Malware Kept US Power Plant Offline For 3 Weeks

The US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has revealed that last year, “sophisticated” malware was discovered at two power plants in the US, and kept one of them out of commission for three weeks.

Just like with Stuxnet and uranium enrichment centrifuges in 2010, the computer systems were infected through a USB drive used by an unsuspecting engineer.

The information was published in the ‘ICS-CERT Monitor’ quarterly newsletter. In it, the organisation stated that it expects the number of attacks of this type to increase.

Malware goes physical

The ICS-CERT is part of the US Department of Homeland Security, and deals with emergencies related to computer systems that monitor and manage industrial processes in the physical world. This is an increasingly important task, since a software error or hacker attack on ICS could stop factories and leave hospitals without electricity.

Securing ICS is more difficult than taking care of regular computers, because these systems have to remain operational at all times, and the periods between software updates can be very long.

In late 2012, ICS-CERT was called in to inspect a USB drive that was used to back up control system configurations at an unnamed “power generation facility”. After a quick analysis, security experts discovered that the drive was infected by not one, but three different types of malware, including some “sophisticated” strains.

ICS-CERT examined every machine that came in contact with the USB drive, and found signs of malware on two engineering workstations, both “critical to the operation of the control environment”. The situation was made worse by the fact that these workstations had no backups, so in case removal of malware went wrong, the operations of the whole facility would be significantly impaired.

“The cleaning procedures were developed in close coordination with the organization’s control system vendor to ensure that it would not adversely impact the workstations,” wrote ICS-CERT.

A similar situation occurred at an “electric utility” plant, where ten computers of the turbine control system were also infected through a USB drive during a scheduled outage. The infection caused downtime for some systems, and kept the whole plant on standby for three weeks.

“ICS-CERT continues to emphasize that owners and operators of critical infrastructure should develop and implement baseline security policies for maintaining up-to-date antivirus definitions, managing system patching, and governing the use of removable media,” reminded the organisation.

Last year, Eugene Kaspersky warned that the future could involve “mass cyber-attacks on things like nuclear power stations, energy supply and transportation control facilities, financial and telecommunications systems”.

Kaspersky announced that his company is working on a secure, highly specialised OS that could integrate into existing ICS infrastructure and would be unable to carry out any undeclared activity by design.

Do you know your USB? Take our quiz!

Max Smolaks

Max 'Beast from the East' Smolaks covers open source, public sector, startups and technology of the future at TechWeekEurope. If you find him looking lost on the streets of London, feed him coffee and sugar.

Recent Posts

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

12 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

15 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

16 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

17 hours ago