Risk
9/23/2013
11:16 AM
50%
50%

Energy Dept. Invests $30 Million In Utility Security

Contracts will support new tools to protect electrical, gas and oil infrastructures from cyber attacks.

Top 10 Government IT Innovators Of 2013
Top 10 Government IT Innovators Of 2013
(click image for larger view)
In a move to shore up protections for national infrastructure owned by the private sector, the Department of Energy has awarded 11 contracts worth a combined $30 million to develop new tools to protect the electrical grid and gas and oil infrastructures from cyber attacks.

Despite the potential for a cyber attack against this infrastructure to wreak havoc with government, businesses and citizens, there is no legal requirement that utilities harden their computer networks against malicious hackers or malware; defensive measures are voluntary.

The importance of addressing network security issues wasn’t lost on DOE officials. Hackers broke into an Energy Department database in July, making off with personnel data on 53,000 current and former employees and contractors. The DOE cyber incident occurred as a result of a failure to patch a ColdFusion system against known vulnerabilities.

The contracts are part of broader efforts by the Obama administration to focus greater attention on defending the nation's infrastructure networks against cybersecurity threats, a DOE spokesman told InformationWeek. President Obama issued Executive Order 13636 in February that took steps to promote and develop incentives to industry to adopt stronger cybersecurity measures.

DOE originally planned to allocate approximately $20 million to these projects, but elected to increase the funding, a department spokesman said, based on the administration's commitment to cybersecurity and the strength of the 11 proposals.

[ How tight can your belt go? Sequestration II: Expect Budget Rollercoaster In 2014. ]

The contract awardees are:

-- Schweitzer Engineering Laboratories of Pullman, Wash., received three contracts, worth a combined $9.6 million, to develop software that will allow utilities to centrally manage their local area networks and reroute traffic in response to cyber intrusions; to build a radio platform for more secure wireless communications used with remote infrastructure such as substations; and to create an integrated cyber and physical access control system for delivery facilities.

-- Foxguard Solutions of Christiansburg, Va., received a $3.3 million contract to simplify keeping up with software and firmware updates and patches.

-- The National Rural Electric Cooperative Association received a $3.6 million contract to create a network that allows utilities and small electric co-ops, which have more limited in-house resources, to centrally manage their networks with greater security.

-- Georgia Tech Applied Research received a $3.3 million contract to develop technology that can evaluate commands given to energy delivery system controls and look at their effect on power grid operations and trigger cybersecurity responses, if needed, to prevent disruptions.

-- Viasat, in Carlsbad, Calif., received a $3.3 million contract to design an architecture for utilities to be aware of their energy delivery systems' cybersecurity and allow them to respond automatically to intrusions.

-- ABB of Cary, N.C., received a $2.8 million contract to create a system that allows substation devices to coordinate and validate the integrity of communications and evaluate any potential impact of commands on grid operations.

-- The Grid Protection Alliance in Chattanooga, Tenn., received a $2.2 million contract to develop an architecture for more secure substation communications for data produced by energy delivery devices.

-- The Electric Power Research Institute of Palo Alto, Calif., received a $1.5 million contract to design a framework for utilities to centrally manage remote configuration of their energy delivery system devices more securely, in a vendor-neutral way.

-- TT Government Solutions, based in Red Bank, N.J., received a $956,560 contract to create technology to analyze and visualize smartmeter wireless communications in order to quickly identify any unusual behaviors that could be a sign of cyber attack.

The DOE spokesman said that while the contracts have been awarded, negotiations are underway regarding a time frame for deliverables.

The importance of improving cyber protection was outlined in a report released in May by Rep. Henry Waxman and then-Rep. Edward Markey that outlined the scope of cyber attacks against utilities.

For example, "More than a dozen utilities reported 'daily,' 'constant' or 'frequent' attempted cyber attacks ranging from phishing to malware infection to unfriendly probes," the report stated. "One utility reported that it was the target of approximately 10,000 attempted cyber attacks each month."

The congressional report noted that most of the utilities that responded to the congressional survey said that, while they have complied with any mandatory requirements established by the North American Electric Reliability Corp. (an industry organization that establishes reliability standards), few had implemented any of the voluntary measures that NERC has recommended.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
9/24/2013 | 4:49:48 PM
re: Energy Dept. Invests $30 Million In Utility Security
My thinking as well. One would think the utilities would see the value of making these investments on their own.
WKash
50%
50%
WKash,
User Rank: Apprentice
9/23/2013 | 9:53:43 PM
re: Energy Dept. Invests $30 Million In Utility Security
It's good to see investments focused on infrastructure security. But it remains to be seen whether the private sector will embrace what comes out of these programs.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.