{"id":485015,"date":"2024-08-12T12:08:16","date_gmt":"2024-08-12T10:08:16","guid":{"rendered":"https:\/\/innovationorigins.com\/?p=485015"},"modified":"2024-08-12T12:08:16","modified_gmt":"2024-08-12T10:08:16","slug":"emergency-bell-for-cybersecurity-of-dutch-solar-energy","status":"publish","type":"post","link":"https:\/\/ioplus.nl\/archive\/en\/emergency-bell-for-cybersecurity-of-dutch-solar-energy\/","title":{"rendered":"Emergency bell for cybersecurity of Dutch solar energy"},"content":{"rendered":"\n<p>Recent research reveals severe cyber security risks within the solar supply chain, exposing vulnerabilities and potential cyberattack scenarios. The risks range from ransomware attacks on large solar installations to the threat of state actors who can sabotage energy supplies. A Dutch hacker showed that millions of solar power systems are vulnerable. This highlights the need for improved cyber resilience and the availability of innovation subsidies for a more secure energy infrastructure.<\/p>\n\n\n\n<div class=\"io-block io-block__box\"><h2>Why this is important: <\/h2><p>New research reveals the vulnerabilities in the fight against cyber attacks on solar energy systems. The study, published today, was conducted by cybersecurity experts from Secura and energy experts from the Top Sector Energy, commissioned by the Netherlands Enterprise Agency.<\/p><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Weaknesses in the solar panel supply chain<\/h2>\n\n\n\n<p>The solar power supply chain has several weaknesses that could lead to large-scale problems for energy supply and data privacy. This is reinforced by the recent discovery of a Dutch hacker who was able to potentially disable millions of solar power systems, <a target=\"_blank\" href=\"https:\/\/www.ftm.nl\/artikelen\/hacker-kan-stekker-uit-zonnepanelen-trekken-en-stroomnet-platleggen\" rel=\"noreferrer noopener\">according to Follow The Money<\/a>.<\/p>\n\n\n\n<p><a target=\"_blank\" href=\"https:\/\/topsectorenergie.nl\/nl\/kennisbank\/maatregelen-cyberveiligheid-zonpv\/\" rel=\"noreferrer noopener\">The study<\/a>, conducted with literature and expert interviews, presents three scenarios in which solar security is at risk. The first scenario involves a cloud portal attack, in which cybercriminals gain access to multiple large installers&#8217; accounts. This scenario highlights the importance of strong authentication and access controls in the industry.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The threat of cyber attacks<\/h2>\n\n\n\n<p>The second threat arises from software updates to inverters that can provide cybercriminals with unintended access. Inverters that retain default passwords after installation are an easy target in this regard. This highlights the importance of cybersecurity measures throughout the manufacturing and distribution process of solar equipment.<\/p>\n\n\n\n<p>The third and most worrisome threat is a supply-chain attack from state actors. At a time when geopolitical tensions are running high, taking down vital infrastructure via hacked solar equipment poses a real risk. This underscores the urgency of international cooperation and cybersecurity standards in energy infrastructure.<\/p>\n\n\n<div class=\"vlp-link-container vlp-layout-basic wp-block-visual-link-preview-link advgb-dyn-6551356e\"><a href=\"https:\/\/innovationorigins.com\/en\/hackers-with-good-intentions-white-hats-vs-black-hats\/\" class=\"vlp-link\" title=\"Hackers with good intentions: white hats vs. black hats\" rel=\"nofollow\" target=\"_blank\"><\/a><div class=\"vlp-layout-zone-side\"><div class=\"vlp-block-2 vlp-link-image\"><img decoding=\"async\" src=\"https:\/\/innovationorigins.com\/app\/uploads\/2024\/05\/innovationorigins_a_cowboy_with_a_white_hat_and_a_cowboy_with_a_a9d2319c-90f6-4435-9734-4176d70310c4.png\" style=\"max-width: 150px; max-height: 150px\" \/><\/div><\/div><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">Hackers with good intentions: white hats vs. black hats<\/div><div class=\"vlp-block-1 vlp-link-summary\">In de serie Cracked by Jordens kijken we naar de cyberveiligheid van consumenten en bedrijven in Nederland. Vandaag zoomen we in op ethisch hacken.<\/div><\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\">Grants for Safer Energy Chains<\/h2>\n\n\n\n<p>Facing these threats requires a comprehensive approach. Innovations and new knowledge are essential for securely connecting smart energy devices. <a target=\"_blank\" href=\"https:\/\/topsectorenergie.nl\/nl\/\" rel=\"noreferrer noopener\">Top Sector Energy<\/a> plays a vital role in sharing knowledge and bringing the parties together.