Hackers focus energy on solar sector

Powered by SC Magazine
 

Design documents stolen.

Researchers at security management company AlienVault are tracking highly skilled espionage group that is targeting two US manufacturers of solar panels.

The hacker group, thought to be from China, is targeting design documents using complex and well-obfuscated rootkit-like malware.

"It's installing on the kernel level," he said, adding that it was custom built for the attacks and doesn't contain configuration data of the command-and-control server with which it communicates.

"If it's not targeting a wide range of industries, it's much, much more difficult to generate signatures," he said.

By comparison, the Chinese military hacker unit outed by Mandiant in a recent report cast a much wider net and was easier to study after it successfully infiltrated 141 companies representing an assortment of verticals. 

The high-growth energy space is one of the most sought-after industries by foreign espionage groups, according to Blasco.

One of the two solar panel makers is aware they've been targeted and compromised, but he declined to name them.

According to the Solar Energy Industries Association, the total installed capacity of solar energy rose to 1992 megawatts in the third quarter of 2012, a new record.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Hackers focus energy on solar sector
Tags
 
 
 
Top Stories
Parliament passes law to let ASIO tap entire internet
Greens effort to limit devices fails.
 
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1388

Vote