Industry Defence Insights

Cybersecurity Challenges in Renewable Energy Systems

Jarek Sordyl Season 2 Episode 1

Could the future of renewable energy be hanging by a thread? Uncover the looming cyber threats that target our most sustainable energy infrastructures, from sprawling solar farms to the solar panels atop your neighbor's house. In this episode, we promise to explore the vulnerabilities lurking in outdated software and interconnected systems like IoT and 5G that make our renewable energy facilities an enticing target for cybercriminals. You'll hear real-world accounts of how ransomware and wiper malware have already disrupted power flow, emphasizing the critical need for a robust defensive strategy.

Join us as we delve into the double-edged sword of artificial intelligence in the energy sector, where its capacity to drive efficiency is met with equally potent security threats such as data manipulation and adversarial machine learning. We further inspect the complexities introduced by 5G technology, illuminating how its vast web of interconnected devices can serve as both a boon and a bane. Through the lens of proactive measures like network segmentation and strong authentication, we stress the importance of building resilient systems. Collaboration is key, and as we highlight the ongoing efforts among governments, industries, and researchers, you'll understand why safeguarding the digital future of energy is a collective mission we cannot afford to ignore.

Support the show

Speaker 1:

In today's podcast, we are going to explore the growing threat of cyber attacks targeting renewable energy infrastructure. Welcome back everybody Ready for another deep dive.

Speaker 2:

Absolutely Always ready to dig into something new.

Speaker 1:

Well, today we're taking a look at cyber attacks, but not the kind you might be thinking of. Oh, what have we got this time? It's all about renewable energy systems.

Speaker 2:

Interesting. I don't think that's something most people consider.

Speaker 1:

Definitely not. I mean, when you think about renewable energy, you picture windmills, solar panels. You think about green energy and sustainability right, yeah, makes sense. We're going to flip the script a little. We dug up some research that reveals a whole other side of this. It's about the potential risks no one really talks about.

Speaker 2:

Okay, I'm intrigued. Lay it on me.

Speaker 1:

So cybersecurity huge issue, right, right? Well, how about this? A study found that over half the VPN devices used in you know, like Nordic renewable energy operations were running on outdated software.

Speaker 2:

Outdated, how Like? How outdated are we talking?

Speaker 1:

Really outdated. We're talking 54 percent to be exact. I mean, that's basically waving a big flag at hackers saying, come on in.

Speaker 2:

Yeah, that's not good, but so what? What does that actually mean? I mean, are we talking beta breaches, system failures?

Speaker 1:

We're talking about the potential to completely disrupt the flow of electricity.

Speaker 2:

Whoa, ok, so like lights out for a whole city.

Speaker 1:

Exactly, it could be that serious. I mean, just imagine All it takes is someone forgetting to update the software on like a wind farm's remote access point. And boom no more power a wind farm's remote access point and boom, no more power, precisely. So let's break this down a little. First off, when we say renewable energy systems, what exactly are we including in that?

Speaker 2:

Well, we're talking about everything. I mean massive solar farms and those giant wind turbines you see, but also things like the solar panels you might even have on your own roof.

Speaker 1:

I see.

Speaker 2:

And the real target. What hackers are after, it's not really the equipment itself, but something called operational technology or, you know, ot for short.

Speaker 1:

OK, ok, enlighten me, what's OT.

Speaker 2:

Think of it like the brains and nervous system of all this equipment, the software and hardware that tell a wind turbine how fast to spin, you know. Or a solar panel how much energy to pump into the grid, that kind of thing to spin you know?

Speaker 1:

or a solar panel, how much energy to pump into the grid? That kind of thing Gotcha. So why are these OT systems suddenly such a hot target for hackers?

Speaker 2:

Well, there's a few reasons, really, For one, renewable energy is. Well, it's everywhere now, and it's becoming more and more crucial to how we live our lives. The more we rely on these systems, the bigger the impact if something goes wrong.

Speaker 1:

Makes sense. The more important it is, the higher the stakes.

Speaker 2:

Exactly. Second, these systems are getting super complex. You've got the Internet of Things, 5G, all this stuff getting tied in, so they're more connected. Yeah, and while that's great for efficiency and all that, it also creates more ways for, you know, for hackers to get in.

Speaker 1:

Right, more complexity, more vulnerabilities, I get it. So this isn't all just hypothetical, is it? Are we actually seeing cyber attacks on these renewable energy systems?

