AGL 38.15 Decreased By ▼ -1.43 (-3.61%)
AIRLINK 125.07 Decreased By ▼ -6.15 (-4.69%)
BOP 6.85 Increased By ▲ 0.04 (0.59%)
CNERGY 4.45 Decreased By ▼ -0.26 (-5.52%)
DCL 7.91 Decreased By ▼ -0.53 (-6.28%)
DFML 37.34 Decreased By ▼ -4.13 (-9.96%)
DGKC 77.77 Decreased By ▼ -4.32 (-5.26%)
FCCL 30.58 Decreased By ▼ -2.52 (-7.61%)
FFBL 68.86 Decreased By ▼ -4.01 (-5.5%)
FFL 11.86 Decreased By ▼ -0.40 (-3.26%)
HUBC 104.50 Decreased By ▼ -6.24 (-5.63%)
HUMNL 13.49 Decreased By ▼ -1.02 (-7.03%)
KEL 4.65 Decreased By ▼ -0.54 (-10.4%)
KOSM 7.17 Decreased By ▼ -0.44 (-5.78%)
MLCF 36.44 Decreased By ▼ -2.46 (-6.32%)
NBP 65.92 Increased By ▲ 1.91 (2.98%)
OGDC 179.53 Decreased By ▼ -13.29 (-6.89%)
PAEL 24.43 Decreased By ▼ -1.25 (-4.87%)
PIBTL 7.15 Decreased By ▼ -0.19 (-2.59%)
PPL 143.70 Decreased By ▼ -10.37 (-6.73%)
PRL 24.32 Decreased By ▼ -1.51 (-5.85%)
PTC 16.40 Decreased By ▼ -1.41 (-7.92%)
SEARL 78.57 Decreased By ▼ -3.73 (-4.53%)
TELE 7.22 Decreased By ▼ -0.54 (-6.96%)
TOMCL 31.97 Decreased By ▼ -1.49 (-4.45%)
TPLP 8.13 Decreased By ▼ -0.36 (-4.24%)
TREET 16.13 Decreased By ▼ -0.49 (-2.95%)
TRG 54.66 Decreased By ▼ -2.74 (-4.77%)
UNITY 27.50 Decreased By ▼ -0.01 (-0.04%)
WTL 1.29 Decreased By ▼ -0.08 (-5.84%)
BR100 10,089 Decreased By -415.2 (-3.95%)
BR30 29,509 Decreased By -1717.6 (-5.5%)
KSE100 94,574 Decreased By -3505.6 (-3.57%)
KSE30 29,445 Decreased By -1113.9 (-3.65%)

The US government warned industrial firms this week about a hacking campaign targeting the nuclear and energy sectors, the latest event to highlight the power industry''s vulnerability to cyber attacks. Since at least May, hackers used tainted "phishing" emails to "harvest credentials" so they could gain access to networks of their targets, according to a joint report from the US Department of Homeland Security and Federal Bureau of Investigation.
The report provided to the industrial firms was reviewed by Reuters on Friday. While disclosing attacks, and warning that in some cases hackers succeeded in compromising the networks of their targets, it did not identify any specific victims.
"Historically, cyber actors have strategically targeted the energy sector with various goals ranging from cyber espionage to the ability to disrupt energy systems in the event of a hostile conflict," the report said. Homeland Security and FBI officials could not be reached for comment on the report, which was dated June 28.
The report was released during a week of heavy hacking activity. A virus dubbed "NotPetya" attacked on Tuesday, spreading from initial infections in Ukraine to businesses around the globe. It encrypted data on infected machines, rendering them inoperable and disrupting activity at ports, law firms and factories.
On Tuesday the energy-industry news site E&E News reported that US investigators were looking into cyber intrusions this year at multiple nuclear power generators. Reuters has not confirmed details of the E&E News report, which said there was no evidence safety systems had been compromised at affected plants.
The activity described in the US government report comes at a time when industrial firms are particularly anxious about threat that hackers pose to their operations.
Industrial firms, including power providers and other utilities, have been particularly worried about the potential for destructive cyber attacks since December 2016, when hackers cut electricity in Ukraine. US nuclear power generators PSEG, SCANA Corp
and Entergy Corp said they were not impacted by the recent cyber attacks. SCANA''s V.C. Summer nuclear plant in South Carolina shut down on Thursday due to a problem with a valve in the non-nuclear portion of the plant, a spokesman said. Another nuclear power generator, Dominion Energy, said it does not comment on cyber security.
Two cyber security firms said on June 12 that they had identified the malicious software used in the Ukraine attack, which they dubbed Industroyer, warning that it could be easily modified to attack utilities in the United States and Europe. Industroyer is only the second piece of malware uncovered to date that is capable of disrupting industrial processes without the need for hackers to manually intervene. The first, Stuxnet, was discovered in 2010 and is widely believed by security researchers to have been used by the United States and Israel to attack Iran''s nuclear program.

Comments

Comments are closed.