Cyberattack on smart inverters could crash power grid in seconds

The researchers modeled two primary attack types: DPV Loss Attacks, where inverters are abruptly shut off to trigger under-frequency events, and DPV Hike Attacks, where inverters are rapidly switched on to cause over-frequency. Both attack types were shown to be capable of triggering emergency mechanisms like Under-Frequency Load Shedding (UFLS) and Over-Frequency Generation Shedding (OFGS) within seconds, even when involving relatively low-scale disruptions (~0.2 GW).


CO-EDP, VisionRICO-EDP, VisionRI | Updated: 23-05-2025 23:09 IST | Created: 23-05-2025 23:09 IST
Cyberattack on smart inverters could crash power grid in seconds
Representative Image. Credit: ChatGPT

A landmark study analyzing Australia's electricity market has revealed the alarming potential for cyberattacks on smart inverters to destabilize entire power grids and disrupt energy markets. The study, titled “Destabilizing Power Grid and Energy Market by Cyberattacks on Smart Inverters” and published on arXiv, offers a rigorous and data-driven assessment of attack feasibility and system vulnerability using real-world dispatch and frequency control data over a full year.

Amid rising global dependence on distributed photovoltaic (DPV) systems and market-based frequency regulation frameworks, the research finds that only a modest number of compromised smart inverters could cause wide-scale power instability under specific conditions. It concludes that while traditional power system security measures can defend against inadvertent faults, they remain insufficient against coordinated, adversarial attacks orchestrated using predictive analytics.

How do smart inverter attacks threaten grid stability?

The study assesses several cyberattack vectors that can compromise smart inverters and use them as conduits to destabilize frequency control. Smart inverters, which convert solar-generated DC electricity to AC for grid usage, also play critical roles in voltage regulation, demand response, and reactive power compensation. These capabilities make them ideal targets for malicious actors seeking to manipulate grid dynamics remotely.

The researchers modeled two primary attack types: DPV Loss Attacks, where inverters are abruptly shut off to trigger under-frequency events, and DPV Hike Attacks, where inverters are rapidly switched on to cause over-frequency. Both attack types were shown to be capable of triggering emergency mechanisms like Under-Frequency Load Shedding (UFLS) and Over-Frequency Generation Shedding (OFGS) within seconds, even when involving relatively low-scale disruptions (~0.2 GW).

Analysis revealed that contingency services, such as Regulation Raise, Contingency Raise, and RoCoF control, are not always aligned with DPV generation peaks, especially during midday when solar output is high but inertia and response capacity are at their lowest. This misalignment opens up windows of opportunity where even small disturbances can overwhelm the system, rapidly destabilizing grid frequency.

Can predictive models make these attacks more effective?

Yes, the study demonstrates that attackers could enhance the effectiveness of their operations by leveraging machine learning to identify the most vulnerable timeframes. Using Random Forest regression models trained on weather variables, market data, and system performance indicators, the authors successfully predicted the optimal moments when the grid’s reliance on frequency control was most fragile.

Three predictive models were constructed: one each for the ESS Raise to DPV ratio, ESS Lower to DPV ratio, and RoCoF response. These models used environmental features such as zenith angle, cloud opacity, solar irradiance (GHI), and air temperature, combined with market factors like energy injection capacity, to anticipate when the grid would be most sensitive to sudden changes in DPV supply.

The predictive accuracy was high across all models, with energy injection capacity and solar zenith angle emerging as the most influential features. This predictive capability confirms that attackers could use publicly available data, including open dispatch and weather datasets, to time their attacks for maximum impact. According to simulations, in several cases the frequency could cross critical thresholds (48.75Hz for UFLS, 52Hz for OFGS) in as little as 4 to 5 seconds after a coordinated attack begins.

What are the implications and strategies for defense?

The research underscores that existing grid contingency mechanisms are primarily designed to handle random failures or natural disruptions - not deliberate, calculated cyberattacks. Most current models assume stable system inertia and predictable generation shortfalls, which leaves a significant blind spot for adversarial threats targeting low-inertia, high-DPV periods.

One of the key vulnerabilities arises from the ageing inverter fleet. By 2045, nearly 40% of smart inverters in Australia are projected to be over 15 years old, many of which may no longer receive firmware updates or comply with current cybersecurity protocols. These outdated devices, especially from a concentrated set of manufacturers (e.g., Sungrow, GoodWe, Fronius), represent a latent but severe threat vector.

To mitigate the risk, the study recommends:

  • Aligning contingency mechanisms with DPV generation profiles: Existing frequency support services should not be tied solely to traditional fossil-fueled generation profiles but must reflect solar generation dynamics.
  • Deploying predictive monitoring systems that can identify vulnerable windows based on real-time environmental and market conditions.
  • Improving the cyber resilience of smart inverters, including stricter firmware update policies, supply chain security, and cloud communication protections.
  • Establishing emergency solar management systems to rapidly curtail DPV output during coordinated over-frequency attacks.
  • Incorporating attacker-resilient design into co-optimized frequency regulation systems, a practice increasingly relevant in jurisdictions like California, Texas, the UK, and Ireland that are adopting similar grid structures.
  • FIRST PUBLISHED IN:
  • Devdiscourse
Give Feedback