Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hackers Target U.S. Nuclear Facilities, Energy Infrastructure: Major Attack Very Possible
Hotair ^ | 07/06/2017 | John Sexton

Posted on 07/07/2017 11:26:05 AM PDT by SeekAndFind

Since May, hackers have been attacking the U.S. energy infrastructure, including at least one company which manages a nuclear power plant in Kansas. The New York Times reported Thursday that the Department of Homeland Security and the FBI issued an urgent report about the attacks last week:

Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kan…

Wolf Creek officials said that while they could not comment on cyberattacks or security issues, no “operations systems” had been affected and that their corporate network and the internet were separate from the network that runs the plant…

Hackers wrote highly targeted email messages containing fake résumés for control engineering jobs and sent them to the senior industrial control engineers who maintain broad access to critical industrial control systems, the government report said.

The fake résumés were Microsoft Word documents that were laced with malicious code. Once the recipients clicked on those documents, attackers could steal their credentials and proceed to other machines on a network.

Who is behind these carefully planned attacks aimed at our energy sector? According to both the NY Times and Bloomberg, all signs point to Russia. “The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks,” Bloomberg reported late Thursday. Russia has previously attacked power grids in Ukraine so there is concern it may be trying to set up for a similar attack here in the U.S.:

The government said it was most concerned about the “persistence” of the attacks on choke points of the U.S. power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified…

“We’re moving to a point where a major attack like this is very, very possible,” [industrial control systems specialist Galina] Antova said. “Once you’re into the control systems — and you can get into the control systems by hacking into the plant’s regular computer network — then the basic security mechanisms you’d expect are simply not there.”

Just a couple weeks ago the Washington Post had a detailed report on President Obama’s response to the Russian interference in the election. It contained this paragraph:

Obama also approved a previously undisclosed covert measure that authorized planting cyber weapons in Russia’s infrastructure, the digital equivalent of bombs that could be detonated if the United States found itself in an escalating exchange with Moscow. The project, which Obama approved in a covert-action finding, was still in its planning stages when Obama left office. It would be up to President Trump to decide whether to use the capability.

It’s not clear how far along that process is at this point, but it does make me wonder if some of what we’re seeing from Russia is a response to Obama’s actions before leaving office (and to whatever Trump has done behind the scenes).

Finally, in addition to these two stories, CNN also published a story Thursday evening highlighting a recent uptick in Russian spying activity.

“Russians have maintained an aggressive collection posture in the US, and their success in election meddling has not deterred them,” said a former senior intelligence official familiar with Trump administration efforts…

Since the November election, US intelligence and law enforcement agencies have detected an increase in suspected Russian intelligence officers entering the US under the guise of other business, according to multiple current and former senior US intelligence officials. The Russians are believed to now have nearly 150 suspected intelligence operatives in the US, these sources said. Officials who spoke to CNN say the Russians are replenishing their ranks after the US in December expelled 35 Russian diplomats suspected of spying in retaliation for election-meddling.

All of this sounds genuinely bad and, at this point, I have no reason to doubt that either the hacking attempts, the increase in the number of actual spies entering the country, or Russia’s involement. As Mitt Romney once said (while progressives scoffed), Russia is our #1 geopolitical foe. You don’t have to give me the hard sell to convince me Putin is a villain.

Nevertheless, it seems like quite a coincidence that all three of these stories appeared the day before President Trump is scheduled to have his first meeting with Putin. Assuming these stories are true, President Trump already knows all about this. But the timing does make me wonder if this information is being leaked to the media in an attempt to apply some external pressure on the administration to get tougher with Putin.



TOPICS: News/Current Events; War on Terror
KEYWORDS: energy; hacking; infrastructure; nuclear

1 posted on 07/07/2017 11:26:05 AM PDT by SeekAndFind
[ Post Reply | Private Reply | View Replies]

To: SeekAndFind

The real question that needs to be asked is “Why are these facilities on the effing internet in the first place?”

When I was an engineer we had our company’s developer network on it’s own server without internet access. Problem solved. Impossible to hack if you aren’t connected.

Stupid governments.


2 posted on 07/07/2017 11:35:20 AM PDT by Seruzawa (FABOL)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Are we sure it’s not the uniparty and their swamp critters in the NSA/CIA/ETC doing the hacking!


3 posted on 07/07/2017 11:35:57 AM PDT by Harpotoo
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

I call bullshit.

Russia has no motive for shutting down the US power grid. Any damage to US infrastructure they believe they need to do could be done with their nukes.

However, the US Deep State has enormous motive for keeping the “Russia Hack” meme alive.

Simply apply Occam’s Razor.


4 posted on 07/07/2017 11:45:28 AM PDT by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Seruzawa

Actually, it IS possible to hack machines that are not connected to the Internet.

It was exposed in the book “No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State”.


5 posted on 07/07/2017 11:58:44 AM PDT by LurkedLongEnough
[ Post Reply | Private Reply | To 2 | View Replies]

To: SeekAndFind

With this report, the only thing more certain, would be if CNN were to report it, along with the NYT and Bloomberg. </sarc>


6 posted on 07/07/2017 12:13:42 PM PDT by A Formerly Proud Canadian (I once was blind but now I see...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Always enemy islam until demonstrated otherwise.

We really need to massively deport these sob’s.


7 posted on 07/07/2017 12:32:48 PM PDT by onedoug ( KEK)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
Commercial shipping is also at risk.

Snips from a gCaptain article about a British aircraft carrier having Windows XP for its operating system.

"While not as scary as nukes or a hacked carrier, as merchant ships become more integrated into global networks, there is an increasing risk of cyber-attacks on ships at sea. In 2013, a group of researchers from the University of Texas demonstrated how a ship might be taken over remotely when they “spoofed” the GPS navigation system on the $80 million yacht, White Rose of the Drachs. The yacht captain had no idea that the boat’s GPS system was sending false information to the autopilot.

While spoofing GPS is scary, there could be far worse to come. Hackers on land have given us a hint of what could be possible. In 2015, two hackers took control of a standard Jeep Cherokee through its communications system. From roughly ten miles away, they remotely turned the windshield wipers on and off, blasted the air conditioning and took over control of the radio. Finally, they disabled the accelerator and shut the car down. Chrysler had to recall 1.4 million vehicles to fix the vulnerability.

Something similar could happen to a modern merchant ship. Imagine pirates taking control without having to climb boarding ladders. Just as the hackers carried off a remote-controlled car-jacking with the Jeep, it may be possible to take over a ship through “spoofed” navigation and hijacked bridge and engine controls. This seems unlikely, yet may not be completely far-fetched.

Networking and automation solve many problems but can also create new risks. As some ship owners work toward remote-controlled or even autonomous ships, these risks could increase dramatically. One day, guarding against cyber-attacks may be thought of as just as much a part of ship operations as avoiding collisions and keeping off the rocks."

Cyber Security at Sea – Microsoft XP on Carriers, Hacking Tridents & Spoofing GPS

8 posted on 07/07/2017 12:36:18 PM PDT by Oatka
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
Hackers wrote highly targeted email messages containing fake résumés for control engineering jobs and sent them to the senior industrial control engineers who maintain broad access to critical industrial control systems, the government report said. The fake résumés were Microsoft Word documents that were laced with malicious code. Once the recipients clicked on those documents, attackers could steal their credentials and proceed to other machines on a network.

This is yet another reason why companies should use third-party employment agencies and reject all direct applicants.

9 posted on 07/07/2017 12:57:28 PM PDT by Lazamataz (The "news" networks and papers are bitter, dangerous enemies of the American people.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Talk about working yourself out of a job...
Worst case.. total chaos and mayhem.

So... they will be staring at a blank screen while thugs, gangbangers, jihadists, rogues of every manner run roughshod all over.. Including you!

Oops..
Code and leet speak wont help you now.


10 posted on 07/07/2017 1:20:25 PM PDT by CygnusXI
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
Wolf Creek officials said that while they could not comment on cyberattacks or security issues, no “operations systems” had been affected and that their corporate network and the internet were separate from the network that runs the plant…

So let me get this straight. It has nothing to do with the operation network, but they could take over the power plant?

11 posted on 07/07/2017 1:33:03 PM PDT by Big Giant Head
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson