Hackers working for a foreign government recently breached at least a dozen U.S. power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former U.S. officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.
The competitors could be positioning themselves to eventually disrupt the nation’s power supply, alerted the officials, who noted that a general alert was distributed to utilities a week ago. Adding to those concerns, hackers lately infiltrated an unidentified company that attains control systems for equipment used in the power industry, an attack that officials believe may be related.
The chief suspect is Russia, according to three people familiar with the continuing great efforts to eject the hackers from the computer networks. One of those networks belongs to an aging nuclear producing facility known as Wolf Creek — owned by Westar Energy Inc ., Great Plains Energy Inc. and Kansas Electric Power Cooperative Inc. — on a pond coast near Burlington, Kansas.
The possibility of a Russia connection is especially worrisome, former and current officials say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools to disrupt power supplies.
The hacks come as international tensions have flared over U.S. intelligence agencies’ conclusion that Russia tried to influence the 2016 general elections. The U.S ., which has several continuing investigations into Russia’s activities, are aware of possess digital weapons capable of disrupting the electricity grids of rival nations.
It is uncertain whether President Donald Trump was planning to address the cyberattacks at his meeting on Friday with President vladimir putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilizing activities” and advised the country to join “the community of responsible nations.”
The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector.
” There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks ,” the government agencies said in a joint statement.
Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. The New York Times reported that hackers were targeting nuclear power stations earlier.
The North American Electric Reliability Corp ., a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.” At this time, there has been no bulk power system impact in Northern america ,” the corporation said in an emailed statement.
In addition, the operational controls at Wolf Creek were not penetrated, according to government officials. “There was utterly no operational impact to Wolf Creek, ” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News. “The reason that is true is because the operational computer systems are completely separate from the corporate network.”
Determining who is behind an attack can be tricky. Government officials look at the sophistication of appropriate tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities. Representatives of the Russian Embassy didn’t immediately respond to emails attempting comment.
Several private security firms are studying data on the attacks, but none has linked the work to a particular hacking team or country.
“We don’t tie this to any known group at this phase, ” told Sean McBride, a lead analyst for FireEye Inc ., a global cybersecurity firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”
U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective answer among several private utilities, state and local officials, and industry regulators.
Specialized squads from Homeland Security and the FBI have been scrambled to help untangle the hackers from the power station, in some cases without informing local and state officials. Meanwhile, the U.S. National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to encompass their tracks.
Many of the power plant are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger security systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.
Homeland Security and the FBI sent out a general warn about the cyberattack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the U.S. power supply. That speech indicates hackers are trying to establish backdoors on the plants’ systems for subsequently use, according to a former senior DHS official who asked not to be identified.
Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and interrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specializes in securing industrial control systems.
“We’re moving to a phase where a major attack like this is very, very possible, ” Antova said. “Once you’re into the control systems — and you can get into the control systems by hacking into the plant’s regular computer network — then the basic security mechanisms you’d expect are simply not there.”
The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down merely by taking out the secondary systems that are connected to the grid, ” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.
The operating systems at nuclear plants also tend to be legacy controls constructed decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that various kinds of assault, ” Lyman said.
The alert sent out last week unwittingly identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior technologist. A U.S. official recognise the error was not caught until after the alert was distributed.
According to a security researcher who has insured research reports, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.
The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.
Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least “ve been looking all over for” ways to do so, the expert said.
Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and kine pastures, said he learned about a cyber threat at the plant only recently, and then merely through golfing buddies.
With a population of just 2,700, Burlington boasts their home communities pond with three water slides and a high school football stadium that would be the bitternes of any junior college. Luke said those amenities result back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.
E& E News first reported on digital attacks targeting U.S. nuclear plants, adding it was code-named Nuclear 17. A senior U.S. official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.
Industry experts and U.S. officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, indicating the hackers are testing methods.
Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, told utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the U.S. government issued the latest warning to “energy and critical manufacturing sectors.” The current threat is unrelated to lately publicized ransomware incidents or the CrashOverride malware, Aaronson said in an emailed statement.
Neither attack in the Ukraine caused long-term injury. But with each escalation, the hackers may be gauging the world’s willingness to push back.
“If you think about a typical war, some of the purposes of the act that have been taken against critical infrastructure in Ukraine and even in the U.S ., those would be considered crossing red lines, ” Antova said.