Security risk to 'smart grids'

Malware could be used to takeover smart grids, security experts have warned.

Just when you thought we might be getting a handle on internet viruses, worms and other malware, here comes an electrical "smart grid" that could be hacked with even more devastating consequences, warn security experts familiar with the new systems.

Composed of a dense IT network set up to monitor everything from individual appliances to entire power plants, the energy smart grid promises to bring unparalleled efficiency to the American electrical system.

Advertisement - Article continues below

"Boosted in large part by $4.5 billion (3.05 billion) in economic stimulus funding, the smart grid offers huge potential both for significant energy conservation and for chilling the 1960s grid technology and bring it into the 21st century," said Josh Pennell, president and chief executive of IOActive, a security service firm based in Seattle that verified critical flaws in the next-generation energy infrastructure.

But because security concerns are being voiced early, "there's still plenty of opportunity to bake security in as we move forward," he said.

"Security Development Lifecycle, or SDL, can help solve these problems before they get out of control."

Without such precautions now, however, IOActive warns in a report to the Committee on Homeland Security that an attacker with a modicum of engineering and software knowledge plus perhaps $500 in equipment and materials could "take command and control of the AMI (advanced meter infrastructure), allowing for the en masse manipulation of service to homes and businesses".

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

If security isn't addressed in the design and implementation of the smart grid from the start, the report says it may be too expensive to address security issues after millions of the devices already are deployed.

Researchers at IOActive created a worm that was able to spread from one automated meter to another over the wireless network used to connect them. Once the worm spread through the smart grid, the researchers would have been able to control, and even shut down, the entire electrical grid.

Because of the sensitivity of much of the material in IOActive's report, Pennell said the company would not release the entire document. Instead, only excerpts of greatest use for security planning would be released.

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now
Advertisement

Recommended

Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
University of California gets fleeced by hackers for $1.14 million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Australia announces $1.35 billion investment in cyber security
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
CSA and ISSA form cyber security partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
UN report points to a 350% rise in phishing websites at start of 2020
phishing

UN report points to a 350% rise in phishing websites at start of 2020

7 Aug 2020