Renewable energy systems inadequately secured

Renewable energy systems inadequately secured
Advertising

Share post

In April 2022, a few months after the Russian attack on Ukraine began, three wind energy companies in Germany were hit by cybercriminals. The attacks disabled thousands of digitally controlled wind turbines.

It is estimated that by 2050, the world's power systems will depend on 70 percent renewable energy, primarily from solar, wind, tidal, rain and geothermal sources. These energy sources are typically decentralized, geographically remote and relatively small. They are often managed and operated using insufficiently secured digital technologies that are directly connected to the aging infrastructure of the national electricity grid. A situation that opens the door to cyber attacks.

Advertising

From risk to resilience

To implement robust cyber resilience into digital renewable energy systems, it is first important to understand the risk areas. The 10 most important are as follows:

1. Code vulnerabilities and misconfigurations in embedded software. The demand for renewable energy means that supporting technologies and applications are often developed and implemented quickly, leaving little time to incorporate or test security controls. The providers and their developers are experts in electrical engineering and may not have the appropriate security knowledge to do this. The risk is increased if the software is not regularly patched and updated following error reports.

Advertising

Subscribe to our newsletter now

Read the best news from B2B CYBER SECURITY once a month



By clicking on "Register" I agree to the processing and use of my data in accordance with the declaration of consent (please open for details). I can find more information in our Privacy Policy. After registering, you will first receive a confirmation email so that no other person can order something you don't want.
Expand for details on your consent
It goes without saying that we handle your personal data responsibly. If we collect personal data from you, we process it in compliance with the applicable data protection regulations. Detailed information can be found in our Privacy Policy. You can unsubscribe from the newsletter at any time. You will find a corresponding link in the newsletter. After you have unsubscribed, your data will be deleted as soon as possible. Recovery is not possible. If you would like to receive the newsletter again, simply order it again. Do the same if you want to use a different email address for your newsletter. If you would like to receive the newsletter offered on the website, we need an e-mail address from you as well as information that allows us to verify that you are the owner of the e-mail address provided and that you agree to receive the newsletter. Further data is not collected or only collected on a voluntary basis. We use newsletter service providers, which are described below, to process the newsletter.

CleverReach

This website uses CleverReach to send newsletters. The provider is CleverReach GmbH & Co. KG, Schafjückenweg 2, 26180 Rastede, Germany (hereinafter “CleverReach”). CleverReach is a service that can be used to organize and analyze the sending of newsletters. The data you enter for the purpose of subscribing to the newsletter (e.g. email address) will be stored on the CleverReach servers in Germany or Ireland. Our newsletters sent with CleverReach enable us to analyze the behavior of the newsletter recipients. This can include It is analyzed how many recipients have opened the newsletter message and how often which link in the newsletter was clicked. With the help of so-called conversion tracking, it can also be analyzed whether a previously defined action (e.g. purchase of a product on this website) took place after clicking on the link in the newsletter. Further information on data analysis by CleverReach newsletter is available at: https://www.cleverreach.com/de/funktionen/reporting-und-tracking/. The data processing takes place on the basis of your consent (Art. 6 Para. 1 lit. a DSGVO). You can revoke this consent at any time by unsubscribing from the newsletter. The legality of the data processing operations that have already taken place remains unaffected by the revocation. If you do not want an analysis by CleverReach, you must unsubscribe from the newsletter. For this purpose, we provide a corresponding link in every newsletter message. The data you have stored with us for the purpose of subscribing to the newsletter will be stored by us or the newsletter service provider until you unsubscribe from the newsletter and deleted from the newsletter distribution list after you have canceled the newsletter. Data stored by us for other purposes remain unaffected. After you have been removed from the newsletter distribution list, your e-mail address may be stored by us or the newsletter service provider in a blacklist if this is necessary to prevent future mailings. The data from the blacklist is only used for this purpose and is not merged with other data. This serves both your interest and our interest in complying with the legal requirements when sending newsletters (legitimate interest within the meaning of Art. 6 Para. 1 lit. f GDPR). Storage in the blacklist is not limited in time. You may object to the storage if your interests outweigh our legitimate interest. For more information, see the privacy policy of CleverReach at: https://www.cleverreach.com/de/datenschutz/.

Data processing

We have concluded a data processing agreement (DPA) for the use of the above-mentioned service. This is a contract mandated by data privacy laws that guarantees that they process personal data of our website visitors only based on our instructions and in compliance with the GDPR.

2. Unsecured APIs. Another software-related risk is that API-based applications can communicate and share data and functionality with other applications, including third-party applications. They are a common feature of networked or publicly accessible systems. Web application security and firewalls are essential to prevent attackers from using APIs to steal data, infect devices, and build botnets.

3. Management, control, reporting and analysis systems. Management and control software such as SCADA (Supervisory Control and Data Acquisition) systems and other systems that import, analyze and visualize data from energy sources are top targets for cyberattacks because they allow criminals to access the entire system, manipulate data , enable sending instructions and more. Systems that integrate data from third-party sources, such as weather towers, offer another opportunity for compromise. Robust authentication measures, at least multi-level but ideally based on zero trust, coupled with limited access rights are crucial to ensure that only those who have authorization can access the system.

