https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


peshkov / iStock / Thinkstock

Laptop

Russian Hacking Code Found in Vermont Power Utility Computer

The utility laptop was hit with malware but wasn't hooked up to the power grid at the time of the attack.
  • Written by Bloomberg News
  • 4th January 2017

Computer code connected to Russian cyberattacks by U.S. intelligence agencies has been found in a laptop computer at a Vermont electric utility, a development that emerged a day after the Obama administration hit Russia with sanctions for hacking during this year’s U.S. election.

The laptop wasn’t connected to the power grid at the time, the Burlington Electric Department said in a statement on Friday. It said it scanned its computer network and found the malware after the U.S. Department of Homeland Security sent out an alert about the code to owners and operators of critical infrastructure.

Related: Russian Hackers Probably Didn't Target Burlington Electric

“We took immediate action to isolate the laptop and alerted federal officials of this finding,” utility spokesman Mike Kanarick said in the statement. “Our team is working with federal officials to trace this malware and prevent any other attempts to infiltrate utility systems. We have briefed state officials and will support the investigation fully.”

Such a breach has long been a concern for the U.S. because knocking out a power grid could cause widespread disruptions and hamper police, fire and medical responders. For that reason, computers at utilities are routinely checked for intrusions.

Vermont elected officials denounced the Russian hacking.

‘Manipulate the Grid’

“This is beyond hackers having electronic joy rides — this is now about trying to access utilities to potentially manipulate the grid and shut it down in the middle of winter,” Senator Patrick Leahy said in a statement on Friday. “That is a direct threat to Vermont and we do not take it lightly.”

Governor Peter Shumlin and Representative Peter Welch also issued statements.

There was no indication of compromise to customer information or to the security of its system, Burlington Electric General Manager Neale Lunderville said in a note on the municipally-owned utility’s website. Burlington Electric serves about 16,000 residential customers and more than 3,600 commercial customers in Vermont’s largest city.

U.S. intelligence agencies have identified the code that the utility found as one used in what they call operation “Grizzly Steppe,” a far-reaching Russian operation to interfere with November’s presidential election. President Barack Obama’s administration on Thursday slapped sanctions on Russia for the intrusion and ordered the expulsion of 35 Russian operatives.

Read more about how the U.S. says the Russian hacking began.

While lawmakers of both parties have backed Obama’s actions, President-elect Donald Trump has expressed skepticism at the conclusion of intelligence agencies that Russia was behind the hacking and release of e-mails in an effort to damage his campaign opponent, Democrat Hillary Clinton.

“I just want them to be sure because it’s a pretty serious charge,” Trump said Saturday night in Palm Beach at his Mar-a-Lago resort’s New Year’s Eve party. “When you look at the weapons of mass destruction — that was a disaster and they were wrong, and so I want them to be sure. I think it’s unfair if they don’t know.”

Trump has pledged to improve relations with Russian President Vladimir Putin, whose government has denied it was behind the hacking. He praised Putin on Twitter Friday for not retaliating against the U.S. sanctions, saying “I always knew he was very smart!”

On Saturday night, the president-elect said: “Hopefully we’re going to have great relationships with many countries — and that includes Russia and it includes China.”

Homeland Security confirmed it shared technical information with owners of critical U.S. infrastructure to aid them in identifying code involved in Grizzly Steppe. The discovery of the code by a Vermont utility was reported earlier by the Washington Post.

It’s not the first time Russia has been linked to to a cyber attack on a utility. Hackers broke into computers at a utility control center in western Ukraine in December 2014 and shut down substations throughout the region, leaving tens of thousands of people without power. U.S. Senate Armed Services Committee Chairman John McCain, a Republican from Arizona, has said Russia was behind the breach.

Tags: Article Security Technologies

Related


  • IoT security
    Protecting Your Network Against Ripple20 Vulnerabilities
    Early this year, Ripple20 wrought havoc on numerous IoT devices, given vulnerable third-party code. Here are ways to prevent your organization from the fallout.
  • IoT security
    IoT Security Trends, 2021: COVID-19 Casts Long Shadow
    While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.
  • Five Principles in a Zero-Trust Security Approach to IoT
    IoT devices have created vulnerability for IT networks, but a zero-trust security approach can lock down attack vectors. Here are five key principles.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic
  • In Industrial Realm, Trustworthy Software Means Safety

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

Zero Trust Manufacturing: Navigating Complex Supply Chains to Build Trusted IoT Devices

27th January 2021

IoTConnect and How to Get Started

27th January 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

#IoTpentesting is critical as #IoTdevices proliferate and #edgecomputing becomes the norm. dlvr.it/RrWr0Y https://t.co/LsMH1VJJFk

28th January 2021
IoTWorldToday, IoTWorldSeries

Zero Trust Manufacturing: Navigating Complex Supply Chains to Build Trusted IoT Devices dlvr.it/RrTDP4 https://t.co/fuH0GrHJrX

27th January 2021
IoTWorldToday, IoTWorldSeries

PKI: The Solution for Designing Secure IoT Devices dlvr.it/RrTDNF https://t.co/KBWcsksAQi

27th January 2021
IoTWorldToday, IoTWorldSeries

Five Guiding Tenets for IoT Security dlvr.it/RrTDGS https://t.co/Ss17Vn4sFw

27th January 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD Silver Sponsor @ONETech_AI! 💡 Learn more about sponsoring Embedded IoT World here:… twitter.com/i/web/status/1…

27th January 2021
IoTWorldToday, IoTWorldSeries

IoTConnect and How to Get Started dlvr.it/RrT1gl https://t.co/6Vci1hvOV2

27th January 2021
IoTWorldToday, IoTWorldSeries

RT @IoTWorldToday: #IoTsecuritytrends in 2021 will feature new threats given #remotework, #digitalhealth and #edgecomputing. https://t.co/S…

27th January 2021
IoTWorldToday, IoTWorldSeries

#IoTsecuritytrends in 2021 will feature new threats given #remotework, #digitalhealth and #edgecomputing.… twitter.com/i/web/status/1…

25th January 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X