Hackers focus energy on solar sector

Powered by SC Magazine
 

Design documents stolen.

Researchers at security management company AlienVault are tracking highly skilled espionage group that is targeting two US manufacturers of solar panels.

The hacker group, thought to be from China, is targeting design documents using complex and well-obfuscated rootkit-like malware.

"It's installing on the kernel level," he said, adding that it was custom built for the attacks and doesn't contain configuration data of the command-and-control server with which it communicates.

"If it's not targeting a wide range of industries, it's much, much more difficult to generate signatures," he said.

By comparison, the Chinese military hacker unit outed by Mandiant in a recent report cast a much wider net and was easier to study after it successfully infiltrated 141 companies representing an assortment of verticals. 

The high-growth energy space is one of the most sought-after industries by foreign espionage groups, according to Blasco.

One of the two solar panel makers is aware they've been targeted and compromised, but he declined to name them.

According to the Solar Energy Industries Association, the total installed capacity of solar energy rose to 1992 megawatts in the third quarter of 2012, a new record.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Hackers focus energy on solar sector
Tags
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1051

Vote