Hackers focus energy on solar sector

Powered by SC Magazine
 

Design documents stolen.

Researchers at security management company AlienVault are tracking highly skilled espionage group that is targeting two US manufacturers of solar panels.

The hacker group, thought to be from China, is targeting design documents using complex and well-obfuscated rootkit-like malware.

"It's installing on the kernel level," he said, adding that it was custom built for the attacks and doesn't contain configuration data of the command-and-control server with which it communicates.

"If it's not targeting a wide range of industries, it's much, much more difficult to generate signatures," he said.

By comparison, the Chinese military hacker unit outed by Mandiant in a recent report cast a much wider net and was easier to study after it successfully infiltrated 141 companies representing an assortment of verticals. 

The high-growth energy space is one of the most sought-after industries by foreign espionage groups, according to Blasco.

One of the two solar panel makers is aware they've been targeted and compromised, but he declined to name them.

According to the Solar Energy Industries Association, the total installed capacity of solar energy rose to 1992 megawatts in the third quarter of 2012, a new record.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Hackers focus energy on solar sector
Tags
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1014

Vote