• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

U.S. indicts 4 Russian hackers for attacks on energy sector

By
Jack Gillum
Jack Gillum
,
Jeff Stone
Jeff Stone
and
Bloomberg
Bloomberg
By
Jack Gillum
Jack Gillum
,
Jeff Stone
Jeff Stone
and
Bloomberg
Bloomberg
March 24, 2022, 6:24 PM ET
One successful spearphishing campaign was directed at the business network—but not the industrial controls—of the Wolf Creek Nuclear Operating Corporation in Burlington, Kansas, which operates a nuclear power plant, according to the U.S.
One successful spearphishing campaign was directed at the business network—but not the industrial controls—of the Wolf Creek Nuclear Operating Corporation in Burlington, Kansas, which operates a nuclear power plant, according to the U.S. iStock/Getty Images Plus

Four Russian nationals who worked for their government committed cyberattacks against hundreds of companies in the energy sector worldwide, including the operator of a nuclear power facility in Kansas, the U.S. Justice Department announced Thursday as part of a sweeping pair of indictments aimed at curbing state-sponsored hacks.

Federal prosecutors alleged an employee affiliated with Russia’s defense ministry installed “back doors” in computer systems and deployed malware aimed at crippling the safety of energy facilities. A separate indictment alleges three employees of the Russian Federal Security Service, or FSB, undertook a years-long effort to target and compromise computer systems across the energy sector. 

The Justice Department alleges both conspiracies occurred between 2012 and 2018, and targeted thousands of computers in about 135 countries. A senior law enforcement official said that although the hacks didn’t extend beyond 2018, they underscore ongoing threats to critical infrastructure. On Monday, President Joe Biden warned of “evolving intelligence” that Russia could wage retaliatory cyberattacks against the U.S. For sanctions related to the invasion of Ukraine.

“Russian state-sponsored hackers pose a serious and persistent threat to critical infrastructure both in the U.S. And around the world,” Deputy Attorney General Lisa Monaco said in a statement. “Although the criminal charges unsealed today reflect past activity, they make crystal clear the urgent ongoing need for American businesses to harden their defenses and remain vigilant.”

Evgeny Gladkikh, a computer programmer employed by an institute affiliated with the Russian Ministry of Defense, is accused along with unnamed co-conspirators of using malware—known as Triton—to hack a refinery outside the U.S. Between May and September 2017. The breach caused safety systems made by Schneider Electric to trigger an automatic emergency shutdown of the organization’s operations, according to the indictment.

The refinery was located outside the U.S. And conducted work involving sulfur, which can result in an explosion if not properly regulated, officials said. The malware was intended to cause physical damage by disrupting refinery functions that regulate safety. 

Prosecutors also allege that three hackers associated with the FSB targeted software and hardware at power-generation facilities, an effort meant to provide the Russian government with the ability to disrupt hacked computers at its discretion. 

Those defendants—Pavel Akulov, Mikhail Gavrilov, and Marat Tyukov—are accused of engaging in campaigns in which they installed malware on more than 17,000 devices in the U.S. And abroad. Using one technique, known as a “watering hole” attack, attackers allegedly tried duping engineers at a target organization to visit a compromised website, where hackers could deploy malware and capture website visitors’ login credentials. 

Their tactics, prosecutors say, included so-called spearphishing attacks that targeted 3,300 users across more than 500 U.S. And international companies and entities, including the Nuclear Regulatory Commission. One successful spearphishing campaign was directed at the business network—but not the industrial controls—of the Wolf Creek Nuclear Operating Corporation in Burlington, Kansas, which operates a nuclear power plant, according to the U.S. 

The suspects are affiliated with a hacking group, known alternatively as Berzerk Bear and Energetic Bear, that cybersecurity researchers have long suspected was tied to the Russian government. The government says they are members of Center 16, an operational FSB unit that engaged in computer intrusions. 

Members of the group also posed as job applicants who specialized in work with supervisory control and data acquisition, or SCADA, systems, which are common in industrial control systems, or ICS. A senior Justice Department official said the attackers are accused of inserting malware into legitimate software updates used in those systems. 

“These indictments are a warning shot meant for the organizations and individuals behind two of the three Russian intrusion groups who carry out disruptive cyberattacks,” said John Hultquist, vice president of intelligence analysis at cybersecurity firm Mandiant Inc. “These actions are personal and are meant to signal to anyone working for these programs that they won’t be able to leave Russia anytime soon.”

None of the four suspects is currently in U.S. Custody. “We determined it would be better to unseal the charges rather than waiting for that distant possibility in the future,” a senior U.S. Law enforcement official said.

Also on Thursday, Britain’s cyber agency said it is “almost certain” that the FSB conducted a “malign program of cyber activity” targeting critical IT systems and national infrastructure in Europe, the Americas and Asia since 2013. British Foreign Secretary Liz Truss also said she sanctioned a Russian defense ministry subsidiary for carrying out an alleged cyberattack on a Saudi petrochemical plant five years ago.

A spokesperson for the Russian embassy in Washington didn’t immediately respond to a request seeking comment Thursday.

Never miss a story: Follow your favorite topics and authors to get a personalized email with the journalism that matters most to you.

About the Authors
By Jack Gillum
See full bioRight Arrow Button Icon
By Jeff Stone
See full bioRight Arrow Button Icon
By Bloomberg
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.