Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Facilities

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

  • Christina Miller
  • February 24, 2022
Courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

The threat of the Russian invasion of the Ukraine has been at the forefront after years of tension between the two and months of clear warnings. As of today, explosions erupted and President Vladimir V. Putin of Russia declared the start of a military operation to “demilitarize” Ukraine.

Tension between the Russian Federation and Ukraine isn’t new. The Russo-Ukrainian war is an ongoing conflict that began in February 2014 due to the status of Crimea and parts of Donbas. Around the same time, there was a BlackEnergy malware attack on the Ukrainian power grid attributed to a Russian hacking group in retaliation to a physical attack on substations from pro-Ukrainian activists, all stemming from the fallout of Russia annexing Crimea.

While it has recently escalated further to Russia launching a military invasion on Ukraine, the former Soviet republic has not been Russia’s only target. Russian threat actors have been busy in the cybersecurity landscape causing damage around the world. An instance close to home is the SolarWinds cyberattack that affected thousands of networks and systems in every major sector in the U.S. government and military.

Russian cyberattacks on the U.S. have been in the news for decades, starting in 1996 with the Moonlight Maze attacks and have progressed throughout the years leading up to the SolarWinds attack and more. The lack of qualified cybersecurity for U.S. critical infrastructure has continued to be a main concern, especially after the escalation of recent attacks in 2021, such as attacks on the Kemuri Water Company and Colonial Pipeline. Even in 2017, eyes were opening to how much America’s cybersecurity needed to keep evolving due to the attack against Wolf Creek Nuclear Operating Corp.

Wolf Creek

In May of 2017, multiple U.S. nuclear power generation sites had been breached, and experts at the time weren’t sure if they were linked to the global cyberattack, Petya. One attack was on the Wolf Creek Nuclear facility, located in Burlington, Kan. In this instance, the attack was contained to the business side of the plant, and the critical infrastructure was not affected. However, because the network had been infiltrated, the nuclear systems had become more vulnerable. This campaign was the first time U.S. nuclear power companies had been hacked.

According to a Business Insider article, “If a nuclear power facility is attacked on the business side, that might actually serve as a way of information-gathering” for hackers, said Paulo Shakarian, founder of the cybersecurity firm CYR3CON.

In some cases, hackers will try to “see if, by reaching that system, they can get more insight into what the facility is using on the operational side,” Shakarian said. Gathering information, such as emails, design plans, information about security assessments and passwords from the business side can often lead to further attacks on the other side, which would be far more serious.

The Wolf Creek plant was built in 1977 before most systems were digital, which means it runs on an analog system that cannot be remotely hacked. Wolf Creek started running in 1985 and creates power for 800,00 homes. It is owned by Kansas City Power and Light Co., Westar Energy and Kansas Electric Power Cooperative.

These attacks were especially worrisome in light of the cyberattacks against Ukraine’s power grid. The Department of Homeland Security (DHS) and FBI released a joint report that contained an urgent amber warning, which is the second-highest rating for the sensitivity of the threat. The hackers appeared determined to map out computer networks for potential future attacks, according to a New York Times article.

The hackers’ techniques mimicked Energetic Bear, a Russian hacking group that’s been attacking the U.S. energy sector since 2012. Senior industrial control engineers were targeted with emails with fake resumes for control engineering jobs, which really contained malicious code. Once the resumes were opened, the attackers stole the engineers’ credentials and were able to access other systems on the network.

The attack on Wolf Creek was wasn’t officially attributed to Russia until 2018 according to a Cybersecurity and Infrastructure Security Agency (CISA) alert on March 15 of that year.

Conclusion

President Joseph R. Biden has imposed economic sanctions against Moscow and said at a press conference, “Putin chose this war, and now he and his country will bear the consequences.” The consequences of these sanctions and further action against Russia are bound to come as this situation unfolds.

However, cybersecurity experts have been saying for years Russia does have the potential to cause severe damage through cyberattacks. For example, The New York Times reported in 2018 that cybersecurity experts saw the attacks were in preparation for Russia to disrupt the United States’ critical facilities “in the event of a conflict.”

Russia has had years to position itself in a place of power in the cyber landscape. Only time will tell what they will do with it.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Christina Miller

Christina Miller is the assistant content editor at CFE Media and Technology.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
Courtesy: Brett Sayles
  • Threats & Vulnerabilities

U.S. data compromises hit record high in 2021

  • Atlas VPN
  • February 22, 2022
Read More
Next Article
  • Strategies

3 tips for rail operators to get started with ICS cybersecurity

  • Erin Anderson
  • February 25, 2022
Read More
You May Also Like
Courtesy: A3/Siemens
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

Courtesy: Trekkor
Read More

Bridging the IT and OT gap for a power service company

The modern energy grid will be data-driven, have improved security and rely on the edge to manage data processing. Courtesy: Intel/Fortinet
Read More

Building a secure energy and power grid for the future

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT