Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Energy Chief Cites Risk of Cyberattacks Crippling Power Grid

Energy Secretary Jennifer Granholm on Sunday called for more public-private cooperation on cyber defenses and said U.S. adversaries already are capable of using cyber intrusions to shut down the U.S. power grid.

Energy Secretary Jennifer Granholm on Sunday called for more public-private cooperation on cyber defenses and said U.S. adversaries already are capable of using cyber intrusions to shut down the U.S. power grid.

“I think that there are very malign actors who are trying,” she said. She added: “Even as we speak, there are thousands of attacks on all aspects of the energy sector and the private sector generally.”

Power grid cybersecurityGranholm noted, without mentioning the company by name, that Colonial Pipeline Co. was hit in May with a crippling cyberattack by a ransomware group. Colonial temporarily shut down its gasoline distribution networks in the South before paying $4.4 million to the hackers. She urged energy companies to resist paying ransom.

“The bottom line is, people, whether you’re private sector, public sector, whatever, you shouldn’t be paying ransomware attacks, because it only encourages the bad guys,” she said.

Granholm even spoke in favor of having a law that would ban paying such ransom, though she said, “I don’t know whether Congress or the president is at that point.”

Asked whether American adversaries have the capability now of shutting down the U.S. power grid, she said: “Yes, they do.”

Former Secretary of State Condoleezza Rice said the United States and other countries should talk to countries such as Russia, which is believed to be the origin on some ransomware attacks, about law enforcement and intelligence cooperation “to shut it down.”

Rice said this would “test the reality of how much the Russian government is or is not involved” in these attacks.

Granholm was on CNN’s “State of the Union” and NBC’s “Meet the Press,” and Rice appeared on “Face the Nation” on CBS.

Related: Electricity Distribution Systems at Increasing Risk of Cyberattacks, GAO Warns

Related: Domain Name Security Neglected by U.S. Energy Companies: Report

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...