Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Australian Electricity Provider ‘CS Energy’ Hit by Ransomware

Australian electricity provider CS Energy has been hit by a ransomware attack, but the company says electricity generation has not been affected and it has denied claims that the attack was conducted by a state-sponsored threat group.

The attack was discovered on November 27 and the company informed the public about the incident a few days later.

Australian electricity provider CS Energy has been hit by a ransomware attack, but the company says electricity generation has not been affected and it has denied claims that the attack was conducted by a state-sponsored threat group.

The attack was discovered on November 27 and the company informed the public about the incident a few days later.

Queensland-based CS Energy, which is owned by the local government, provides electricity to millions of homes, as well as to large commercial and industrial customers in Queensland.

CS Energy said the ransomware compromised devices on its corporate network, which was quickly isolated from other internal networks to prevent the malware from spreading. Safety and operations at its Kogan Creek and Callide power stations were not impacted, nor was power generation and delivery.

The company is working on restoring affected systems and noted that “Australia’s National Electricity Market is designed to ensure there is enough power generation and network capacity to securely meet customer demand, even in the event of unexpected outages of transmission lines and generators.”

Some local news publications claimed — citing sources — that the attack on the energy firm has been linked to Chinese state-sponsored hackers. In response, CS Energy issued a statement on Wednesday to clarify that there was no indication of the attack being “state-based.”

In fact, it appears that the attack involved the well-known Conti ransomware, whose operators not only encrypt files on compromised systems, but also steal valuable data in an effort to convince the victim to pay a ransom.

Conti operators run a website where they leak the data of victims that refuse to pay up. CS Energy has been listed on that site since November 27, but the cybercriminals have yet to make public any files associated with the energy company.

CS Energy is not the only electric utility hit by ransomware in recent days. The Delta-Montrose Electric Association (DMEA), a rural electric cooperative that serves more than 34,000 customers in Colorado, suffered significant disruption and damage as a result of a ransomware attack last month, but its power grid was not impacted.

DMEA admitted that the attack resulted in disruption to email, phone and billing systems, as well as the loss of historical data dating back more than 20 years.

Related: Rural Alabama Electric Cooperative Hit by Ransomware Attack

Related: More Threat Groups Target Electric Utilities in North America

Related: Massachusetts Electric Utility Hit by Ransomware

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...