James Shawalter describes the scenario of a nightmare that is completely unreasonable if not completely. Someone leads to your home, cracks the Wi-Fi password, and then begins to tamper with the solar reflector installed next to your garage. This modest gray box converts the direct current from the surface panels to the alternating current that operates your home.
“You have to have a solar chant” for this scenario, “says Shawalter.
chief executive officer EG4 ElectronicsIt is not considered a company based in Sulfur Springs, Texas, this juvenile sequence is particularly possible. However, for this reason his company found itself in the spotlight last week when the US CISA security agency Cisa Publish a consultant Detail of security weaknesses in EG4 solar transformers. CISA indicated that the defects can allow the attacker to access the same network as the affected inverter and its serial number to intercept data, install harmful fixed programs, or seize control of the entire system.
For approximately 55,000 customers who have the affected inverter model in EG4, the episode may have felt a disturbing introduction to a device that they can slightly understand. What they learn is that modern solar transformers are no longer simple power transformers. It is now the backbone of household power installations, performance monitoring, communication with utility companies, and when there is extra power, feeding them again in the network.
Much of this happened without people noticing. “No one knows what hell was reflecting on solar energy five years ago,” Justin Baskali, the main adviser to Dragos, a cybersecurity company specialized in industrial systems. “We are now talking about it at the national and international level.”
The shortcomings in security and customer complaints
Some numbers highlight the degree in which individual homes in the United States have become mini -power stations. According to the US Energy Information Administration, small-residential solar installations have grown mainly- More than five times Between 2014 and 2022, it was never the boycott of climate defenders and the first adoptions became more prevalent due to low government costs and incentives and increased awareness of climate change.
TECHRUNCH event
San Francisco
|
27-29 October, 2025
Each solar installation adds another knot to the expansion network of interconnected devices, each one contributes to the independence of energy, but it also becomes a possible entry point for a malicious person.
When clicking on his company’s security standards, Shawalter admits shortcomings, but it also deviates. “This is not an eg4 problem,” he says. “This is a problem at the level of industry.” During a call for enlargement and then, in the incoming box for this editor, it produces a A 14 -page report Indexing 88 disclosure of solar energy capacity through commercial and residential applications since 2019.
Not all of his customers – some of them Reddit For the complaint – sympathizes, especially given that the consulting CISA revealed the basic design defects: communication between the monitoring applications and the chains that occurred in an ordinary, non -encrypted text, and fixed program updates that lack integrity examination, and primitive authentication procedures.
“These were basic security lapses,” says one of the company’s customers, who asked to speak anonymous. “Add an insult to the injury,” this person continues, “EG4 has not cost himself a dangerous trouble or the proposed dilution.”
When asked why EG4 did not alert the customers immediately when Cisa continues to the company, it is called a “live and learning” moment.
“Given that we are very close (to address CISA’s fears), which is a positive relationship with Cisa, we were reaching the” done “button, then we advise people, so we are not in the middle of the cake that is baked.”
Techcrunch arrived at Cisa earlier this week for more information; The agency did not respond. In her EG4 consultant, Cisa states that “no known public exploitation has been reported specifically targeting these weak points to Cisa at this time.”
Links with China raise security concerns
Although there is no relationship, the timing of the EG4 public relations crisis coincides with wider concern about the safety chain safety chain safety.
Earlier this year, American energy officials were said to have begun to reassess the risks posed by the devices made in China after discovering unspecified communication equipment within some playing and batteries. According to the Reuters investigationUnconscious cellular devices and other communication devices in the equipment are found from many Chinese suppliers – the components that did not appear in the lists of official devices.
This reported discovery carries a special weight due to China’s dominance in the manufacture of solar energy. Reuters’ story noted that Huawei is the world’s largest resource for spoons, as 29 % of the world’s shipments in 2022, followed by their Chinese peers Sungrow and Ginlong Solis. some 200 GB of European solar energy It is associated with the china -made signs, which is equivalent to more than 200 nuclear power plants.
The geopolitical effects were not escaped from the notice. Lithuania last year Law passed Preventing Chinese access to solar energy, wind and batteries that are more than 100 kilowatts, which effectively restricts the use of Chinese transformers. Shawalter says that his company responds to customer concerns by starting the same to move away from Chinese suppliers and towards the components that companies make elsewhere, including Germany.
However, the Cisa described in EG4 systems raises questions that go beyond the practices of any one company or as it sources of its components. American standards agency NIST Warn “If you control a large number of home solar transformers, and do something evil simultaneously, it may have catastrophic effects on the network for a long period of time.”
And the good news (if there is any), is that although it is in theory, this scenario faces many practical restrictions.
Pascale, who works with solar installations on the scale of benefit, notes that residential transformers serve in the first place two functions: converting energy from direct to alternating current, and facilitating connection again to the network. The mass attack requires the abdication of huge numbers of individual houses at the same time. (Such attacks are not impossible, but it is likely to include targeting the same manufacturers, some of which have a distance access to solar energy transformers for their customers, such as It is clear from the researchers, security last year))
The organizational framework that governs large facilities does not currently extend to residential systems. Critical infrastructure protection standards for North American Electrical Company Currently application Only for large facilities that produce 75 megawatts or more, such as solar farms.
Since residential facilities are much lower than these sills, they work in a gray area where cyber security standards remain suggestions instead of requirements.
But the end result is that the safety of thousands of small enterprises largely depends on the estimate of individual manufacturers working in an organizational vacuum.
Regarding the issue of transmission of non -encrypted data, for example, which is one of the reasons that EG4 received a slap at the hands of CISA, Pascale notes that in the operational environments on the benefit scale, the transfer of the ordinary text is common and sometimes encouraging for network monitoring purposes.
“When you look at encryption in the institution’s environment, this is not allowed,” he explains. “But when you look at an operational environment, most things are transferred in an ordinary text.”
The real concern is not an immediate threat to individual homeowners. Instead, it is associated with the total weakness of an expanded network quickly. When the power network is increasingly distributed, with energy flowing from millions of small sources instead of dozens of large sources, the surface of the attack dramatically expands. Each inverter represents a potential pressure point in a system that has never been designed to accommodate this level of complexity.
Shawalter adopted the intervention of Cisa as what he calls “confidence upgrade” – an opportunity to distinguish his company in a crowded market. He says that since June, EG4 has worked with the agency to address the specified weaknesses, which reduces a preliminary list of ten concerns to three remaining elements that the company expects to be resolved by October. The process included updating fixed program transmission protocols, implementing the additional identity of technical support calls, and re -design.
But for customers like an unknown EG4 customer who spoke to their frustration over the company’s response, the episode highlights the individual position that the adopted in solar energy finds themselves. EG4 customers have bought what they understood for climate friendly technology, just to discover that they will become unwanted participants in the complex Internet security view that it seems to be completely understood.
https://techcrunch.com/wp-content/uploads/2024/06/GettyImages-1308318231.jpg?resize=1200,800
Source link