SHARE
Facebook X Pinterest WhatsApp

Vulnerability of Energy Markets to IoT Botnet Attacks

thumbnail
Vulnerability of Energy Markets to IoT Botnet Attacks

Access to just 50,000 high-wattage IoT devices could allow hackers to manipulate the market for profit.

Written By
thumbnail
Sue Walsh
Sue Walsh
Aug 19, 2020

At the recent Black Hat security conference, Georgia Institute of Technology researchers presented findings from their study of IoT botnets including how hackers could use them to disrupt energy markets.

Results indicate that hackers could manipulate high powered IoT botnets like smart thermostats, car chargers, and air conditioners to compromise any of the U.S.’s nine private energy markets. Hackers could deploy the botnet strategically to increase demand at certain times to force price fluctuations for profit or cause mass chaos.

High Powered Botnets Generate Substantial “Rewards”

Using publicly available data from the New York and California markets between May 2018 and May 201, researchers analyzed fluctuations in two markets:

  • “Real-time markets,” which allow buyers and sellers to correct for unpredictable events (like natural disasters) and forecasting errors
  • “Day-ahead markets,” which forecast demand

Armed with this data and several botnet models, researchers created two possible attack vectors that could alter energy prices. They also determined how far hackers could push attacks without raising alarms.

“Our basic assumption is that we have access to a high-wattage IoT botnet,” says Tohid Shekari, a Ph.D. candidate at the Georgia Institute of Technology. “In our scenarios, attacker one is a market player; he’s basically trying to maximize his own profit. Attacker two is a nation-state actor who can cause financial damage to market players as part of a trade war or cold war. The basic part of either attack is to look at price-load sensitivity. If we change demand by 1 percent, how much is the price going to change as a result of that? You want to optimize the attack to maximize the gain or damage.”

Although more difficult than regular IoT botnets to acquire, hackers who use high powered botnets can reap substantial rewards. Researchers estimate that running an attack for three hours each day, for one hundred days, would yield a $24 million payoff.

Advertisement

Protecting Energy Markets from Hackers

With a focus on promoting prevention and defense before such cyberattacks occur, researchers recommend:

  • Equipping high wattage IoT devices with real-time monitoring
  • Reevaluating the granular and constantly updated load data made public
  • Limiting access to data to add barrier to entry
  • Including real-time monitoring on high-wattage IoT devices to flag suspicious use potentially consistent with malware infections

“It’s an example of how the threat landscape changes in unexpected ways,” says Beyah, who also co-founded the industrial-control security firm Fortiphyd Logic. “Who would have thought that my washing machine or stationary bike could be the foundation of a completely new type of attack?”

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

New Frontiers of IAM: Reaching Great Heights with 2024 Trends
Ronak D. Jain
May 22, 2024
Application Security for IoT: 10 Best Practices
Sagar Nangare
Feb 21, 2023
The Importance of Ensuring IoT System Security
Is Nanotechnology Ready to Enter the IoT Security War?
Bernard Brode
Apr 12, 2022

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.