The US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has revealed that last year, “sophisticated” malware was discovered at two power plants in the US, and kept one of them out of commission for three weeks.
Just like with Stuxnet and uranium enrichment centrifuges in 2010, the computer systems were infected through a USB drive used by an unsuspecting engineer.
The information was published in the ‘ICS-CERT Monitor’ quarterly newsletter. In it, the organisation stated that it expects the number of attacks of this type to increase.
The ICS-CERT is part of the US Department of Homeland Security, and deals with emergencies related to computer systems that monitor and manage industrial processes in the physical world. This is an increasingly important task, since a software error or hacker attack on ICS could stop factories and leave hospitals without electricity.
Securing ICS is more difficult than taking care of regular computers, because these systems have to remain operational at all times, and the periods between software updates can be very long.
ICS-CERT examined every machine that came in contact with the USB drive, and found signs of malware on two engineering workstations, both “critical to the operation of the control environment”. The situation was made worse by the fact that these workstations had no backups, so in case removal of malware went wrong, the operations of the whole facility would be significantly impaired.
“The cleaning procedures were developed in close coordination with the organization’s control system vendor to ensure that it would not adversely impact the workstations,” wrote ICS-CERT.
A similar situation occurred at an “electric utility” plant, where ten computers of the turbine control system were also infected through a USB drive during a scheduled outage. The infection caused downtime for some systems, and kept the whole plant on standby for three weeks.
“ICS-CERT continues to emphasize that owners and operators of critical infrastructure should develop and implement baseline security policies for maintaining up-to-date antivirus definitions, managing system patching, and governing the use of removable media,” reminded the organisation.
Last year, Eugene Kaspersky warned that the future could involve “mass cyber-attacks on things like nuclear power stations, energy supply and transportation control facilities, financial and telecommunications systems”.
Kaspersky announced that his company is working on a secure, highly specialised OS that could integrate into existing ICS infrastructure and would be unable to carry out any undeclared activity by design.
Do you know your USB? Take our quiz!
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…