Intersys Logo
Menu

Managed IT Support

A Reasonable, Fixed Monthly Fee for All Your IT Needs
Managed IT Support Provider

Consulting Services

The High Level IT Consulting Services You Need to Transform Your Business
Get IT Consulting Services

Cyber Security

A Comprehensive Range of Cyber Security Services for Robust, Industry-Leading Protection
Get Cyber Security Services

IT Solutions

Whatever your IT needs, we'll create a tailormade solution for you
Get IT Solutions

2016: National Critical Infrastructure affected by Malware for the first time

In early January, 80,000 people lost power, following a well planned and coordinated attack on the Ukraine’s power grid.

This represents the first successful attack on a nation’s Critical Infrastructure and, considering the volume of known compromises of SCADA systems, ushers in a new era of cyber warfare.

Initial reports attribute the attack on the seven Ukranian power stations, which wiped out power for 6 hours, to Russia: arguably, this atta was so well planned and executed that only the resources of a nation state were sufficient for success;  certainly Russia has both the capability and political motivation.

As well as the initial impact, the attack also wiped systems to delay Ukraine’s ability to restore power. Whilst the infamous Stuxnet targeted  the centrifuges of the Iranian nuclear programme and there’s a parallel with attacking the SCADA* systems of the Ukranian power grid, the attack on Iran (and subsequent unsuccessful US Stuxnet attack on North Korea), these didn’t have the capacity to affect the country’s population directly via its ‘Critical Infrastructure’ — i.e. the underlying requirements of the entire country, disruption of which threatens lives or operation of the nation.

UPDATE: Ukrainian Airports are on alert, following discovery of the same BlackEnergy Malware on a system at the country’s largest airport.

*SCADA (supervisory control and data acquisition) are specialised systems which typically control industrial and manufacturing plant systems and processes. They’re often isolated networks which arguably shouldn’t be connected to public networks for security reasons, however this distinction is becoming increasingly difficult in a fundamentally connected world.

Stay up to date with IT Industry news

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

In other news

December 4, 2023

A Haven of Hope

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram