Schneider's Telvent Responds to Network Attack

News last month of a hacker's attack on the networks of infrastructure control system provider Telvent Canada Ltd., a unit of Schneider Electric, threw a spotlight on existing concerns about the security of critical infrastructure.

Telvent discovered an intrusion on its network affecting systems in Canada, the United States and Spain. The breach affected customer project files related to Telvent's OASyS DNA supervisory control and data acquisition (SCADA) software. Some of those files were reportedly stolen and malicious software was installed on the company's network.

Telvent's SCADA systems are used by electric, oil and gas, water and transportation providers for real-time control of their operations. The concern that intruders could disrupt utility operations by infiltrating system providers who have “back-door” access to customer systems is a source of ongoing and urgent behind-the-scenes work by utilities and their system providers. The companies involved seldom publicize their efforts in this area, which escalated in 2010 after the Stuxnet worm attack on Iranian nuclear facilities demonstrated that it was possible to gain control of mission-critical SCADA systems.

Telvent and Schneider have declined to speak in detail about the hack attack. Martin Hanna, vice president of press relations for Schneider's North American operations based in Palatine, Ill., provided Electrical Wholesaling with the following statement and declined to elaborate:

“Telvent is aware of a security breach of its corporate network that has affected some customer files. Customers have been informed and are taking recommended actions, with the support of Telvent teams. Telvent is actively working with law enforcement, security specialists and its affected customers to ensure the breach has been contained.”

Hanna did confirm that letters were sent to Telvent customers starting on Sept. 10 when it learned of a breach of its internal firewall and security systems. The letters said Telvent had indefinitely shut down its access to customer systems even though it had found no evidence that the intruder had acquired any information that would enable them to gain access to a customer system.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.