Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • 4 Key Cybersecurity Trends Confronting Canada’s Electric Sector
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

4 Key Cybersecurity Trends Confronting Canada’s Electric Sector

5 years ago Wayne Spragg
4 Key Cybersecurity Trends Confronting Canada’s Electric Sector

Digital attackers are increasingly targeting energy organizations including those that support national electric grids. As reported by Morning Consult, security researchers found that utilities worldwide had suffered a recorded 1,780 distributed denial-of-service (DDoS) attacks between June 15 and August 21, 2020. That’s a 595% year-over-year increase.

Brandon Robinson, a partner at Balch & Bingham LLP, said that these research findings highlight how malicious actors of varying motivations continue to prey upon utilities entities.

“Whether one’s motivation is to do financial, economic, national security or industry harm, critical infrastructure such as the electric grid can be a natural target for such cyberattackers,” he said, as quoted by Morning Consult.

The Cyber Threat Situation in Canada

The Canadian Centre for Cyber Security (the Cyber Centre) recognizes how the information systems responsible for upholding Canada’s national electric infrastructure are subject to the above-mentioned threats. That explains why the Cyber Centre released its “Cyber Threat Bulletin: The Cyber Threat to Canada’s Electricity Sector.” This publication yields four key insights into the state of digital security for Canada’s energy sector.

Insight #1: Fraud and Ransomware Abound

According to the Cyber Centre, most of the observed digital threat attempts against Canada’s electrical organizations have involved ransomware and fraud. The latter attack category has included stealing sensitive information pertaining to a victim organization’s business operations as well as to its customers.

Looking ahead, the Cyber Centre expect that these types of threat activities will continue. Part of the reason for this prediction is the Cyber Centre’s assessment that ransomware actors are continuing to hone their creations’ abilities to spread across IT networks and infiltrate Industrial Control Systems (ICS). Acknowledging that development, the government program forecasted that digital criminals would be capable of targeting Canadian electrical ICS for extortion within the next three years.

Insight #2: Interdependencies with U.S. Grid Amplifies Risks

Evidence suggests that state-sponsored actors have been targeting the Canadian electricity sector since at least 2012 for the purpose of collecting information. Such information empowers those malicious actors to craft additional capabilities that would allow them to disrupt organizations within Canada’s electricity sector.

The Cyber Centre doesn’t think it’s necessarily likely that nefarious individuals would seek to intentionally disrupt Canada’s electricity sector in the absence of international hostilities. However, Canadian electricity organizations still face the threat of a digital attack because of the way in which the U.S. and Canadian grids are interconnected. Indeed, the Cyber Centre explained that there are more than 35 transmission line connections running across provinces that border the United States. Malicious actors could subsequently focus on those connections—and Canada more generally—as an intermediate target through which they could affect the availability of the U.S. electrical grid.

Insight #3: Supply Chains and MSPs Constitute Enticing Initial Targets

Electric organizations rely on supply chains and managed service providers (MSPs) in order to perform maintenance, modernize their equipment and develop new grid capacities. Malicious actors know this, which is why the Cyber Centre assesses that high-sophistication actors will continue to target supply chain organizations and MSPs serving the Canadian electricity sector for the next few years.

When it comes to attacks against electricity sector supply chains, the Cyber Centre explains that malicious actors have two motivations in mind: obtaining intellectual property and other data about the victim’s ICS as well as indirectly gaining access to an electric utility’s network. Nefarious individuals can leverage attacks against electricity sector MSPs for the same purposes as well as for scaling their malicious activities.

Insight #4: The IT-OT Convergence Is Making ICS More Vulnerable

Years ago, Information Technology (IT) and Operational Technology (OT) were separate, with teams operating in distinct silos. That’s changed with organizations’ digital transformations. In an effort to increase their visibility over and thereby maximize their industrial processes, organizations are connecting their ICS and other OT assets to web-connected IT devices such as sensors. The problem is that many of those OT assets are legacy devices that were designed without today’s IT threats in mind. This IT-OT convergence thereby makes these industrial assets vulnerable to digital threats.

Subsequently, the Cyber Centre assesses that digital criminals are likely adapting their activities to capitalize on the IT-OT convergence. It forecasts that these malicious actors will specifically aim to exploit new smart grid technology, as those solutions tend to suffer from even greater digital risks because of their complex supply chains and interconnectedness with other entities.

How Canadian Electricity Sector Organizations Can Defend Themselves

Organizations in the Canadian electricity sector can defend themselves against some of the threats discussed above by hardening their digital security. They can specifically do this by investing in a solution that lets them gain visibility over their industrial environments, monitors the network for potential problems, detects misconfigurations and uses vulnerability assessments to gauge their systems’ security on an ongoing basis. Learn how Tripwire can help.

The post ” 4 Key Cybersecurity Trends Confronting Canada’s Electric Sector” appeared first on TripWire

Source:TripWire – Wayne Spragg

Tags: Critical Severity, Exploit, High Severity, Malware, Ransomware, TripWire

Continue Reading

Previous TDoS Attacks Take Aim at Emergency First-Responder Services
Next Hackers Exploit Accellion Zero-Days in Recent Data Theft and Extortion Attacks

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

5 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

10 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

13 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT