Operations

2/6/2018
03:50 PM
50%
50%

Ukraine Power Distro Plans $20 Million Cyber Defense System

After NotPetya and severe blackouts, Ukrenergo responds with an investment in cybersecurity.

Ukrenergo, Ukraine's state-run power distributor, will invest up to $20 million in a new cyber defense system, according to its chief executive Vsevolod Kovalchuk, reports Reuters

The Ukrainian energy industry has been a hot target for threat actors in recent years. On Dec. 23, 2015, attackers used stolen user credentials to remotely access and manipulate the industrial control systems of three regional power firms and shut down power for 225,000 customers in Western Ukraine. One year later, a power outage in Kiev Dec. 16, 2016 was also confirmed to be caused by a cyberattack, and linked to the same group of threat actors as the 2015 blackout. Ukrenergo was also a victim of the NotPetya outbreak in June 2017.

Kovalchuk told reporters in a briefing that the $20 million investment would go both to security technology and administrative action, and would be in place by 2020.

"We have developed a new concept of cybersecurity whose key goal is to make it physically impossible for external threats to affect the Ukrainian energy system," he said, reports Reuters.

For more information, read here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-9574
PUBLISHED: 2018-07-19
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
CVE-2017-2673
PUBLISHED: 2018-07-19
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.
CVE-2017-7481
PUBLISHED: 2018-07-19
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templati...
CVE-2018-12911
PUBLISHED: 2018-07-19
WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.
CVE-2018-14404
PUBLISHED: 2018-07-19
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulne...