1. Home
  2. |Insights
  3. |NERC Issues “Lesson Learned” From a Cyberattack on an Electricity Control Center

NERC Issues “Lesson Learned” From a Cyberattack on an Electricity Control Center

Client Alert | 2 min read | 09.13.19

On September 4, the North American Electric Reliability Corporation (NERC) issued a “Lessons Learned” from a March 5, 2019 cyberattack on a low-impact grid control center and several small power generation sites in the western United States.  NERC’s assessment provides guidance to NERC-registered entities on this incident, which was previously reported to the U.S. Department of Energy.

The cyber disruption is described as “brief (i.e. less than five minutes) outages of internet-facing firewalls that controlled communications between the control center and multiple remote generation sites and between equipment on these sites.” These outages continued over a 10-hour period.  NERC concludes that these outages “had no impact to generation” and notes that the targeted NERC-registered entity mitigated the immediate risks and then undertook corrective actions “to reduce the likelihood of an event with a similar cause from happening again.”

NERC’s release details “good cyber security policies and procedures.” This guidance is intended “to provide industry with technical and understandable information that assists them with maintaining the reliability of the bulk power system,” and invites interested parties both to comment on the guidance document, and to contact NERC or the Western Electric Coordinating Council (WECC) directly.

Among other things, NERC underscores the need to utilize technical actions along with effective policies, including the need to

  • timely know what exploitable vulnerabilities are on a network,
  • closely monitor vendor firmware updates and patch releases, and
  • implement appropriate patch management practices to address known vulnerabilities. 

As NERC recognizes, an important lesson from this event is that the victim entity had not identified the vulnerability on its network before the attack and, thus, had not implemented the firmware update available from the firewall vendor that would have closed it–a fact pattern that is too frequently at the heart of cybersecurity incidents.

Additional technical concepts highlighted by NERC include

  • reducing and controlling the attack surface by having as few internet-facing devices as possible,
  • implementing layered defenses (e.g., screening router, virtual private network terminator and a firewall) rather than relying on only a firewall, and
  • segmenting networks (i.e.,  restricting lateral communication to necessary and expected network traffic). 

NERC also identifies useful third party resources, such as external vulnerability scanning (through DHS or security vendors), vulnerability tracking sites, and participation in the Electricity Information Sharing and Analysis Center (E-ISAC).

The March 5 event qualifies as what is becoming a flock of canaries in the cybersecurity coal mine.  NERC, together with the multiple other federal agencies partly responsible in this space (including DOE, FERC, and WECC) are necessarily balancing the need for useful disclosure to the industry against the perils of providing road maps to potential bad actors looking for disruptive opportunities.  Owners of critical energy infrastructure in the electric power sector are advised to review carefully NERC’s guidance, to benchmark NERC’s recommendations against their own cybersecurity measures, to rigorously road test those measures in simulated exercises, and to engage with their public governing agencies (e.g., NERC, DHS, DOE) and private groups and vendors (e.g., E-ISAC, supply chain, /vendors) to timely share cyber threat information and best practices.

Insights

Client Alert | 3 min read | 05.06.24

FTC Imposes $3.17 Million Civil Penalty for Violation of Prior Made in USA Order

Last week, based on a referral from the Federal Trade Commission (“FTC”), the Department of Justice (“DOJ”) filed a complaint against Williams-Sonoma alleging that the company violated a previous Federal Trade Commission decision and order dated July 13, 2020 (the “2020 Order”) pursuant to which Williams-Sonoma was prohibited from making unsubstantiated U.S. origin claims. The complaint alleged that, following entry of the 2020 Order, Williams-Sonoma made “numerous false and unsubstantiated representations that their home goods or other products are ‘Made in USA’ or otherwise of U.S. origin, when, in fact, they are wholly imported or contain significant imported components.”...