Hackers Have Spent Months On Breaching American Power Plants

Indira Datta - Jul 15, 2019


Hackers Have Spent Months On Breaching American Power Plants

A group of hackers, which comprised a Saudi oil facility two years ago, has been trying to breach US's power plants in the last few months.

Just recently, hackers of the Xenotime group had intended to infiltrate the system of American utilities. Previously in 2017, this group of hackers had made a malicious attack on TRISIS/TRITON on safety equipment systems (SIS) at a Saudi oil base.

Powerplant Electricity 860x430

Dragos, a network security company, discovered about Xenotime's efforts. Dragos said in his article that Xenotime has spent a lot of time exploring the factories in the United States during the past few months. Although there are currently no signs of Xenotime's attack being successful, the expansion of this group's scope of activity is a certain concern for critical infrastructures.

Sergio Caltagirone, vice president of Threat Intelligence at Dragos, on Friday said that:

Capture

According to MIT Technology Review, Xenotime's TRITON malware can disable safety systems in power plants and it is also the code the group used to successfully attack the oil factory in Saudi. It's worth mentioning that Xenotime took a year to find a way to penetrate the oil factory's system, and this persistence made this group of hackers formidable and troublesome to deal with.

Dragos wrote on their blog:

Capture

Dragos advised power plants and other possible targets to invest more in new security systems. Systems that enable them to regain control of the plant system when hackers successfully execute its attack. So after that, they can continue to return to the business as quick as possible. Dragos noted:

Capture

Tags

Comments

Sort by Newest | Popular

Next Story