On December 23, 2015, at least six power companies in western Ukraine were targeted in concerted assaults. Their grid-management computers were taken over by malware. The hackers then remotely opened circuit breakers before erasing critical files and destroying the grid management system. The hackers simultaneously overloaded the call centres, preventing companies from even assessing damage via customer complaints. Consumers were blacked out for many hours. Technicians had to physically inspect sub-stations and manually flip switches to put the power on again. A Russian hacker group, Sandworm, is suspected of orchestrating the attack. This is the first time a power grid has been hit. But there have been earlier cyber assaults on physical infrastructure. The most famous of these was the Stuxnet worm, which specifically targeted Iran's nuclear infrastructure and reportedly caused severe damage to centrifuges.
Cyber assaults of this nature are likely to be used increasingly both by terrorists and criminals - but also by hackers working for governments. Cyber assaults are relatively cheap and easy to pull off and therefore very tempting in an era of asymmetric warfare. There are many soft targets. A high level of damage and disruption can be caused while maintaining deniability. The task of protecting infrastructure from cyber attacks is very difficult and likely to become even harder as more devices come online. Much of the infrastructure is in private hands and controlled by different companies. The hardware is often legacy and the software may be written for antiquated operating systems with many vulnerabilities. Ironically however, the cyber attack could have hurt even more if the Ukraine's power grid had been fully automated with no manual controls.
India, like every other nation, must find ways to harden its infrastructure against such assaults. As of now, whatever security exists is piecemeal. A programme is required for educating all classes of users about the need for basic security and also the deployment of disaster recovery processes across mission-critical systems. In addition, any serious cyber defence will involve developing offensive capacities since that may be the only way to shut down a hacker assault. So there is a serious need for a coherent national security architecture, with both defensive and offensive capacity as well as strong disaster-recovery mechanisms. Creating a specialised agency on the lines of the US National Security Agency, which plays both operational and advisory roles, may be worth consideration. Of course, such an agency would require carefully drafted legislation for due enabling and oversight, but it would be worth the effort. This is now an urgent requirement since the Ukraine assault is likely to inspire copycat efforts.
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
