U.S. officials Investigating Rogue Communication Devices in Solar Power Inverters

According to security experts familiar with the matter, these unauthorized components create secondary communication channels that may allow remote access to critical energy infrastructure without detection, potentially enabling foreign actors to manipulate or disrupt power delivery systems. Energy security experts warn that coordinated remote manipulation of these devices could destabilize power grids and trigger widespread blackouts, particularly as Chinese-made inverters now control a substantial portion of renewable energy capacity in the United States and Europe. U.S. energy officials have launched an investigation after discovering unauthorized communication equipment embedded within Chinese-manufactured solar power inverters connected to critical infrastructure grids across the country. These inverters, which are essential components that convert direct current from solar panels into alternating current usable by the electrical grid, were found to contain undocumented cellular radio devices not disclosed in product specifications or technical documentation. This vulnerability is especially dangerous given the growing penetration of solar power on Western grids, where in some regions, Chinese-manufactured inverters control upwards of 200 gigawatts of generating capacity – equivalent to more than 200 nuclear power plants. The stealth nature of these components suggests deliberate concealment from regulatory oversight and security scrutiny, pointing to potential intentional infiltration of Western energy grids. When examining the circuit architecture of affected units, investigators found cellular radio modules connected directly to the main control board through secondary data lines, bypassing standard monitoring systems. “We know that China believes there is value in placing at least some elements of our core infrastructure at risk of destruction or disruption,” said Mike Rogers, former director of the U.S. National Security Agency, highlighting the strategic implications of these findings. A particularly concerning aspect is the modules’ ability to receive remote commands that can modify critical operational parameters such as frequency tolerance, power output limits, and grid synchronization settings. Manipulation of these settings across multiple grid-connected inverters simultaneously could cause frequency instability, voltage fluctuations, or complete disconnection of renewable energy sources during peak demand periods.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 15 May 2025 15:29:54 +0000


Cyber News related to U.S. officials Investigating Rogue Communication Devices in Solar Power Inverters

