Engineer using a digital tablet to examine electric smart grid system
08 Jul 2025

How to detect, prevent, and respond to cybersecurity threats

Recent investigative reports have uncovered concerns in the renewable energy sector: rogue communication devices found embedded within solar power inverters and batteries, many of which are manufactured overseas and distributed globally. These unauthorized components could be used to create unmonitored communication channels, potentially allowing improper remote access that could jeopardize critical infrastructure, disrupt power grids, and even trigger widespread blackouts. As the world accelerates its transition to renewable energy, the risks associated with compromised hardware are more pertinent than ever.

The Hidden Threat: Prohibited Communication Devices

Solar inverters are vital links between renewable energy sources and the grid. While legitimate communication modules are necessary for monitoring and maintenance, the discovery of unauthorized cellular radios and other hidden devices is alarming. These unauthorized components could be used to evade established firewalls and security protocols, leaving systems vulnerable to cyberattacks. Malicious actors could exploit these weaknesses to disable or manipulate energy networks remotely, with potentially devastating consequences.

Why Manufacturers Must Act Now

Governments and industry leaders worldwide are intensifying scrutiny of foreign-manufactured energy products. The challenge is not only technical, but also regulatory. Manufacturers must ensure transparency, traceability, and robust security across their entire supply chain. Failing to address these risks can result in regulatory penalties, loss of customer trust, and significant reputational damage.

How Intertek's Cybersecurity Assessments Protect Manufacturers

Intertek's Assurance, Testing, Inspection, and Certification (ATIC) services offer a proven framework to help manufacturers identify and mitigate cybersecurity risks in energy products. Here's how:

Comprehensive Cybersecurity Assessments

  • Vulnerability Assessments: Intertek evaluates hardware, firmware, and software to uncover security weaknesses in connected devices such as inverters, smart meters, and IoT-enabled equipment.
  • Penetration Testing: Simulated cyberattacks test product resilience against unauthorized access, data breaches, and other malicious activities.
  • Secure Communication Protocols: Intertek verifies that all data transmission channels are encrypted and protected against interception or tampering.

Standards Compliance

  • Intertek ensures products meet global security standards such as IEC 62443, UL 2900, and UL 2941, and SunSpec DER Device Cybersecurity.

Supply Chain Security

  • Intertek assesses not only finished products but also critical components and vendors, helping manufacturers maintain transparency and reduce the risk of compromised or unauthorized parts.

Ongoing Support

  • Regular cybersecurity assessments and Threat Risk Assessments that identify critical resources, model threat vectors, and measure risk keep manufacturers ahead of emerging threats, with actionable recommendations to strengthen security.

Powering Ahead with Confidence

The discovery of rogue communication devices is a wake-up call for the industry. By partnering with Intertek, manufacturers can proactively address cybersecurity vulnerabilities, maintain regulatory compliance, and build resilient, trustworthy supply chains. Intertek's ATIC services provide the expertise and solutions needed to safeguard critical infrastructure, protect brand reputation, and deliver peace of mind to customers and stakeholders.

In today's interconnected world, hidden risks in renewable energy equipment are a clear and present danger. Intertek stands ready to help manufacturers detect, prevent, and respond to these threats—ensuring secure, reliable, and compliant energy products for a safer future.

Headshot of Wayne Stewart
Wayne Stewart

Vice President, Global IoT & AI, Intertek

With a track record exceeding 20 years in cybersecurity product evaluation, Wayne oversees global IoT cybersecurity strategy across the globe. From consumer tech to critical infrastructure, his expertise spans sectors like medical, industrial, energy, and telecom. Throughout his career, Wayne’s innovative approach to solving tough problems has helped pave the way for advanced cybersecurity testing in the telecom sector, advancements in the payment space, and early adoption of IoT cybersecurity frameworks to solve testing and customer challenges.

You may be interested in...