: :inin Kyiv (EET)

Suspected Russia-backed hackers target Baltic energy networks

Suspected Russia-backed hackers have launched exploratory cyber attacks against the energy networks of the Baltic states, sources said, raising security concerns inside the West`s main military alliance, NATO, according to Reuters.

Lithuania, Latvia and Estonia, all members of NATO and the European Union, are on the political front line of tensions between the West and Moscow, Reuters reported. 

The Baltics are locked into Russia`s power network but plan to synchronize their grids with the EU.

See also: Cyber-espionage group uses malware, hacked microphones and Dropbox accounts to spy on Ukrainian targets

Interviews with more than a dozen law-enforcement and private investigators, insiders and utility officials show hackers have quietly made incursions into Baltic networks over the past two years, in parallel with more serious attacks in Ukraine that plunged swathes of that country into darkness.

They say Russian state organizations are suspected of being behind the campaigns.

Reuters could not independently verify the sources` allegations.

At the end of 2015, hackers attacked an Internet gateway used to control a Baltic electricity grid, disrupting operations but not causing blackouts, a source familiar with the matter said. He declined to give details due to ongoing private investigations into the incident, which has not been previously reported.

The attack was a distributed denial of service (DDoS), where Internet gateways are bombarded with large amounts of data, a blunt but sometimes effective technique in an age when energy networks are being modernized with digital technology.

See also: Finding asymmetric responses: cyberspace in hybrid war

The source also said suspected Russia-backed hackers had targeted a Baltic petrol-distribution system at around the same time in an unsuccessful denial of service attack that aimed to cause widespread disruption in petrol deliveries.

The system coordinates deliveries from storage tanks to a network of petrol stations, the source added.

In a separate malware attack on another undisclosed Baltic grid, also around end-2015, hackers targeted network communication devices, serial-to-ethernet converters (STEC), which link sub-stations to central control, two other sources said. The attack did not cause service disruption, they added.

Though these three incidents date back 18 months or so, cyber security consultants are still investigating some of them. They say hackers can remain dormant and undetected inside systems. In Ukraine, hackers had infiltrated the grids there for about six months before the lights went out in December 2015, consultants said.

STECs were also targeted in Ukraine by the so-called Sandworm team, a Russia-backed group that had attacked energy companies in Western Europe and the United States in a campaign in 2014, several sources said.

See also: Ukraine investigates cyberattack on Kyiv power grid

The two sources with knowledge of the STEC attacks said they had detected the presence of Sandworm in the Baltics, but they did not give evidence for their suspicion. One of them said Sandworm was still active in the Baltic states.

”It`s the same kind of slander as all the other similar accusations,” Kremlin spokesman Dmitry Peskov said when asked by Reuters about the possible hacks.

Russia has never cut power flows to the Baltic states or threatened to do so.

The NATO sources and utility officials said the Baltic attacks raised concerns that hackers could disable the region`s energy networks just as they had done in Ukraine, where government troops have been battling pro-Russian separatists since 2014.

The first Ukraine attack caused crippling blackouts in some parts of the country lasting several hours.

NATO and cyber security experts believe hackers are testing the Baltic energy networks for weaknesses, becoming familiar with how they are controlled in order to be able to shut them down at will.

”On a daily basis there are DDoS attacks designed to probe network architecture, so it could well be possible that something (serious) could take place later on,” a Brussels-based NATO official said, requesting anonymity because he was not authorized to speak publicly on the matter.

Lithuanian grid operator Litgrid said attacks on IT systems and the grid were constant but it had not seen DDoS attacks.

Litgrid maintains constant monitoring and runs regular tests to detect any cyber break-ins as part of its network defenses, the utility said in an emailed statement.

Latvia`s grid operator, AST, said it had not seen incidents in the last year. Estonia`s Elering said only that it had not seen any attacks at the time of the Ukraine incursions in 2015.

In Ukraine, operators of older and technologically simpler networks were able to send workers out into the field to manually bring grids back up. This would be more difficult to achieve in modern, digitized networks, cyber consultants said.

See also: Lithuania found Russian spyware on its government computers


Submit a Comment

Your email address will not be published. Required fields are marked *

Pin It on Pinterest

Share This

Share this post with your friends!