<\/p>\n\n\n\n<p>In addition, the government encourages increasing cyber resilience with a subsidy scheme. This is aimed at developing more secure technologies within energy chains. Making these grants available is a clear step forward toward a more resilient solar energy sector.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Digital vulnerability and societal impact<\/h2>\n\n\n\n<p>The revelations of the Dutch hacker show how closely intertwined our digital and physical infrastructures are. This raises concerns about the security of data generated by solar energy systems. With increasing reliance on technology for our energy supply, data loss or misuse risks are increasing.<\/p>\n\n\n\n<p>Recent discoveries surrounding the cybersecurity of solar power systems are calling for action. This complex challenge requires not only technical solutions but also awareness and cooperation at national and international levels. The future of our energy supply depends on the steps we take now. The security of our infrastructure must come first. The alarm bell being sounded now is a clear signal that there is no time to lose.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent research reveals severe cyber security risks within the solar supply chain, exposing vulnerabilities and potential cyberattack scenarios. The risks range from ransomware attacks on large solar installations to the threat of state actors who can sabotage energy supplies. A Dutch hacker showed that millions of solar power systems are vulnerable. This highlights the need [&hellip;]<\/p>\n","protected":false},"author":2589,"featured_media":506569,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[83676],"tags":[28925,22006],"location":[6763],"article_type":[36684],"serie":[],"archives":[],"internal_archives":[],"reboot-archive":[82815],"class_list":["post-485015","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-green","tag-cybersecurity-en","tag-solar-power","location-netherlands","article_type-news","reboot-archive-green"],"blocksy_meta":[],"acf":{"subtitle":"Solar power is becoming increasingly important to our energy supply. At the same time, all those installations are susceptible to cyber-attack. Research shows that the potential impact is significant.","text_display_homepage":false},"author_meta":{"display_name":"Team IO","author_link":"https:\/\/ioplus.nl\/archive\/author\/erikdevries\/"},"featured_img":"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2024\/05\/innovationorigins_a_cowboy_with_a_white_hat_and_a_cowboy_with_a_a9d2319c-90f6-4435-9734-4176d70310c4.png","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/green\/\" class=\"advgb-post-tax-term\">GREEN+<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">GREEN+<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/green\/\" class=\"advgb-post-tax-term\">cybersecurity<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/green\/\" class=\"advgb-post-tax-term\">solar power<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">cybersecurity<\/span>","<span class=\"advgb-post-tax-term\">solar power<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on August 12, 2024","modified":"Updated on August 12, 2024"},"absolute_dates_time":{"created":"Posted on August 12, 2024 12:08 pm","modified":"Updated on August 12, 2024 12:08 pm"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/485015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/users\/2589"}],"replies":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/comments?post=485015"}],"version-history":[{"count":0,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/485015\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media\/506569"}],"wp:attachment":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media?parent=485015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/categories?post=485015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/tags?post=485015"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/location?post=485015"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/article_type?post=485015"},{"taxonomy":"serie","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/serie?post=485015"},{"taxonomy":"archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/archives?post=485015"},{"taxonomy":"internal_archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/internal_archives?post=485015"},{"taxonomy":"reboot-archive","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/reboot-archive?post=485015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}