CSCSSCSCSS
CSCSS
Centre for Strategic Cyberspace + Security Science
+855.237.8767 Global[email protected]
CONTACT
 
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • About Us
    • About Us
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS
FacebookTwitterInstagramSoundCloudDelicious
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • About Us
    • About Us
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS
January 19, 2017In The NewsBy admin.cs
CONTACT INFROMATION
For more information + media queries contact CSCSS External Relations
  • London, UK
    +44 2035141784
  • Washington, D.C, USA
    + 571.451.0312
  • Middle East
    +855.237.8767
  • Extention
    920

IN THE NEWS

Ukraine Confirms December Kiev Blackout Was Cyber-Sabotage

January 11, 2017

A mid-December blackout in parts of the Ukrainian capital has been confirmed as the result not of equipment failure, but hacking.

Ukrainian power looks all the more vulnerable as confirmations come in that a blackout last month was caused by a cyber-attack.

The blackout cut off power to parts of Kiev just before midnight on 17  December 2016 and lasted for a little more than an hour.  At the time UkrEnergo, Ukraine’s national power company, told customers it was unsure if this was a cyber-attack or merely equipment failure.

The government investigation is apparently not yet complete but an investigation by Information Systems Security Partners (ISSP) concluded that the blackout was the result of sabotage.

ISSP said that hackers shut down the devices which allowed the central operators to speak to substations. Once the hack was pulled off, engineers could no longer speak to the substation remotely but had to physically go to Pivnichna substation to reset it. The researchers believe that this was an experiment rather than a full-scale malicious attack.

MORE ON THIS ARTICAL

MOST RECENT

FEATURED PROJECTS + PROGRAMS

blackoutCyber WarhackHackerHackingrussiaukrain
About the author

admin.cs

Related posts
The CIA exploit list in full: The good, the bad, and the very ugly
March 10, 2017
South Korea targeted by cyberspies (again). Kim, got something to say?
February 25, 2017
A Spectre Is Haunting The West — The Spectre of Cyberwar.
January 27, 2017
GCHQ Asked To Step Up Action Against Cyber-Attack Threat To Financial Services
December 20, 2016
Revealed: Cyber attacks that hit UAE in 2016
December 19, 2016
UK Spy Bill Dubbed ‘Snoopers’ Charter’ Becomes Law
November 29, 2016
ABOUT CSCSS
The Center for Strategic Cyberspace + Security Science is a bipartisan, multilateral, international nonprofit organization headquartered in London, United Kingdom. It seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.
CONTACT US
+44 12342134123
  • London UK
    +44 2035141784
  • Washington, D.C, USA
    + 571.451.0312
  • Middle East + Asia Pacific
    +855.237.8767
  • STAY CONNECTED WITH CSCSS
    [email protected]

Find us on:

FacebookTwitterLinkedinInstagramSoundCloud
TRENDING
  • The Limitation Game
    February 25, 2017
  • Trump: Geopolitics is More than the Art of the Deal
    January 18, 2017
  • PODCAST : Dyn Distributed Denial of Service: Impact & Lessons Learned
    November 26, 2016
FEATURED PROJECTS + PROGRAMS
© 2015 Center for Strategic Cyberspace + Security Science / CSCSS