Sen. Markey wants details on cyber threats to the U.S. grid
- By Mark Rockwell
- Aug 14, 2018
A top member of the Senate Foreign Relation Committee's cybersecurity subcommittee wants briefings from information from energy companies and federal agencies on a reported breach of a power company's control system.
Sen. Edward Markey (D-Mass.), ranking member of the Foreign Relations Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy, on Aug. 13 sent letters to federal agencies and energy grid and power utilities asking about the details of a Russian-backed cyber program aimed at breaching the control systems of U.S. electrical grid suppliers.
Markey wants answers by Sept. 7 from the Department of Homeland Security, Department of Energy, Federal Energy Regulatory Commission, 10 commercial power companies and federal power marketing organizations such as the Tennessee Valley Authority about their current efforts to prevent such intrusions.
DHS detailed some of the techniques the attackers used in 2017 breaches of industrial control gear at the utilities in a public briefing this July. Press reports suggested the attackers could have taken direct action to turn off the power system through the compromised controls.
DHS officials said during those public teleconferences that Russian hackers had claimed "hundreds of victims" in a sustained campaign last summer aimed at infiltrating industrial control systems of U.S. critical infrastructure providers. The officials said that the campaign could have resulted in ICS equipment being manipulated into disrupting electrical power flows.
DHS later clarified that intruder access to the industrial control system would not have had any impact on the grid. Experts on industrial control system cybersecurity also said the details of the DHS briefing, taken from previously reported incidents, showed that the danger of hackers bringing down the power grid wasn't imminent.
In an Aug. 6 blog post, industrial system threat detection provider Dragos said the Russian-backed intrusions described by DHS have not inserted "cyber implants" into the electric grid to cause blackouts. The company said the Russian intruders were infiltrating business networks, "and in some cases, ICS networks, in efforts to steal information and intelligence that could potentially let them into operational systems."
Markey is looking for details on whether utilities have been targeted by cyberattacks over the last five years and what steps had been taken to prevent future attacks, as well as other questions about preventative measures.
From the federal agencies, Markey wants information about how they are coordinating cyber defense activities; their efforts to engage third-party ICS vendors; and how they're increasing resiliency.
In mid-July, FERC set a final rule tightening cyber incident reporting for electrical providers, mandating they report cyber-intrusions that bump up against their perimeter cyber defenses or associated Electronic Access Control or Monitoring Systems, but don't actually get into providers' primary systems.
Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.
Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.
Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.
Click here for previous articles by Rockwell.
Contact him at email@example.com or follow him on Twitter at @MRockwell4.