapidly, disrupted by regulatory changes, distributed generation, renewable portfolio standards, and evolving technology. Energy storage is uniquely positioned at the heart of all of this change.

In response, the agencies issued an urgent amber warning, the second highest threat level rating. Plant officials were quick to explain, however, that operational controls were not at all compromised. The plant and its surrounding community are safe.

Although the origin of the attack is unknown, cybercrime experts indicate that the techniques used are similar to those of an organization known as “Energetic Bear,” a Russian hacking group linked to energy industry cybersecurity breaches since 2012.

To read full article – please click here.