Speaker 2:

Oh yeah, this is happening right now. We've seen attacks on wind and solar farms, like in the Nordic region and get this. Even home solar panels have been targeted.

Speaker 1:

Home solar panels. Wow, that's unsettling. I guess you never think of your own house as like a potential target.

Speaker 2:

Yeah, and it really shows you that this issue goes way beyond. Just like big power plants, it can hit anyone, anywhere and, you know, even seemingly unrelated events can have unexpected consequences. Remember that Viasat satellite attack.

Speaker 1:

Vaguely Refresh my memory.

Speaker 2:

It was mainly aimed at those satellite internet services, but it ended up having a knock-on effect. It actually messed with the operation of some wind farms in Germany.

Speaker 1:

Wow, that's crazy. So we've established these attacks are happening, but what tools are these hackers using? What are they doing to infiltrate these systems?

Speaker 2:

You know ransomware is a big one. But it's evolved. It's not just locking up your data anymore what do you? Mean. Think about it. Ransomware can jump from a company's like everyday it systems to its ot systems. So picture this a hacker could theoretically shut down an entire wind farm just by you know, starting with someone's email.

Speaker 1:

That's insane and I bet that kind of shutdown would be ridiculously costly.

Speaker 2:

Oh, absolutely. You lose energy production, the operators lose money. It's a mess. It could even like destabilize the whole power grid. And then there's this other thing called wiper malware, which is even worse.

Speaker 1:

Wiper malware. It doesn't sound good.

Speaker 2:

It's not. Instead of holding data hostage, the stuff is designed to completely destroy it. It cripples systems like permanently.

Speaker 1:

That's basically digital scorched earth.

Speaker 2:

Pretty much. But you know what gets me. Why are these systems so vulnerable in the first place? You'd think security would be, you know, top of the list. You'd think so right, but it's not always the case. One of the biggest issues is this lack of separation between IT and OT systems.

Speaker 1:

What do you mean by?

Speaker 2:

separation. It's like hackers can get to the the critical stuff, the important infrastructure, just by getting into a company's regular network first.

Speaker 1:

It's like the front door is wide open.

Speaker 2:

Pretty much, yeah, and it's not always some super complicated hack either. Think back to those outdated VPN devices we talked about. Right A lot of those are running on old software. You know the kind with known security flaws. It's basically like leaving your front door unlocked and hoping for the best.

Speaker 1:

Not the best strategy. Okay, so bad security practices are a big part of the problem. Anything else?

Speaker 2:

Well, you know, all this new technology, we were talking about how it makes everything more complex.

Speaker 1:

Yeah.

Speaker 2:

That's a bit of a double-edged sword Sure. It makes renewable energy more efficient, but it also gives those hackers more ways to attack.

Speaker 1:

It's like trying to innovate while constantly looking over your shoulder. Huh.

Speaker 2:

Mm.

Speaker 1:

So what can we do? I mean, we can't just unplug everything, right?

Speaker 2:

Of course not. But we can't ignore the problem either. There are things we can do, strategies to you know, to make things safer.

Speaker 1:

Okay, let's hear it. What's the plan?

Speaker 2:

It's a whole different ball game, you know, when it comes to renewable energy, it's not just about replacing, you know, fossil fuels with something else. What?

Speaker 1:

do you?

Speaker 2:

mean it's like we're changing the whole landscape of how energy is made, you know, and how it gets to everyone, and that throws a whole new wrench into the cybersecurity situation.

Speaker 1:

OK, I'm listening how so.

Speaker 2:

Think about it Traditional power plants, they're kind of all in one place, right One big target.

Speaker 1:

Right.

Speaker 2:

But with solar and wind it's all spread out like hundreds of wind turbines all over the place, or even thousands of homes with solar panels all feeding back into the grid.

Speaker 1:

So instead of one big target, you've got tons of little ones, each one a potential weak spot.

Speaker 2:

Exactly. And it's not just the number either, it's the access. You know those turbines, a lot of them are in the middle of nowhere.

Speaker 1:

Right.

Speaker 2:

Someone's got to go out there and maintain them, so they need a way to access them remotely.

Speaker 1:

Yeah, to keep them running.

