Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Energy Dept. Invests $30 Million In Utility Security

Contracts will support new tools to protect electrical, gas and oil infrastructures from cyber attacks.

Top 10 Government IT Innovators Of 2013
Top 10 Government IT Innovators Of 2013
(click image for larger view)
In a move to shore up protections for national infrastructure owned by the private sector, the Department of Energy has awarded 11 contracts worth a combined $30 million to develop new tools to protect the electrical grid and gas and oil infrastructures from cyber attacks.

Despite the potential for a cyber attack against this infrastructure to wreak havoc with government, businesses and citizens, there is no legal requirement that utilities harden their computer networks against malicious hackers or malware; defensive measures are voluntary.

The importance of addressing network security issues wasn’t lost on DOE officials. Hackers broke into an Energy Department database in July, making off with personnel data on 53,000 current and former employees and contractors. The DOE cyber incident occurred as a result of a failure to patch a ColdFusion system against known vulnerabilities.

The contracts are part of broader efforts by the Obama administration to focus greater attention on defending the nation's infrastructure networks against cybersecurity threats, a DOE spokesman told InformationWeek. President Obama issued Executive Order 13636 in February that took steps to promote and develop incentives to industry to adopt stronger cybersecurity measures.

DOE originally planned to allocate approximately $20 million to these projects, but elected to increase the funding, a department spokesman said, based on the administration's commitment to cybersecurity and the strength of the 11 proposals.

[ How tight can your belt go? Sequestration II: Expect Budget Rollercoaster In 2014. ]

The contract awardees are:

-- Schweitzer Engineering Laboratories of Pullman, Wash., received three contracts, worth a combined $9.6 million, to develop software that will allow utilities to centrally manage their local area networks and reroute traffic in response to cyber intrusions; to build a radio platform for more secure wireless communications used with remote infrastructure such as substations; and to create an integrated cyber and physical access control system for delivery facilities.

-- Foxguard Solutions of Christiansburg, Va., received a $3.3 million contract to simplify keeping up with software and firmware updates and patches.

-- The National Rural Electric Cooperative Association received a $3.6 million contract to create a network that allows utilities and small electric co-ops, which have more limited in-house resources, to centrally manage their networks with greater security.

-- Georgia Tech Applied Research received a $3.3 million contract to develop technology that can evaluate commands given to energy delivery system controls and look at their effect on power grid operations and trigger cybersecurity responses, if needed, to prevent disruptions.

-- Viasat, in Carlsbad, Calif., received a $3.3 million contract to design an architecture for utilities to be aware of their energy delivery systems' cybersecurity and allow them to respond automatically to intrusions.

-- ABB of Cary, N.C., received a $2.8 million contract to create a system that allows substation devices to coordinate and validate the integrity of communications and evaluate any potential impact of commands on grid operations.

-- The Grid Protection Alliance in Chattanooga, Tenn., received a $2.2 million contract to develop an architecture for more secure substation communications for data produced by energy delivery devices.

-- The Electric Power Research Institute of Palo Alto, Calif., received a $1.5 million contract to design a framework for utilities to centrally manage remote configuration of their energy delivery system devices more securely, in a vendor-neutral way.

-- TT Government Solutions, based in Red Bank, N.J., received a $956,560 contract to create technology to analyze and visualize smartmeter wireless communications in order to quickly identify any unusual behaviors that could be a sign of cyber attack.

The DOE spokesman said that while the contracts have been awarded, negotiations are underway regarding a time frame for deliverables.

The importance of improving cyber protection was outlined in a report released in May by Rep. Henry Waxman and then-Rep. Edward Markey that outlined the scope of cyber attacks against utilities.

For example, "More than a dozen utilities reported 'daily,' 'constant' or 'frequent' attempted cyber attacks ranging from phishing to malware infection to unfriendly probes," the report stated. "One utility reported that it was the target of approximately 10,000 attempted cyber attacks each month."

The congressional report noted that most of the utilities that responded to the congressional survey said that, while they have complied with any mandatory requirements established by the North American Electric Reliability Corp. (an industry organization that establishes reliability standards), few had implemented any of the voluntary measures that NERC has recommended.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
9/24/2013 | 4:49:48 PM
re: Energy Dept. Invests $30 Million In Utility Security
My thinking as well. One would think the utilities would see the value of making these investments on their own.
WKash
50%
50%
WKash,
User Rank: Apprentice
9/23/2013 | 9:53:43 PM
re: Energy Dept. Invests $30 Million In Utility Security
It's good to see investments focused on infrastructure security. But it remains to be seen whether the private sector will embrace what comes out of these programs.
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...