Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecurityCybersecurity NewsInfrastructure:Electric,Gas & Water

Could Russia launch a cyberattack on the US power grid?

By Robert R. Ackerman Jr.
power grid security
March 24, 2022

A highly disturbing and realistic possibility — one, in fact, that has been a headache for years — has moved up a notch amid the Russia-sparked war in Ukraine. Russia could launch a devastating attack on the U.S. power grid. The country has inflicted malware on America in the past and might not be particularly concerned about the ramifications.

After all, Russian President Vladimir Putin has already hinted that weapons deliveries to Ukraine by the U.S. and other NATO nations may be an act of war. Russia, as well as China, Iran and North Korea, are believed to have the means to successfully attack the U.S. power grid.

Independent cybersecurity researchers have already been urging the federal government to move quickly to release any information it might collect about potential cyber campaigns, including a nationwide power grid attack. They don’t want to see a repeat of 2016, when U.S. officials waited months before blaming Russia for trying to influence the presidential election that year by hacking and disseminating Democrats’ emails.

Far worse could be yet to come if Putin or Russia-based cybercriminals decide to retaliate against the West.

History of power grid attacks

The U.S. electric grid is comprised of power plants and other electricity generators coupled with transmission and distribution lines and related infrastructure. Strong electric grid cybersecurity is critical to safeguarding the reliability and resilience of the grid. If the grid is penetrated by malware, tens of millions of Americans, possibly far more, could be left without heat, light, refrigeration, water, phones and internet access.

The prospect of a potential attack should not be confused with idle speculation. Power grid attacks have already occurred elsewhere, and Russia has at times been deemed the likely culprit. In particular, a cyberattack on a utility substation in Ukraine in 2015 impacted 230,000 people for several hours after roughly 60 substations were knocked offline. Cyber experts say Russia has a history of using Ukraine as a test bed of sorts. In the case of the Ukraine, its grid is a relatively small scale cyber operation, making it a comparatively easy pilot target.

Already, cybercriminals worldwide have increasingly been targeting power grids and related energy systems, mindful of their enormous impact on modern society. Last year, a report by IBM said that the energy industry was the third most-targeted sector for such attacks, behind only finance and manufacturing. Third place was up from ninth place in 2019, Big Blue said.

Also last year, Department of Energy Secretary Jennifer Granholm said that enemies of the U.S. had the capability to shut down the nation’s power grid, and added that “there are very malign actors trying, even as we speak.” In January, meanwhile, there were two Department of Homeland Security warnings about threats to the U.S. grid.

To disrupt the power grid, hackers would likely attempt to compromise either multiple grid substations or bigger control centers.

The former type of attack occurred in San Jose, California roughly nine years ago, when gunmen reportedly fired at high voltage transformers at a substation. The unknown criminals, never found, scattered when police were called, but authorities discovered that the attackers had reconnoitered the site and had marked firing positions with piles of rocks.

There are roughly 55,000 such substations nationwide, each housing transformers — the workhorses of the grid. Some power grid experts contend that the entire country could suffer a coast-to-coast blackout if as few as nine select substations were compromised.

The other probable grid attack methodology would target control centers, which span much broader territories. If hackers can disable communications at a control center, cutting a grid operator’s visibility into their system, utility officials could be blocked from reenergizing a line if a substation protective relay is disabled. This would probably require the work of a highly skilled insider. A nefarious electrical engineer, for example, could do a system analysis to determine how best to destabilize the power grid and pass the information to the actual attackers.

Hardening critical infrastructure attack vectors

None of this should suggest that U.S. power grid infrastructure has negligible power grid cyber protection. After a massive blackout in the Northeast in 2003, which was caused by a software bug and equipment failures, critical infrastructure organizations implemented federal resilience and defense standards. These created minimum baselines for defending against natural disasters and also promoted best practices for network defense, including two-factor authentication, network segmentation and strict, widely distributed access controls.

These steps hardened electricity generation and transmission systems against attacks. Unfortunately, however, not all segments of the power grid have been held to these standards. For instance, local power distribution entities often lack adequate resources and defenses. And while hackers may have a harder time fully compromising more formidable targets, they can still achieve many of their goals by probing persistently.

One huge weakness — perhaps unavoidable — is the growing array of digital technologies to help manage the flow of power and cut planet warming emissions, such as interconnected solar arrays and smart thermostats.

The growth of digital online methods aren’t limited to these, either. Energy companies used to disconnect operation systems from the broader internet, making it harder for hackers to penetrate the most critical infrastructure. Increasingly, this is no longer the case, as companies install more sophisticated monitoring and diagnostics software to improve their systems’ operational efficiency. The bottom line is that the power grid is hugely complex, providing hackers with more grid entry points that can be exploited.

If there is any good news in all of this, it’s that diesel and gas combustion turbines can typically be started with batteries, which means even large power plants may be able to get back up and running within 24 hours of an attack. Yet, recovery from a grid attack will ultimately depend on the breadth of the impact and the amount of damage that has occurred. This isn’t knowable ahead of time, and that is disconcerting.

KEYWORDS: critical infrastructure cybersecurity cyber security threat electric grid security power grid Russian hacking Ukraine cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob ackerman

Robert R. Ackerman Jr. is founder and managing director of AllegisCyber Capital and co-founder of cyber startup foundry DataTribe. He was the first investor to create a venture fund focused exclusively on cybersecurity and data science and has been investing in cybersecurity for more than 15 years in the U.S. and select international markets. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data privacy

    Online privacy has mostly vanished in the US

    See More
  • remote workforce

    A people-centric approach to hybrid work cybersecurity

    See More
  • cloud-computing-freepik

    Cloud computing is a bonanza – but security lags

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing