electric grid (4)

8574928466?profile=RESIZE_400xActivity Summary - Week Ending 19 February 2021:

  • VW Jetta Headlights VACAR-CN
  • Cheyenne Cloud Shards & C2 Compromise
  • Red Sky Alliance identified 37,941 connections from new unique IP addresses
  • Analysts identified 2,217 new IP addresses participating in various Botnets
  • Bazar/Team9 and MS
  • TX Wind Power Turbines Freeze
  • France and the Sandworm Group
  • Norway Oil worker’s Strike Averted
  • Major Oil find offshore in South Africa, Looks to Govt for Approval

Link to full article:  IR-21-050-001_Energy_050F

8326228084?profile=RESIZE_400xWith the new incoming US government and other international countries looking seriously at renewable energy sources; so are hackers, who are no fools and are researching ways to compromise the future of energy.  The ‘rush’ to renewable energy technology may open multiple cybersecurity threats and vulnerabilities if caution is not placed on cyber security and these energy source developments. 

Quick developing solar and wind technologies present new risks to power grid security, especially as sma

6710390901?profile=RESIZE_400xThe electric grid is so important to any country’s national security and thus the high importance of keeping the electricity flowing.  Even an outage of only a few minutes can wreak havoc on any residence or business.  Cyber attackers responsible for distributing LookBack malware are targeting US utility providers with a new threat called “FlowCloud.”  The FlowCloud modular remote-access trojan (RAT) has similarities and connections to the LookBack malware.  The LookBack at its core is a remote

4962311081?profile=RESIZE_400xA US federal executive order was issued on 1 May 2020 which proposes to “monitor and replace” any US power grid equipment made by its foreign adversaries.  Security professional said it would mainly affect Chinese-made products like electrical transformers.  The US Department of Energy (DOE) stated under the current US procurement rules, contracts are awarded to the lowest bidder when it comes to bulk power system procurement.  That creates a "vulnerability that can be exploited by those with ma