Thwarting a Power Grid Control Center Cyberattack

Thwarting a Power Grid Control Center Cyberattack

Based on recent reports of Russian involvement in a multistage intrusion of the US power grid, it’s no longer a question of “if” threat actors will gain access to critical infrastructure control systems – it’s when it will happen again, and for what purpose.

What can be done to thwart these potentially disruptive assaults?

$15 Million Investment Fuels Nozomi Networks Future Growth

$15 Million Investment Fuels Nozomi Networks Future Growth

We are excited to announce that our company has received $15 million in Series B financing, led by new investor Invenergy Future Fund.

This investment recognizes Nozomi Networks extraordinary accomplishments, demonstrates confidence in our future, and reflects the growing ICS cybersecurity market.

Let’s take a closer look at the reasons behind today’s announcement, and our company’s outlook as we enter 2018.

New TRITON ICS Malware is Bold and Important

New TRITON ICS Malware is Bold and Important

FireEye has reported that it has recently worked with an industrial operator whose facility was attacked by a new type of ICS malware, which they are calling TRITON. The attack reprogrammed a facility’s Safety Instrumented System (SIS) controllers, causing them to enter a failed state, and resulting in an automatic shutdown of the industrial process.

The TRITON attack is bold and notable because it is the first known industrial control system (ICS) attack that has targeted and impacted not just an ICS, but SIS equipment. Fortunately, because of the unique nature of how each plant implements its SIS and overall safety measures, the malware is not readily scalable.

Advancing ICS Cybersecurity for Low-Impact Electricity Carriers

Advancing ICS Cybersecurity for Low-Impact Electricity Carriers

Cybersecurity threats to the power grid are a continuous danger nowadays, and because of this, regulation in North America may expand from covering bulk electricity carriers to low-impact carriers. Last month FERC, the U.S. Federal Energy Regulatory Commission, proposed a new rule for low-impact carriers, covering transient electronic devices such as USBs and laptops, and incident response policies.
While the regulation is still in the review stage, some low-impact utilities are not waiting to improve their cybersecurity posture and get a head start on compliance. They are taking advantage of the latest innovation for cyber threat monitoring and detection systems. Vermont Electric Coop is one such entity, and they have realized multiple benefits from their proactive approach.

Bad Rabbit Highlights Employees’ Role in Cybersecurity Attacks

Bad Rabbit Highlights Employees’ Role in Cybersecurity Attacks

Recently reports of a new ransomware malware known as Bad Rabbit was making headlines in the press. A suspected variant of NotPetya, Bad Rabbit spread quickly through IT networks in Europe and elsewhere.
Our research indicates that while Bad Rabbit infections started to be reported in late October, the group behind the attacks started creating an “infection-network” in July. While not reported as impacting industrial systems, industrial operators should take note of this attack and what it means for their cyber resiliency programs.