SOLARWINDS HACK INFECTED CRITICAL INFRASTRUCTURE, INCLUDING POWER INDUSTRY
The companies involved used compromised software, but it’s not clear if hackers entered their networks. Finding out could be difficult.
Kim Zetter
December 24 2020, 1:33 p.m.
THE HACKING CAMPAIGN that infected numerous government agencies and tech companies with malicious SolarWinds software has also infected more than a dozen critical infrastructure companies in the electric, oil, and manufacturing industries who were also running the software, according to a security firm conducting investigations of some of the breaches.
In addition to the critical infrastructure companies, the SolarWinds software also infected three firms that provide services for such companies, says Rob Lee, CEO of Dragos, Inc., which specializes in industrial control system security and discovered some of the infections.
...snip...
https://theintercept.com/2020/12/24/solarwinds-hack-power-infrastructure/
G. K. ChesterBelloc
G. K. ChesterBelloc
@ChesterBelloc
12h
·
·
Edited
“A retired general or admiral from the US military would not be able to buy property outside Beijing, put up a wind farm, and connect to the Chinese grid...
What is scary about that [in the US] is that if you become a provider, all the updates about attacks to our energy grid that CPS energy gets to [defend the grid], that could potentially go to an adversary as well.”
Rep Will Hurd (R), TX-District 23
8/24/2020