Ukrainian malware used to penetrate US electrical grid. Soros, after all?


A US state power utility, Burlington Electric, has said it found a notebook computer containing the same malware code made in the Ukraine that the FBI and DHS had touted as linked to “Russian” hackers, which was used to penetrate the electrical grid.

https://www.bloomberg.com/news/articles/2015-11-18/billionaire-george-soros-invests-in-ukraine-software-developer

Recall George Soros’ fund bought an undisclosed stake in a Ukrainian software company called Ciklum in November 2015. Ciklum has 2,500 programmers. That means, it would be capable of carrying out internet attacks on the US electrical grid, and the outdated malware for the Ukraine could be a clue it is.

https://www.bloomberg.com/news/articles/2015-11-18/billionaire-george-soros-invests-in-ukraine-software-developer

More from RT

A Vermont utility sounded the alarm after finding malware code on a laptop that the FBI and DHS had touted as associated with Russian hackers. However, cybersecurity specialists say the code came from an outdated Ukrainian hacking tool.
On Thursday, the FBI and DHS released a joint report on a hacking operation they called ‘Grizzly Steppe’. They claimed the operation was linked to the Russian government, alleging that it had targeted “US persons and institutions, including from US political organizations.”

Along with the report, the US security agencies released a sample of the malware code allegedly used in the Grizzly Steppe operation to compromise US computer networks. The code was also shared with executives from 16 industries around the nation, including the financial, utility, and transportation sectors, according to a Washington Post report.

On Friday, Burlington Electric, a Vermont-based power company, released a statement saying that the malware code had been detected during a scan of a single company laptop that was not connected to the grid.

https://www.rt.com/usa/372347-russian-hackers-power-grid/

Comments are closed.

%d bloggers like this: