Researchers Fabian Bräunlein and Luca Melette demonstrated how outdated Radio Ripple Control systems, used to manage up to 60 gigawatts (GW) of electricity, could be exploited by attackers to disrupt power supply on a massive scale.
Their findings, presented at the Chaos Computer Club (CCC) conference, have raised alarms about the fragility of Europe’s energy infrastructure.
Radio Ripple Control is a century-old technology designed to send unencrypted, frequency-modulated signals to control various grid components. It operates using frequency-shift keying (FSK) and lacks encryption or authentication mechanisms, making it highly susceptible to interception and manipulation.
This system is widely used across Germany and neighboring countries like Austria, Hungary, and Slovakia to manage renewable energy inputs, load balancing, and even streetlights.
The protocol relies on receivers embedded in grid-connected devices such as photovoltaic systems, heat pumps, and electric vehicle chargers.
Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free
Commands are broadcast from centralized transmitters operated by entities like Europäische Funk-Rundsteuerung (EFR) GmbH. These commands regulate energy flow by switching systems on or off based on grid demand.
The researchers demonstrated that attackers could intercept legitimate radio commands using a basic software-defined radio (SDR) and reverse-engineer the protocol.
By decoding the proprietary languages Versacom and Semagyr, they could craft rogue commands to manipulate grid operations. The equipment required for such an attack includes:
To execute an attack, hackers could either replay intercepted signals or inject new ones into the system.
They could also build high-powered rogue transmitters using antennas or drones to override legitimate broadcasts. Alternatively, physical breaches of transmitter facilities or hacking into EFR’s IT infrastructure could provide direct access.
The researchers highlighted three critical vulnerabilities that make such attacks feasible:
A well-timed attack could destabilize the grid by creating imbalances between supply and demand. For example:
If the grid frequency falls below 47.5 Hz, power plants disconnect to prevent damage, necessitating a complete grid rebuild. Such a scenario could leave over 200 million people without electricity.
Addressing these vulnerabilities is complex due to the widespread use of Radio Ripple Control across Europe. Transitioning to modern systems with encrypted communication protocols like iMSys would require significant investment and time.
Meanwhile, short-term measures such as securing transmitter sites and implementing rolling codes or time-based authentication for signals could reduce risks.
This research underscores the urgent need for robust cybersecurity measures in critical infrastructure. While state-sponsored actors are more likely to exploit these vulnerabilities than amateur hackers, the potential consequences—a continent-wide blackout—are too severe to ignore.
Governments and energy providers must swiftly modernize their systems and safeguard Europe’s power grid from this serious threat.
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar