Santa Fe New Mexican

Russians are chief suspects in U.S. power plant cyberattac­ks

Country took down electrical grid in Ukraine

- By Michael Riley, Jennifer A. Dlouhy and Bryan Gruley

Hackers working for a foreign government recently breached at least a dozen U.S. power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former U.S. officials, sparking concerns the attackers were searching for vulnerabil­ities in the electrical grid.

The rivals could be positionin­g themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert was distribute­d to utilities a week ago. Adding to those concerns, hackers recently infiltrate­d an unidentifi­ed company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an aging nuclear generating facility known as Wolf Creek — owned by Westar Energy Inc., Great Plains Energy Inc. and Kansas Electric Power Cooperativ­e Inc. — on a lake shore near Burlington, Kan.

The possibilit­y of a Russia connection is particular­ly worrisome, former and current officials say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasing­ly advanced tools to disrupt power supplies.

The hacks come as internatio­nal tensions have flared over U.S. intelligen­ce agencies’ conclusion that Russia tried to influence the 2016 presidenti­al election. The U.S., which has several continuing investigat­ions into Russia’s activities, is known to possess digital weapons capable of disrupting the electricit­y grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvemen­t.

The Department of Homeland Security and FBI said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

The Department of Energy said the impact appears limited to administra­tive and business networks and said it was working with utilities and grid operators to enhance security and resilience.

Representa­tives of the National Security Council, the Director of National Intelligen­ce and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government,

The New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliabilit­y Corp., a nonprofit that works to ensure the reliabilit­y of the continent’s power system, said it was aware of the incident and was exchanging informatio­n with the industry through a secure portal. “At this time, there has been no bulk power system impact in North America,” the corporatio­n said in an emailed statement.

In addition, the operationa­l controls at Wolf Creek were not pierced, according to government officials.

Determinin­g who is behind an attack can be tricky. Government officials look at the sophistica­tion of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyberactiv­ities.

Several private security firms are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc., a global cybersecur­ity firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

U.S. intelligen­ce officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneo­usly at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Many of the power plants are convention­al, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyberattac­k to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistenc­e” of the attacks on choke points of the U.S. power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior Department of Homeland Security official who asked not to be identified.

Those backdoors can be used to insert software specifical­ly designed to penetrate a facility’s operationa­l controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialize­s in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems — and you can get into the control systems by hacking into the plant’s regular computer network — then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadverten­tly identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credential­s of a plant employee, a senior engineer. A U.S. official acknowledg­ed the error was not caught until after the alert was distribute­d.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s systems.

Industry experts and U.S. officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the U.S. government issued the latest warning to “energy and critical manufactur­ing sectors.” The current threat is unrelated to recently publicized ransomware incidents or the CrashOverr­ide malware, Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingnes­s to push back.

Determinin­g who is behind an attack can be tricky. Government officials look at the sophistica­tion of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyberactiv­ities.

Newspapers in English

Newspapers from United States