Speaker 2:

Exactly, but those access points, they're like gold mines for hackers. If they aren't secure, they can get in using stolen passwords, exploit weak spots in the software. They can even plant malware on a technician's laptop to get a foothold.

Speaker 1:

So it's not just about hacking into some central control system. They can get in from anywhere.

Speaker 2:

You got it. And once they're in one system they can kind of jump around, you know, looking for other weaknesses, escalating their access. One compromised device and it's a domino effect.

Speaker 1:

So let's say they get in. What are these hackers actually trying to do?

Speaker 2:

What's the goal? Well, sometimes it's simple Money, just like with that ransomware we talked about.

Speaker 1:

Yeah.

Speaker 2:

But it can be other things too Disruption, you know, just causing chaos, sabotage, even espionage.

Speaker 1:

Espionage like spying, Come on.

Speaker 2:

No, I'm serious, this is a real thing. Foreign governments trying to steal secrets about renewable energy technology or trying to figure out how a country's energy grid works, you know, for strategic reasons.

Speaker 1:

So it's like a cyber cold war using energy as a weapon.

Speaker 2:

Kind of yeah, and don't forget about those home solar systems we talked about. Attacks on those might be more about like disrupting things on a smaller scale or even using those hacked devices as part of a bigger attack, you know.

Speaker 1:

So the implications go way beyond just turning off the lights in a city.

Speaker 2:

Way beyond. It's about control. It's about using these systems for all sorts of bad stuff, but the good news is people are starting to take this seriously.

Speaker 1:

Oh yeah, so what's being done?

Speaker 2:

We're seeing more money going into cybersecurity research, specifically for these OT systems. Governments are making new rules to make critical infrastructure, including these renewable energy facilities, more secure, and industry groups they're starting to work together more, sharing information and stuff.

Speaker 1:

That's good to hear. What kind of rules are we talking about?

Speaker 2:

Well, like in Europe, they've got this thing called the NIS directive, that's the Network and Information Security Directive.

Speaker 1:

Catchy. What's it do?

Speaker 2:

Basically, it says that companies running essential services, like you know, energy providers they have to take security seriously and they have to report any major cyber incidents.

Speaker 1:

So someone's keeping an eye on them.

Speaker 2:

You got it, and here in the US the Department of Energy has this program called CEDS.

Speaker 1:

CEDS. What's that stand for?

Speaker 2:

Cybersecurity for Energy Delivery Systems. It's all about strengthening the energy sector's cybersecurity posture, you know, making them less vulnerable.

Speaker 1:

So cybersecurity is not just some IT issue anymore. It's a national security issue.

Speaker 2:

Big time, and as we move towards a more digital energy future, this is only going to become more and more important.

Speaker 1:

Absolutely so. We've got the rules in place. What else needs to happen?

Speaker 2:

I think we need to get everyone on the same page Right now. There's a lot of groups involved in this renewable energy cybersecurity thing, but they're not always talking to each other.

Speaker 1:

Okay, like who.

Speaker 2:

You've got your IT security people who know all about cyber threats. You've got your OT engineers who know how these systems work. Then you have the policymakers making the rules and the researchers developing new security tech.

Speaker 1:

So everyone has their own piece of the puzzle, but they're not putting it together.

Speaker 2:

Yeah, pretty much. We need more teamwork, more communication, you know, sharing what works, what doesn't work.

Speaker 1:

So everyone benefits.

Speaker 2:

Exactly Because we're not dealing with a static problem here. Everything's changing so fast. It's not enough to just set up some security measures and call it a day.

Speaker 1:

So we need to adapt.

Speaker 2:

We need to be one step ahead. That's where sharing information about new threats and vulnerabilities is so important. You know, like a neighborhood watch, but for cyber threats.

Speaker 1:

I like that Everyone looking out for each other.

Speaker 2:

Exactly a stronger defense together. So we've covered a lot of ground here the different ways hackers are targeting these energy systems, what they're after, and how we can make things more secure. But before we go any further, I want to ask you, the listener, something.

Speaker 1:

OK, shoot.

Speaker 2:

Do you think enough is being done to protect our critical infrastructure, especially these renewable energy systems, or are we falling behind?

Speaker 1:

That's a good question, one we should all be thinking about. All right, so we're back and ready to talk about the future. You know what's coming next for cybersecurity and renewable energy. We've looked at what's happening now, but what about you know down the line as these systems get even more complex?

