Security Advisor

Malware Fights the Power

Government sends word that two power plants were infected with viruses via USB devices at the end of 2012.

A recent report by the United States Computer Emergency Readiness Team (ICS-CERT), a division of the U.S. Department of Homeland Security, announced that  both "common and sophisticated malware" had infected the controls of a power generation facility.

The malware apparently got into the system via the old "hide on a seemingly innocent USB device" trick.  

"When the IT employee inserted the drive into a computer with up-to-date antivirus software, the antivirus software produced three positive hits," read the report. "Initial analysis caused particular concern when one sample was linked to known sophisticated malware. Following analysis and at the request of the customer, an onsite team was deployed to their facility where the infection occurred."

But by the time that IT had investigated the device, malware had already been loaded onto a handful of machines. This incident, which took place sometime between October and December of last year, isn't an isolated event.

Earlier in October, ICE-CERT was notified that the turbine control system at another power plant had been infected, this time by an unknowing third-party technician. However, like in the first incident, an infected USB drive was the vehicle for the malware.

ICE-CERT's suggestions to avoid these types of incidents are nothing new, but worth repeating:

"While the implementation of an antivirus solution presents some challenges in a control system environment, it could have been effective in identifying both the common and the sophisticated malware discovered on the USB drive and the engineering workstations. In addition to backing up the engineering workstation  configuration files, the USB drive was also transporting malware. A good backup procedure should incorporate best practices for USB usage to ensure that malicious content is not spread or inadvertently introduced, especially in critical control environments. This procedure should include cleaning the USB device before each use or the use of write-once media such as CDs or DVDs."

Do you have a plan when it comes to employees and USB devices? Share it with us below or send your thoughts to [email protected]

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • Microsoft Previews Windows Autopilot for HoloLens 2

    Microsoft on Friday announced a public preview of Windows Autopilot for HoloLens 2, its mixed-reality headset.

  • Microsoft Flirts with Charging for API Software Connections

    Microsoft may have started something new by attempting to charge its customers for software that uses its application programming interfaces (APIs).

  • Overcoming Spacesuit Anxiety During Astronaut Training

    Spacesuits are heavy, claustrophobic and hot -- an uncomfortable combination for many would-be astronauts. Here's how Brien came around to the idea of wearing one.

  • Microsoft Announces Azure Kubernetes Service Enhancements

    Microsoft this week announced a few Azure Kubernetes Service (AKS) product milestones as part of the KubeCon event.

comments powered by Disqus