This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at http://www.bbc.co.uk/news/technology-35686493
The article has changed 6 times. There is an RSS feed of changes available.
Version 3 | Version 4 |
---|---|
Ukraine cyber-attacks 'could happen to UK' | Ukraine cyber-attacks 'could happen to UK' |
(1 day later) | |
A recent cyber-attack on Ukraine's electricity network could be replicated in the UK, according to a member of a US investigation into the resulting blackout. | A recent cyber-attack on Ukraine's electricity network could be replicated in the UK, according to a member of a US investigation into the resulting blackout. |
"I've been getting interest and calls from the UK, Norway, Germany and all over," said Robert Lee. | "I've been getting interest and calls from the UK, Norway, Germany and all over," said Robert Lee. |
"The answer is yes [they could be vulnerable]." | "The answer is yes [they could be vulnerable]." |
Last week, the US Department of Homeland Security formally blamed hackers for December's power cuts. | Last week, the US Department of Homeland Security formally blamed hackers for December's power cuts. |
It did not, however, name the suspected perpetrators. | It did not, however, name the suspected perpetrators. |
The US government is expected to publish more details of the investigation shortly. | The US government is expected to publish more details of the investigation shortly. |
About 225,000 people were left without power for several hours when Ukraine suffered what is believed to be the first successful cyber-attack on an electricity distribution network. | |
"The way the Ukrainians set up the grid and the type of the equipment they are using is also the way a lot of other nations do it," said Mr Lee, an infrastructure specialist at cybersecurity firm the Sans Institute. | "The way the Ukrainians set up the grid and the type of the equipment they are using is also the way a lot of other nations do it," said Mr Lee, an infrastructure specialist at cybersecurity firm the Sans Institute. |
He added the attack could have been worse, as the attackers could have shut off power to a much wider area. | He added the attack could have been worse, as the attackers could have shut off power to a much wider area. |
"This was a shot across the bows," he told the BBC. | "This was a shot across the bows," he told the BBC. |
Individual UK power firms declined to comment on their security measures. | Individual UK power firms declined to comment on their security measures. |
However, a source close to the industry - who asked to remain anonymous - confirmed that "given sufficient sophistication and funding", the UK's electricity infrastructure could be hacked. | However, a source close to the industry - who asked to remain anonymous - confirmed that "given sufficient sophistication and funding", the UK's electricity infrastructure could be hacked. |
A spokesperson for the Energy Networks Association - the body that represents the UK and Ireland's gas and electricity distributors - said cybersecurity was a top priority. | A spokesperson for the Energy Networks Association - the body that represents the UK and Ireland's gas and electricity distributors - said cybersecurity was a top priority. |
The Department for Energy and Climate Change told the BBC: "The UK has... dedicated cyber experts and teams to keep it protected." | The Department for Energy and Climate Change told the BBC: "The UK has... dedicated cyber experts and teams to keep it protected." |
How was the hack carried out? | How was the hack carried out? |
In Mr Lee's view, the attack was highly likely to have originated in Russia. | In Mr Lee's view, the attack was highly likely to have originated in Russia. |
But he said it was not possible to say whether it was the "Russian government or a well-funded [non-government] team". | But he said it was not possible to say whether it was the "Russian government or a well-funded [non-government] team". |
At least six months before the power was shut off, he explained, attackers had begun sending phishing emails to Ukraine's power utility companies' offices, containing Microsoft Word documents. When opened, they installed malware. | At least six months before the power was shut off, he explained, attackers had begun sending phishing emails to Ukraine's power utility companies' offices, containing Microsoft Word documents. When opened, they installed malware. |
Firewalls separated the affected computers from the power control systems. | Firewalls separated the affected computers from the power control systems. |
But the malware - known as BlackEnergy 3 - allowed the hackers to gather passwords and logins, with which they were able to mount an attack. | But the malware - known as BlackEnergy 3 - allowed the hackers to gather passwords and logins, with which they were able to mount an attack. |
After months of work, they gained the ability to remotely log in to vital controls, known as supervisory control and data acquisition (Scada) systems. | After months of work, they gained the ability to remotely log in to vital controls, known as supervisory control and data acquisition (Scada) systems. |
