December 2015 Ukraine Power Grid Cyberattack
   HOME
*





December 2015 Ukraine Power Grid Cyberattack
On December 23, 2015, the power grid in two western oblasts of Ukraine was hacked, which resulted in power outages for roughly 230,000 consumers in Ukraine for 1-6 hours. The attack took place during the ongoing Russo-Ukrainian War (2014-present) and is attributed to a Russian advanced persistent threat group known as " Sandworm". It is the first publicly acknowledged successful cyberattack on a power grid. Description On 23 December 2015, hackers using the BlackEnergy 3 malware remotely compromised information systems of three energy distribution companies in Ukraine and temporarily disrupted the electricity supply to consumers. Most affected were consumers of Prykarpattyaoblenergo ( uk, Прикарпаттяобленерго; servicing Ivano-Frankivsk Oblast): 30 substations (7 110kv substations and 23 35kv substations) were switched off, and about 230,000 people were without electricity for a period from 1 to 6 hours. At the same time, consumers of two other energy distribu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Power Grid
An electrical grid is an interconnected network for electricity delivery from producers to consumers. Electrical grids vary in size and can cover whole countries or continents. It consists of:Kaplan, S. M. (2009). Smart Grid. Electrical Power Transmission: Background and Policy Issues. The Capital.Net, Government Series. Pp. 1-42. * power stations: often located near energy and away from heavily populated areas * electrical substations to step voltage up or down * electric power transmission to carry power long distances * electric power distribution to individual customers, where voltage is stepped down again to the required service voltage(s). Grids are nearly always synchronous, meaning all distribution areas operate with three phase alternating current (AC) frequencies synchronized (so that voltage swings occur at almost the same time). This allows transmission of AC power throughout the area, connecting a large number of electricity generators and consumers and potential ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Modem
A modulator-demodulator or modem is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio. A modem transmits data by Modulation#Digital modulation methods, modulating one or more carrier wave signals to encode digital information, while the receiver Demodulation, demodulates the signal to recreate the original digital information. The goal is to produce a Signal (electronics), signal that can be transmitted easily and decoded reliably. Modems can be used with almost any means of transmitting analog signals, from light-emitting diodes to radio. Early modems were devices that used audible sounds suitable for transmission over traditional telephone systems and leased lines. These generally operated at 110 or 300 bits per second (bit/s), and the connection between devices was normally manual, using an attached telephone handset. By the 1970s, higher speeds of 1,200 and 2,400  ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Power Outages
A power outage (also called a powercut, a power out, a power failure, a power blackout, a power loss, or a blackout) is the loss of the electrical power network supply to an end user. There are many causes of power failures in an electricity network. Examples of these causes include faults at power stations, damage to electric transmission lines, substations or other parts of the distribution system, a short circuit, cascading failure, fuse or circuit breaker operation. Power failures are particularly critical at sites where the environment and public safety are at risk. Institutions such as hospitals, sewage treatment plants, and mines will usually have backup power sources such as standby generators, which will automatically start up when electrical power is lost. Other critical systems, such as telecommunication, are also required to have emergency power. The battery room of a telephone exchange usually has arrays of lead–acid batteries for backup and also a socket f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


2015 In Ukraine
The following lists events that happened during 2015 in Ukraine. Events January * January 3 - An image of a BPM-97 apparently inside Ukraine, in Luhansk, appeared to deliver further evidence of Russian military vehicles inside Ukraine. * January 6 - A military truck collides with a bus carrying members of the National Guard of Ukraine killing 12 soldiers and injuring 20 others. * January 13 - A passenger bus is fired upon by rebels at a check point in eastern Ukraine. At least ten civilians were killed and many others injured. * January 22 - An explosion on a civilian bus in the city of Donetsk kills thirteen people. Separatists and pro-government forces blame each other for the incident. * January 24 - An attack on an open-air market in Mariupol, Ukraine leaves at least 27 people killed and more than 90 injured. The pro-Russian rebel leader, Alexander Zakharchenko, announces an offensive on Mariupol. February * February 7 - The leaders of France, Germany and Russia agree to w ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cyberattacks On Energy Sector
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organisations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyberweapon, cyber weapon. Cyber attacks have increased with an alarming rate for the last few years A cyberattack may steal, alter, or destroy a specified target by Security hacker, hacking into a susceptible system. Cyberattacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations. Legal experts are seekin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ICS-CERT
The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Specifically, US-CERT is a branch of the Office of Cybersecurity and Communications' (CS&C) National Cybersecurity and Communications Integration Center (NCCIC). US-CERT is responsible for analyzing and reducing cyber threats, vulnerabilities, disseminating cyber threat warning information, and coordinating incident response activities. The division brings advanced network and digital media analysis expertise to bear on malicious activity targeting the networks within the United States and abroad. Background The concept of a national Computer Emergency Response Team (CERT) for the United States was proposed by Marcus Sachs (Auburn University) when he was a staff member for the U.S. National Security Council in 2002 to be a peer organization with other national CERTs such as AusCERT and C ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


FireEye
Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks. In March 2021, Symphony Technology Group (STG) announced its acquisition of McAfee Enterprise in an all-cash transaction for $4.0 billion. STG completed the acquisition of McAfee’s Enterprise business in July 2021 with plans for re-branding. In June 2021, FireEye sold its name and products business to STG for $1.2 billion. STG combined FireEye with its acquisition of McAfee's enterprise business to launch Trellix, an extended detection and response (XDR) company. Meanwhile, McAfee Enterprise's security service edge (SSE) business would operate as a separate company to be known as Skyhigh Security. History FireEye was founded in 2004 by Ashar Az ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Booz Allen Hamilton
Booz Allen Hamilton Holding Corporation (informally Booz Allen) is the parent of Booz Allen Hamilton Inc., an American management and information technology consulting firm, headquartered in McLean, Virginia, in Greater Washington, D.C., with 80 other offices around the globe. The company's stated core business is to provide consulting, analysis and engineering services to public and private sector organizations and nonprofits. History Beginnings The company that was to become Booz Allen was founded in 1914, in Evanston, Illinois, when Northwestern University graduate Edwin G. Booz founded the ''Business Research Service.'' The service was based on Booz's theory that companies would be more successful if they could call on someone outside their own organizations for expert, impartial advice.Booz Allen History
Boozallen.com. Retrieved on ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Cyberwarfare By Russia
Cyberwarfare by Russia includes denial of service attacks, hacker attacks, dissemination of disinformation and propaganda, participation of state-sponsored teams in political blogs, internet surveillance using SORM technology, persecution of cyber-dissidents and other active measures. According to investigative journalist Andrei Soldatov, some of these activities were coordinated by the Russian signals intelligence, which was part of the FSB and formerly a part of the 16th KGB department.State control over the internet
, a talk show by at the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


2017 Cyberattacks On Ukraine
A series of powerful cyberattacks using the Petya malware began on 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms. Similar infections were reported in France, Germany, Italy, Poland, Russia, United Kingdom, the United States and Australia. ESET estimated on 28 June 2017 that 80% of all infections were in Ukraine, with Germany second hardest hit with about 9%. On 28 June 2017, the Ukrainian government stated that the attack was halted. On 30 June 2017, the Associated Press reported experts agreed that Petya was masquerading as ransomware, while it was actually designed to cause maximum damage, with Ukraine being the main target. Approach Security experts believe the attack originated from an update of a Ukrainian tax accounting package called MeDoc (), developed by Intellect Service. MeDoc was widely used among tax accountants in Ukraine, and the software was the main option for accounting for othe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Ukrenergo
Ukrenergo ( uk, ПрАТ «Національна енергетична компанія "Укренерго"», literally 'National Power Company "Ukrenergo"') is an electricity transmission system operator in Ukraine and the sole operator of the country's high-voltage transmission lines. It is 100% owned by Ukrainian government (Ministry of Energy). The territory of the Soviet Union was integrated into the IPS/UPS synchronous grid, which is now effectively controlled by Russia. The one exception was the "Burshtyn Power Island", centered on the Burshtyn TES, which in 2003 was connected to the synchronous grid of Continental Europe, controlled by the European Network of Transmission System Operators for Electricity (ENTSO-E). Ukraine continued this arrangement until the annexation of Crimea by the Russian Federation in 2014, after which Ukraine signed an association agreement with EU. On 28 June 2017, an agreement was signed to synchronize the whole Ukrainian power grid with t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]