U.S. officials Investigating Rogue Communication Devices in Solar Power Inverters - According to security experts familiar with the matter, these unauthorized components create secondary communication channels that may allow remote access to critical energy infrastructure without detection, potentially enabling foreign actors to ...
1 month ago Cybersecuritynews.com
46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings - Researchers have uncovered critical security flaws in global solar power infrastructure that could potentially allow malicious actors to seize control of solar inverters and manipulate power generation at scale. Research indicates over half of solar ...
2 months ago Cybersecuritynews.com
Rogue AI: What the Security Community is Missing | Trend Micro (US) - Are threat actors, or Malicious Rogue AI, targeting your AI systems to create subverted Rogue AI? Are they targeting your enterprise in general? And are they using your resources, their own, or a proxy whose AI has been subverted. The truth is that ...
8 months ago Trendmicro.com
Dozens of solar inverter flaws could be exploited to attack power grids - Apart from disrupting a power grid, the disclosed vulnerabilities can also be exploited in scenarios that impact user privacy, hijacking smart devices in the house that may be controlled through the vendor's cloud platform, or even ransomware attacks ...
2 months ago Bleepingcomputer.com CVE-2024-50694
Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids - Cyber Defense Magazine - Network Intrusion: Network communication systems of power and smart grids can be intruded through weak security configurations like default password, unsecured remote access, or unpatched systems and other vulnerabilities to gain control into the ...
8 months ago Cyberdefensemagazine.com
Investing in Africa's Clean Energy Transition - Among our vision, we see the transition to clean energy not just as a necessity, but as a catalyst for inclusive growth and digital innovation. Africa's energy landscape is confronting a critical shortfall, with roughly 600 million people in ...
1 year ago Feedpress.me
CVE-2021-41769 - A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < ...
3 years ago
China Reportedly Admits Their Role in Cyber Attacks Against U.S. Infrastructure - During a high-level meeting in Geneva with American officials, representatives from China’s Ministry of Foreign Affairs indirectly linked years of computer network breaches at U.S. ports, water utilities, airports, and other critical targets to ...
2 months ago Cybersecuritynews.com Volt Typhoon
IoT Security for Business: Safeguarding Connected Devices - In this discussion, we will explore the significance of IoT security for businesses and effective strategies for safeguarding connected devices. With the increasing number of connected devices in business environments, the need for effective IoT ...
1 year ago Securityzap.com
Renewable Energy Technology: Powering the Future - Engage in the discussion on how renewable energy technology is set to revolutionize our world and reshape the energy landscape for future generations. From rooftop solar panels to large solar farms, this renewable technology is leading us towards ...
1 year ago Securityzap.com
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign - The Federal Bureau of Investigation (FBI) issued an urgent warning Thursday about an ongoing malicious campaign where cybercriminals are impersonating senior US officials through text messages and AI-generated voice calls. “The malicious actors ...
1 month ago Cybersecuritynews.com
20 Best Remote Monitoring Tools - 2025 - What is Good ?What Could Be Better ?Strong abilities to keep an eye on devices and systems.Some parts may take time to figure out.It gives you tools for remote control and troubleshooting.There could be more ways to change things.Lets you automate ...
2 months ago Cybersecuritynews.com
Cybersecurity Crisis Looms: FBI Chief Unveils Chinese Hackers' Plan to Target US Infrastructure - As the head of the FBI pointed out Wednesday, Beijing was positioning itself to disrupt the daily lives of Americans if there was ever a war between the United States and China if it were to plant malware to damage civilian infrastructure. U.S. ...
1 year ago Cysecurity.news Volt Typhoon
FBI: US officials targeted in voice deepfake attacks since April - This warning is part of a public service announcement issued on Thursday that also provides mitigation measures to help the public spot and block attacks using audio deepfakes (also known as voice deepfakes). The FBI warned that cybercriminals using ...
1 month ago Bleepingcomputer.com
CVE-2021-27196 - Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC ...
2 years ago
CVE-2025-22011 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
Changing How Healthcare Works: Big News in Communication - In a pivotal transformation within the healthcare industry, a prominent shift is currently unfolding. Direct Secure Messaging has emerged as a game-changer, modernising the way vital information is shared among healthcare providers, pharmacies, and ...
1 year ago Cysecurity.news
The key to connected care excellence - Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and serves as an Evangelist with the Check Point Office of the CTO. She has worked as an engineer in IT for over 25 years and is an experienced security solutions architect in the ...
1 year ago Blog.checkpoint.com
Arctic Wolf Survey Surfaces Election Security Fears - A survey of 136 state and local government leaders in the U.S. published today finds nearly half expect to see an increase in the number of cybersecurity incidents involving elections in 2024. Conducted by the Center for Digital Government on behalf ...
1 year ago Securityboulevard.com
Bucks Co. emergency dispatch system down for days due to cyberattack - Law enforcement officials in Bucks County are working to restore services to its computer-aided dispatch system, or CAD system, after a cyberattack on Sunday crippled the service. County officials said 9-1-1 services remain operational and first ...
1 year ago Nbcphiladelphia.com
Why BYOD Is the Favored Ransomware Backdoor - These devices exist outside of direct corporate management and provide a ransomware gang with unchecked platforms for encrypting data. Microsoft's fourth annual Digital Defense Report for 2023 reveals that 80% of all ransomware compromises come from ...
1 year ago Esecurityplanet.com
Claroty Team82: 63% of Known Exploited Vulnerabilities Tracked by CISA Are on Healthcare Organization Networks - PRESS RELEASE. NEW YORK and ORLANDO, Fla., March 12, 2024/PRNewswire/ -Claroty, the cyber-physical systems protection company, released today at the annual HIMSS24 conference a new report that uncovered concerning data about the security of medical ...
1 year ago Darkreading.com
CVE-2023-46254 - capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind ...
10 months ago
IoT Security: Safeguarding Business IoT Devices - The security of IoT devices is of utmost importance as businesses increasingly rely on them to streamline operations and enhance productivity. In this discussion, we will explore the importance of IoT security in safeguarding business IoT devices and ...
1 year ago Securityzap.com
Several local governments struggling with cyberattacks limiting services | The Record from Recorded Future News - 911 and 311 call centers are operational but County Executive Steuart Pittman said many other services are impacted by the shutoff of internet access — an action taken to “ensure the safety” of government systems. Anne Arundel County, home to ...
3 months ago Therecord.media