Speaker 2:

What new challenges are we looking at? Well, one of the biggest things on the horizon is artificial intelligence.

Speaker 1:

You know? Ai, ai, right, everyone's talking about it.

Speaker 2:

For good reason. It could completely change how we manage energy, how these renewable systems work, make them more efficient, more reliable. But you know there's two sides to every coin.

Speaker 1:

So AI is like this powerful tool, but it could also be a bit of a Pandora's box when it comes to security.

Speaker 2:

Exactly AI systems. They need a ton of data to learn and make decisions. If that data gets messed with well, it could be a disaster.

Speaker 1:

So like a hacker could trick an AI system into doing something bad, like overloading a power grid or shutting down something critical.

Speaker 2:

Exactly. It wouldn't even have to be some big, obvious attack. Imagine a hacker just subtly tweaking the data that an AI system uses to control a power grid.

Speaker 1:

So it's like giving a malicious actor the keys to the kingdom, but they're disguised as just another line of code.

Speaker 2:

That's a good way to put it, and it's not just about messing with data either. Hackers are getting better at attacking AI systems directly. There's this thing called adversarial machine learning.

Speaker 1:

Adversarial machine learning Sounds intense.

Speaker 2:

It is? It's like they can poison the data that these AI systems use to learn, you know, make them make bad decisions.

Speaker 1:

So, for example, a hacker could feed an AI system false data about like wind speeds or how much sunlight there is, and that could mess up energy production.

Speaker 2:

Exactly. It's a constant arms race. The attackers are always trying to find new ways in and we're trying to stay one step ahead.

Speaker 1:

So AI is a big one. What else is coming down the pipeline that we need to be thinking about?

Speaker 2:

5G, you know, the next generation of wireless technology. Everyone's excited about it and it has a lot of potential for the energy sector too, but it also creates a lot more opportunities for attacks.

Speaker 2:

More ways for hackers to get in 5G uses a whole network of devices, software, infrastructure, all that stuff and every single component is a potential weak point. And because 5G connects so many devices, a single attack could have huge consequences. Think about it A hacker could take control of thousands of smart meters. You know the things that track energy use in homes and businesses. They can manipulate all that data or even just shut everything down.

Speaker 1:

So it's kind of like adding more lanes to a highway but not having enough police to patrol it.

Speaker 2:

Yeah, kind of like that. And to make it even more complicated, we're seeing this blurring of the lines between IT, you know, the information technology side, and OT, the operational technology side.

Speaker 1:

Because everything's becoming more connected with smart grids and all that.

Speaker 2:

Exactly, and that creates a perfect storm for cybersecurity, because if one system gets compromised, it can easily spread to the other. It's all interconnected.

Speaker 1:

So it feels like we're facing this like overwhelming wave of new threats. What can we even do about it? Are we just doomed to a future of constant cyber attacks?

Speaker 2:

I wouldn't say doomed. It's a challenge, for sure, but it's not hopeless. The most important thing is to be proactive. Think about security right from the start. Build these systems with resilience in mind.

Speaker 1:

So don't just try to bolt on security measures as an afterthought. Make it part of the design from day one.

Speaker 2:

That's it, and we have to keep learning, keep adapting new tools, new techniques. We have to stay ahead of the game. Things like you know, really strong network segmentation, keeping those critical OT systems separate from the more vulnerable IT networks.

Speaker 1:

Right. So it's harder for hackers to move around once they get in.

Speaker 2:

Exactly, and making sure everyone has strong passwords using multi-factor authentication, that kind of thing. And then you need constant monitoring, threat detection, keeping software up to date, incident response plans in case something does happen.

Speaker 1:

So it's a multi-pronged approach.

Speaker 2:

Yeah, it's a whole ecosystem of things and we can't do it alone. We need to work together Governments, industry, researchers. We need to share information. You know about threats, about best practices.

Speaker 1:

Collaboration is key.

Speaker 2:

Absolutely. The future of energy is digital and it's up to all of us to protect it.

Speaker 1:

Well said. I think those are some great points to end on. We've talked about the current cyber attacks, the potential risks and what we can do to protect ourselves. It's a complex issue, but it's one we can't afford to ignore. So stay curious, stay informed and, most importantly, stay secure. See you next time.

Speaker 2:

This podcast is supported by OTCert EU cohort.