Cyber security news for all

More

    Elexon, a British energy broker affected by a cyber attack

    Elexon, a U.K. electricity grid network reseller, recently said cyberattacks hit it.

    Elexon, a British electricity broker, was the victim of a cyber attack. Therefore, the event affected the internal computer network, including the company’s mail server and employees’ laptops.

    Hackers target a critical part of the U.K. energy system by keeping people from their systems and preventing them from sending or receiving email.” reads a post from The Telegraph.

    Elexon, a key player in the energy market among power plant operators and home and business utilities. Said in a statement, “that its internal systems and laptops were affected by a cyber attack. It declined to provide further details“.

    The company manages electricity the supply and demand therefore, distributes energy over the grid when needed.

    We would like to inform you that ELEXON’s internal computer systems were exposed to a cyber attack today. The central BSC and EMR systems are currently not affected and are working normally. The attack only affects our internal computer systems and laptops.” reads a post from the company’s website.”We are currently working hard to solve this problem. Please note, however, that we are currently unable to send or receive emails.”

    The company’s response

    The company removed the mail server in response to the attack.

    According to Elexon, the systems for managing electricity transit in the U.K. did not suffer any effect.

    However, the company released a second message to announce that it has discovered the root cause of the incident.

    It noted it is working to fix the internal network of employees’ laptops.

    Elexon added that the attack did not affect central BSC systems and EMR and will continue to function normally.

    Even though the company did not reveal details of the attack, experts suggest ransomware involvement.

    The NSA also warned that several government-sponsored cyberespionage groups are exploiting corporate VPN vulnerabilities.

    In January, the U.S. Cybersecurity and Infrastructure Security Agency warns organizations that attackers are exploiting the Pulse Secure VPN vulnerability.

    Although Pulse Secure fixed the flaw in April, thousands of Pulse Secure VPN endpoints still need to be fixed. Also, in January 2020, Bad Packets reported that 3,623 vulnerable servers were still present in the Pulse Secure VPN, including 1233 in the United States.

    The U.K’s National Grid Agency publicly announced that the incident did not affect electricity supply across the nation

    Elexon tweet

     

     

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]