Close Menu
  • News
  • Industry
  • Solar Panels
  • Commercial
  • Residential
  • Finance
  • Technology
  • Carbon Credit
  • More
    • Policy
    • Energy Storage
    • Utility
    • Cummunity
What's Hot

Zendure launches battery ranges for residential PV – SPE

April 23, 2026

The CFO’s Guide To Nature Based Solutions

April 23, 2026

Inside PV Manufacturing: Belga Solar’s module factory in Belgium

April 23, 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Solar Energy News
Thursday, April 23
  • News
  • Industry
  • Solar Panels
  • Commercial
  • Residential
  • Finance
  • Technology
  • Carbon Credit
  • More
    • Policy
    • Energy Storage
    • Utility
    • Cummunity
Solar Energy News
Home - Technology - AI-enabled hacks expose risk of remote shutdown of microinverters – SPE
Technology

AI-enabled hacks expose risk of remote shutdown of microinverters – SPE

solarenergyBy solarenergyApril 7, 2026No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

IT security firm Jakkaru has identified a vulnerability in AP Systems microinverters that could enable a ‘kill switch’ scenario, potentially shutting down tens of thousands of inverters simultaneously and disrupting grid operations.

April 7, 2026
Marian Willuhn

Cybersecurity company Jakkaru has disclosed a critical security flaw in microinverters manufactured by Chinese manufacturer AP Systems.

According to Jakkaru, the flaw allowed the devices to be completely compromised over the Internet, including the ability to shut down systems selectively and simultaneously. AP Systems patched the vulnerability after being alerted by Jakkaru.

The hack targeted the EZ1-M microinverter, which is also sold as a white-label product by companies like Anker under the model name Solix Mi80. Jakkaru identified approximately 100,000 vulnerable devices that were accessible online. The researchers believe that a potentially larger device base, including AP Systems’ home energy storage systems, may also have been affected. There are approximately 600,000 AP Systems installations in use worldwide.

MQTT infrastructure attack

The researchers discovered a relatively easy-to-hack MQTT gateway within the inverters’ communications system. The devices transmit corporate data via a cloud-based MQTT system, with authentication performed using static keys derived from the device’s serial number. Because these serial numbers are assigned sequentially, they are relatively easy to predict.

Jakkaru’s team reconstructed the authentication mechanism. In their tests, they used AI models such as Gemini Pro to reverse engineer the firmware. This allowed them to pose as a legitimate device on the MQTT gateway.

Jakkaru highlighted the ability to trigger firmware updates via “saved messages” in the MQTT protocol as particularly crucial. Attackers can take advantage of this to flash malicious firmware on the devices. In a proof-of-concept, the researchers showed that this provides complete control over the inverter.

See also  Algorithms to detect underperforming PV panels on roofs – SPE

“AI systems like Gemini Pro can help find security vulnerabilities faster and more effectively,” said Marlon Starkloff, Managing Director of Jakkaru, speaking to pv magazine. “Instead of several days of manual investigation, AI systems now only take a few hours. However, this also allows attackers with limited IT knowledge to cause significant damage. The barrier to entry has been lowered.”

Starkloff noted that experienced hackers probably could have discovered the vulnerability without AI, but Gemini simplified the process. Reverse engineering requires in-depth knowledge to identify certain functionalities, and AI systems are particularly suitable for this. He estimates that without AI, compromising AP Systems’ inverters would have taken about three days – just an hour with AI assistance.

Entry point

In addition to the communication module, the control components of the inverters’ power electronics can also be targeted, potentially allowing attackers to disrupt the power supply. According to Jakkaru, such a compromise could have several consequences, including accessing Wi-Fi credentials and other information stored on the device, using compromised inverters as access points to local networks, harvesting devices for DDoS attacks, damaging devices through manipulated firmware, or even coordinating the shutdown of large numbers of inverters.

Jakkaru reported the vulnerability to AP Systems in November 2025. The manufacturer estimated that the recovery would take approximately three months, due to the required changes to the backend infrastructure. The results were published on March 4, 2026.

“AP Systems has completed a comprehensive update to its device-to-server communications security. Thanks to numerous technical improvements, all products are now fully compliant with European cybersecurity standards. To address gaps such as weak traditional encryption and unprotected secret keys, AP Systems devices now use a security authentication solution with unique credentials per device, effectively preventing malicious attacks and information leaks,” an AP Systems spokesperson told pv magazine.

See also  Longi launches an integrated strategy for a solar plus storage platform – SPE

“At the same time, the system verifies unique identifiers, such as device type and MAC address, combined with the X-Sign signature verification mechanism, to ensure authentic and reliable requests and further improve device access,” the spokesperson continued. “This update marks a milestone in AP Systems’ cybersecurity capabilities and strengthens the company’s leadership position in product security and compliance. It enables AP Systems users in Europe and worldwide to benefit from more secure, stable and reliable products and services.”

This content is copyrighted and may not be reused. If you would like to collaborate with us and reuse some of our content, please contact: editors@pv-magazine.com.

Popular content

Source link

AIenabled expose hacks Microinverters remote risk shutdown SPE
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
solarenergy
  • Website

Related Posts

Zendure launches battery ranges for residential PV – SPE

April 23, 2026

Solar energy’s rebound effect could increase European electricity demand by 5% by 2050 – SPE

April 23, 2026

Repowering key for Japanese solar assets nears end of feed-in tariff – SPE

April 23, 2026
Leave A Reply Cancel Reply

Don't Miss
Technology

Bradford White releases residential viewers of residential hybrid electric heat pump – PV Magazine International

By solarenergyJuly 24, 20250

The company established in the US says that its new Aerotherm G2 uses both electric…

5 Big Solar Trends from CLEANPOWER: Utility-scale Solar on the Rise

May 24, 2024

Hive Energy obtains grid connection permit for 215.6 MW of solar projects in Serbia – SPE

June 6, 2024

New single-diode model tackles recombination losses in solar cells – SPE

February 21, 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Our Picks

Zendure launches battery ranges for residential PV – SPE

April 23, 2026

The CFO’s Guide To Nature Based Solutions

April 23, 2026

Inside PV Manufacturing: Belga Solar’s module factory in Belgium

April 23, 2026

Solar energy’s rebound effect could increase European electricity demand by 5% by 2050 – SPE

April 23, 2026
Our Picks

Zendure launches battery ranges for residential PV – SPE

April 23, 2026

The CFO’s Guide To Nature Based Solutions

April 23, 2026

Inside PV Manufacturing: Belga Solar’s module factory in Belgium

April 23, 2026
About
About

Stay updated with the latest in solar energy. Discover innovations, trends, policies, and market insights driving the future of sustainable power worldwide.

Subscribe to Updates

Get the latest creative news and updates about Solar industry directly in your inbox!

Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Tsolarenergynews.co - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.