Security Experts:

Connect with us

Hi, what are you looking for?



European Electrical Energy Organization Discloses Breach

The European Network of Transmission System Operators for Electricity (ENTSO-E) revealed this week that malicious actors breached its corporate network.

The European Network of Transmission System Operators for Electricity (ENTSO-E) revealed this week that malicious actors breached its corporate network.

ENTSO-E represents 42 electricity transmission system operators (TSOs) from 35 countries in Europe. TSOs are responsible for the transmission of electric power across the main high-voltage networks, and ENTSO-E works with them on the implementation of energy policies and achieving Europe’s energy and climate policy objectives.

“A risk assessment has been performed and contingency plans are now in place to reduce the risk and impact of any further attacks,” the organization said in a brief statement. “Our TSO members have been informed and we continue to monitor and assess the situation.”

ENTSO-E highlighted that the affected office network is not connected to any operational TSO system.

Some of the affected TSOs have released statements regarding the incident. Norway’s Statnett, Finland’s Fingrid and Switzerland’s Swissgrid all said there was no indication that their own systems had been compromised.

Fingrid said the incident only impacts file exchange policies between the organization and ENTSO-E. However, as a result of the attack, Fingrid said there would be some delays in issuing energy identification codes to electricity suppliers and producers.

“This is a strategic move by the adversary to focus on a centralized target in order to impact multiple European electrical grids at the same time,” Phil Neray, VP of IoT & industrial cybersecurity at CyberX, told SecurityWeek. “Compromising IT networks is simply the first step in gaining access to OT control networks. And the current coronavirus crisis compounds the issue by causing a shortage of people to spot these intrusions, highlighting the need for more automated approaches to immediately identify anomalous or unauthorized behavior in the network so attacks can quickly be mitigated before affecting the safety of wide populations.”

Industrial cybersecurity firm Dragos pointed out that the New Mexico Public Regulation Commission (NMPRC) was also recently targeted in a cyberattack. The NMPRC is a state regulatory body for the utilities, telecom and motor carrier sectors, and it keeps records of technical information on power plants and other utilities.

“The intrusions at ENTSO-E and NMPRC do not appear to be related but demonstrate the potential for adversaries to target such organizations to further attack objectives on the electric utilities or energy organizations working with the target companies. These intrusions – both in Europe and the U.S. – impact organizations that do not manage or control any industrial assets but are linked to various ICS entities for regulatory or similar reasons. Based on this connection, a successful intrusion at one of the victim entities could be leveraged to facilitate follow-on access or exploitation at supported utility organizations,” Dragos warned.

The company added, “An attacker may access these organizations to harvest sensitive information about supported entities. This may facilitate information gathering and target development operations while avoiding any direct access to the victims. As a result, the attacker would effectively expose information from several organizations at the same time through a single intrusion.”

Related: Massachusetts Electric Utility Hit by Ransomware

Related: Hackers Behind ‘Triton’ Malware Target Electric Utilities in US, APAC

Related: Ransomware Causes Disruptions at Johannesburg Power Company

Related: Cyberattack Disrupted Firewalls at U.S. Power Utility

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.