Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Energy Dept. Invests $30 Million In Utility Security

Contracts will support new tools to protect electrical, gas and oil infrastructures from cyber attacks.

Top 10 Government IT Innovators Of 2013
Top 10 Government IT Innovators Of 2013
(click image for larger view)
In a move to shore up protections for national infrastructure owned by the private sector, the Department of Energy has awarded 11 contracts worth a combined $30 million to develop new tools to protect the electrical grid and gas and oil infrastructures from cyber attacks.

Despite the potential for a cyber attack against this infrastructure to wreak havoc with government, businesses and citizens, there is no legal requirement that utilities harden their computer networks against malicious hackers or malware; defensive measures are voluntary.

The importance of addressing network security issues wasn’t lost on DOE officials. Hackers broke into an Energy Department database in July, making off with personnel data on 53,000 current and former employees and contractors. The DOE cyber incident occurred as a result of a failure to patch a ColdFusion system against known vulnerabilities.

The contracts are part of broader efforts by the Obama administration to focus greater attention on defending the nation's infrastructure networks against cybersecurity threats, a DOE spokesman told InformationWeek. President Obama issued Executive Order 13636 in February that took steps to promote and develop incentives to industry to adopt stronger cybersecurity measures.

DOE originally planned to allocate approximately $20 million to these projects, but elected to increase the funding, a department spokesman said, based on the administration's commitment to cybersecurity and the strength of the 11 proposals.

[ How tight can your belt go? Sequestration II: Expect Budget Rollercoaster In 2014. ]

The contract awardees are:

-- Schweitzer Engineering Laboratories of Pullman, Wash., received three contracts, worth a combined $9.6 million, to develop software that will allow utilities to centrally manage their local area networks and reroute traffic in response to cyber intrusions; to build a radio platform for more secure wireless communications used with remote infrastructure such as substations; and to create an integrated cyber and physical access control system for delivery facilities.

-- Foxguard Solutions of Christiansburg, Va., received a $3.3 million contract to simplify keeping up with software and firmware updates and patches.

-- The National Rural Electric Cooperative Association received a $3.6 million contract to create a network that allows utilities and small electric co-ops, which have more limited in-house resources, to centrally manage their networks with greater security.

-- Georgia Tech Applied Research received a $3.3 million contract to develop technology that can evaluate commands given to energy delivery system controls and look at their effect on power grid operations and trigger cybersecurity responses, if needed, to prevent disruptions.

-- Viasat, in Carlsbad, Calif., received a $3.3 million contract to design an architecture for utilities to be aware of their energy delivery systems' cybersecurity and allow them to respond automatically to intrusions.

-- ABB of Cary, N.C., received a $2.8 million contract to create a system that allows substation devices to coordinate and validate the integrity of communications and evaluate any potential impact of commands on grid operations.

-- The Grid Protection Alliance in Chattanooga, Tenn., received a $2.2 million contract to develop an architecture for more secure substation communications for data produced by energy delivery devices.

-- The Electric Power Research Institute of Palo Alto, Calif., received a $1.5 million contract to design a framework for utilities to centrally manage remote configuration of their energy delivery system devices more securely, in a vendor-neutral way.

-- TT Government Solutions, based in Red Bank, N.J., received a $956,560 contract to create technology to analyze and visualize smartmeter wireless communications in order to quickly identify any unusual behaviors that could be a sign of cyber attack.

The DOE spokesman said that while the contracts have been awarded, negotiations are underway regarding a time frame for deliverables.

The importance of improving cyber protection was outlined in a report released in May by Rep. Henry Waxman and then-Rep. Edward Markey that outlined the scope of cyber attacks against utilities.

For example, "More than a dozen utilities reported 'daily,' 'constant' or 'frequent' attempted cyber attacks ranging from phishing to malware infection to unfriendly probes," the report stated. "One utility reported that it was the target of approximately 10,000 attempted cyber attacks each month."

The congressional report noted that most of the utilities that responded to the congressional survey said that, while they have complied with any mandatory requirements established by the North American Electric Reliability Corp. (an industry organization that establishes reliability standards), few had implemented any of the voluntary measures that NERC has recommended.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
9/24/2013 | 4:49:48 PM
re: Energy Dept. Invests $30 Million In Utility Security
My thinking as well. One would think the utilities would see the value of making these investments on their own.
WKash
50%
50%
WKash,
User Rank: Apprentice
9/23/2013 | 9:53:43 PM
re: Energy Dept. Invests $30 Million In Utility Security
It's good to see investments focused on infrastructure security. But it remains to be seen whether the private sector will embrace what comes out of these programs.
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17612
PUBLISHED: 2019-10-15
An issue was discovered in 74CMS v5.2.8. There is a SQL Injection generated by the _list method in the Common/Controller/BackendController.class.php file via the index.php?m=Admin&c=Ad&a=category sort parameter.
CVE-2019-17613
PUBLISHED: 2019-10-15
qibosoft 7 allows remote code execution because do/jf.php makes eval calls. The attacker can use the Point Introduction Management feature to supply PHP code to be evaluated. Alternatively, the attacker can access admin/index.php?lfj=jfadmin&action=addjf via CSRF, as demonstrated by a payload in...
CVE-2019-17395
PUBLISHED: 2019-10-15
In the Rapid Gator application 0.7.1 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-17602
PUBLISHED: 2019-10-15
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
CVE-2019-17394
PUBLISHED: 2019-10-15
In the Seesaw Parent and Family application 6.2.5 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.