Is the United States Prepared For And Protected From An Attack On Our Power Grids?

Updated: Feb 18, 2020

In a recent article published by WIRED The Highly Dangerous ‘Triton’ Hackers Have Probed the US Grid we learned of recent network probing of at least 20 US electric grids. This is alarming due to the fact that the hackers previously executed a very reckless cyberattack that made history. This attack could very well have turned destructive and possibly lethal.

We agree that probing in and of itself isn't dangerous but the fact that hackers are looking for entry points into actual electrical grid networks should be cause for alarm and action! The article references security analysts from the Electric Information Sharing and Analysis Center (E-ISAC) and the critical-infrastructure security firm Dragos and their research into Xenotime (aka “Triton actor”) the same hackers that penetrated the Saudi Arabian oil refinery Petro Rabigh in 2017. Their “malware was designed to disable the so-called safety-instrument systems” aimed at “crippling equipment that monitors for leaks, explosions, or other catastrophic physical events”. Fortunately, the hackers accidentally triggered an emergency shut down of the plant and no severe consequences resulted.

Realistically we know hackers performing these preliminary scans are actually prepping for an invasion into network systems which could lead to serious consequences to Americans.

We do have options to be pro-active in this time of constant breaches. While there are possible steps that can be taken to redesign, strengthen passwords or apply all operating system security patches. These options take time and are not 100% secure. What is needed is a new unconventional security approach that will stop all attack vectors. NCoded Communications stands ready to deliver a Zero Trust Environment Overlay.

The NCC ZTE Overlay is a proprietary design developed to complete the following

objectives through new and unconventional proprietary technology:

  • Reduce Your Attack Surface

  • Secure User Access

  • Encrypt Data-In-Transit

  • Cloak Your Infrastructure from Evil Actors

The final objective is to neutralize the adversaries.

Once completed, you will have established a Software Design Perimeter (SDP) cloaking your environment from being seen or accessible on the Internet by anyone.

The Operational Technology (OT) security premise once the ZTE Overlay is deployed is:

If they can’t see it, they can’t steal it!

For the full in depth and detailed position paper written by Peter W. Rung, CEO please contact us at

30 views0 comments

Recent Posts

See All

A leaked data breach stealing 533 million Facebook users in 106 countries, which NPR announced on April 9, 2021 ( ). The breach included: Full Names Locations Phone Numbers Some E

4.1 Architecture The first major areas to address is the computer, network and security architecture itself. We need to come to reason with the following… If the current security standards and associa

1 Overview On the Newsweek site for August 17, 2019, there’s an article titled, “20 TEXAS CITIES HIT BY COORDINATED RANSOMWARE ATTACK, STATE'S IT DEPARTMENT SAYS” - With the art