4. Automation. Distributed and decentralized renewable energy systems, particularly on a large scale, require XNUMX/XNUMX monitoring and management, which is increasingly done automatically. The risk is that these systems are not monitored carefully enough for anomalous or suspicious traffic that could indicate the presence of an intruder. Security solutions that offer advanced detection and response as well as specialized IoT security features can help here.

5. Remote Access Services. Renewable energy sources are widely dispersed and often located in isolated locations. This means they need some form of remote access to share data and receive instructions and reports, for example via cloud services or VPNs. Remote access services are notoriously vulnerable to cyberattacks and robust authentication and access measures are essential.

6. Physical Location. Another geographic risk is that location can slow response and recovery times after an incident. The logistics of traveling to and from an offshore wind farm, for example to repair or reimage sensors, can be complex, time-consuming and expensive. The people traveling to the remote locations are typically not IT professionals, so a security solution that is easy to install and replace by a non-security professional is essential. An electrician must be able to replace a broken appliance on a Sunday evening.

7. Network Traffic. All data passing over the network should be monitored and encrypted. In connected power systems, data traffic between a device and the central application is often unencrypted and vulnerable to tampering. Attackers can intercept data at rest and in motion. Or DoS attacks overload the traffic systems.

8. Internet Connection. Traditional power plants, such as gas-fired power plants, are typically not connected to the internet and have so-called “air-gapped” infrastructure, which reduces the risk of a cyberattack. However, because renewable energy sources are connected to the internet, they generally do not have this protection. All systems connected to the Internet must be secured.

9. Outdated power grid infrastructure. In most countries, a significant portion of the power grid will be outdated and therefore unable to receive security updates. The best way to protect these systems is to incorporate secure authentication and access measures into them.

10. Lack of regulation and safety coordination. For long-term security, laws and regulations – such as NIS 2.0 in Europe – must ensure that there are strict standards for renewable energy installations, no matter how small. Additionally, renewable energy technology is evolving rapidly and supply chains are complex – this can lead to confusion about who is responsible for safety. The “shared responsibility” model that applies to cloud providers could also help here.

Sustainable security

In some ways, renewable energy systems are not that different from other IoT systems. Attackers can scan for and attack vulnerable components, unpatched software, insecure default settings, and unprotected connections. A sustainable, connected renewable energy industry must be built with security and cyber resilience from the start - and then maintained continuously, step by step.

Securing a complex environment doesn't have to be complicated. It's worth considering SASE (Secure Access Service Edge), an integrated solution that securely connects people, devices and things to their applications, no matter where they are. Add network segmentation and user training to the mix, and organizations have a solid cyber-resilient foundation - not only to prevent an attack, but also to mitigate the impact if an attack occurs.
Comment from Stefan Schachinger, Senior Product Manager, Network Security at Barracuda Networks

More at Barracuda.com

 


Via Barracuda Networks

Striving to make the world a safer place, Barracuda believes that every business should have access to cloud-enabled, enterprise-wide security solutions that are easy to purchase, implement and use. Barracuda protects email, networks, data and applications with innovative solutions that grow and adapt as the customer journey progresses. More than 150.000 companies worldwide trust Barracuda to help them focus on growing their business. For more information, visit www.barracuda.com.


Matching articles on the topic

Modern CIOs have diverse tasks

The role of modern CIOs has changed significantly: In the past, CIOs were primarily responsible for maintaining companies’ IT operations. ➡ Read more

Over 130.000 data breaches in Europe in 2024

In the 15 European nations, there were over 2024 data breaches every day in 365, according to the results of a recent analysis. In Germany ➡ Read more

DDoS attacks: the most important means of cyber warfare

In the second half of 2024, there were at least 8.911.312 DDoS attacks worldwide, according to the results of a recent DDoS Threat Intelligence Report. ➡ Read more

Cybercrime: Russian-speaking underground is leading

A new research report provides a comprehensive insight into the Russian-speaking cyber underground, an ecosystem that has fueled global cybercrime in recent ➡ Read more

Cyber ​​Resilience Act: Companies should act now

The Cyber ​​Resilience Act (CRA) is coming in leaps and bounds. This means that manufacturers will soon no longer be able to ➡ Read more

Use of AI/ML tools increased by 3000 percent

AI/ML tools are popular, according to the findings of a recent threat report. However, their increased use also brings with it security risks. Cybercriminals ➡ Read more

Vishing: Criminals rely on voice phishing attacks

Using AI-generated deepfakes, cybercriminals imitate trusted voices. Vishing exploded in the second half of 2024, according to the results of a ➡ Read more

Digital Trust Index: Trust in digital services is declining

Digital trust or fear of a data breach influences whether consumers turn to or away from brands, according to the results ➡ Read more