Finally on 23 December, Mr Lee said, the attackers "remote desk-topped" into the Scada computers and cut power at 17 substations. | Finally on 23 December, Mr Lee said, the attackers "remote desk-topped" into the Scada computers and cut power at 17 substations. |
At the same time, they jammed company phone lines, making it hard for engineers to determine the extent of the blackout. | At the same time, they jammed company phone lines, making it hard for engineers to determine the extent of the blackout. |
How do you recover? | How do you recover? |
The power outages in Ukraine lasted for several hours. They were only reversed by switching to manual operations. | The power outages in Ukraine lasted for several hours. They were only reversed by switching to manual operations. |
The attackers went to great lengths, according to Mr Lee, to make sure power supplies could not be turned back on automatically. | The attackers went to great lengths, according to Mr Lee, to make sure power supplies could not be turned back on automatically. |
He said the hackers rewrote firmware in the electronic devices used to communicate with the substations' circuit breakers. | He said the hackers rewrote firmware in the electronic devices used to communicate with the substations' circuit breakers. |
That meant that the power could not be turned on remotely even after engineers had regained control of the Scada computers. | That meant that the power could not be turned on remotely even after engineers had regained control of the Scada computers. |
In the end, the engineers had to visit the substations and operate them manually. | In the end, the engineers had to visit the substations and operate them manually. |
In the UK, this would take between one to two hours, the source close to the industry told the BBC. | In the UK, this would take between one to two hours, the source close to the industry told the BBC. |
Could it happen here? | Could it happen here? |
UK power companies' systems are constantly under attack. | UK power companies' systems are constantly under attack. |
A breach "is entirely possible", said Eireann Leverett of Cambridge University's Centre for Risk Studies, but he added "there's a lot of people working very hard to stop it". | A breach "is entirely possible", said Eireann Leverett of Cambridge University's Centre for Risk Studies, but he added "there's a lot of people working very hard to stop it". |
Mr Leverett is now working on a report about what the consequences might be, due to be published in April. | Mr Leverett is now working on a report about what the consequences might be, due to be published in April. |
Glasgow University's Professor Chris Johnson has highlighted that some of the control systems used by power distribution companies can be found for sale online. | Glasgow University's Professor Chris Johnson has highlighted that some of the control systems used by power distribution companies can be found for sale online. |
He warns that these could be used by hackers to hunt for security weaknesses. | He warns that these could be used by hackers to hunt for security weaknesses. |
How do you prevent attacks? | How do you prevent attacks? |
But Mr Lee's view can be summarised as "where there's a will, there's a way". | But Mr Lee's view can be summarised as "where there's a will, there's a way". |
Companies are unlikely to be able to prevent every assault on their systems, he warns. Ukraine's hackers were "inside" the electricity companies' systems for six months, he notes, highlighting the lengths they went to. | Companies are unlikely to be able to prevent every assault on their systems, he warns. Ukraine's hackers were "inside" the electricity companies' systems for six months, he notes, highlighting the lengths they went to. |
So one lesson, he says, is that power providers must ensure they can detect attacks quickly when they occur and have staff primed to respond. | So one lesson, he says, is that power providers must ensure they can detect attacks quickly when they occur and have staff primed to respond. |
That costs money, meaning more expensive bills for consumers. | That costs money, meaning more expensive bills for consumers. |
In a speech to GCHQ last year, the chancellor George Osborne said an attack on the UK's electricity network could lead to "loss of life". | In a speech to GCHQ last year, the chancellor George Osborne said an attack on the UK's electricity network could lead to "loss of life". |
He announced an extra £1.9bn of taxpayer's money over five years to bolster GCHQ's cyber capabilities. | He announced an extra £1.9bn of taxpayer's money over five years to bolster GCHQ's cyber capabilities. |
The chancellor also said countries must work together to call out those "acting outside the boundaries of acceptable behaviour". | The chancellor also said countries must work together to call out those "acting outside the boundaries of acceptable behaviour". |
Mr Lee has a similar view, adding that the international community must "take a stand" if responsibility for the attacks is finally determined. | Mr Lee has a similar view, adding that the international community must "take a stand" if responsibility for the attacks is finally determined. |
Read more cybersecurity stories in our special index | Read more cybersecurity stories in our special index |