Russian cyber activity against critical infrastructure – what’s new?

July 25, 2018
The Russians planted malware in our electric grids in at least the October 2014 timeframe.  What’s new and why the disclosures now? 

The Russians planted malware in our electric grids in at least the October 2014 timeframe. In the mid- 2015 time frame, DHS berated industry for connecting control systems to the Internet and stating that is how the attackers got access. I believe the malware attacks against US critical infrastructure can be traced back years further as were Chinese intrusions. Since there are no NERC CIP requirements to remove malware, there is a good chance the malware is still there. What’s new and why the disclosures now?

Joe Weiss

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.