Two U.S. Power Plants Infected With USB Malware Last Year
January 17, 2013 3:01 PM
comment(s) - last by
Origin of the attacks was not revealed
Illustrating why it might be a good idea to
ban external media
particularly in high-security environments
, the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) -- a sub-agency of the U.S. Department of Homeland Security (DHS) -- released a newsletter this week revealing that two power plants in the U.S. suffered malware infections last year thanks to infected thumb drives.
ICS-CERT officials write:
[In the first incident] the malware was discovered when an employee asked company IT staff to inspect his USB drive after experiencing intermittent issues with the drive's operation. The employee routinely used this USB drive for backing up control systems configurations within the control environment.
[During the second incident] a third-party technician used a USB-drive to upload software updates during a scheduled outage for equipment upgrades.
Unknown to the technician, the USB-drive was infected with crimeware.
The infection resulted in downtime for the impacted systems and delayed the plant restart by approximately three weeks.
Most power providers in the U.S. are privately owned, thus the government
does not have the ability to order them what to do
security wise. But in its newsletter it firmly suggests adopting stricter restrictions on external media, commenting, "Such practices will mitigate many issues that could lead to extended system downtime."
A pair of breaches at U.S. power plants in 2012 via USB sticks, highlight the growing danger to the U.S. power grid. [Image Source: Reuters]
The U.S. federal government knows a think or two about the dangers of external media and writeable media. In 2008, the Pentagon suffered a major cyberattack that
originated from a single USB stick
plugged into a secured system. The malware, believed to have originated in Russia, quickly spread, compromising systems.
And in perhaps the most severe data loss incident in U.S. history, U.S. SPC Bradley Manning, a low-ranking U.S. Army Officer downloaded hundreds of thousands of classified documents and burned them to a CD-RW. He then allegedly
passed the documents to
, a site that has fixated on publishing supposedly "incriminating" material on the U.S. government.
The recent report on the power plant hacks did not mention where the malware appeared to originate from or the extent of the compromise. The specific malware used in each intrusion was also not revealed.
Chinese university researchers have published information suggesting an attack scheme in which malware is planted on power plant systems, only to be activated at a later date
causing catastrophic failures of the power grid
, crippling the nation a war scenario. In 2011 there was an alleged security breach
at a wind power facility
in the U.S., but that was believed to be the work of a disgruntled employee.
This article is over a month old, voting and posting comments is disabled
Power plant regulation by government
1/18/2013 9:09:00 AM
Actually only partially right. Power plants are regulated by the NERC CIP requirements if they are listed as critical plants.
We have to be able to certify all kinds of security for these plants, and are subject to very large fines for violations. One of the requirements pretty much eliminates usb devices. But not every plant is listed as critical. Also almost every plants internal control network is not connected even to main business network, let alone the internet.
"If you can find a PS3 anywhere in North America that's been on shelves for more than five minutes, I'll give you 1,200 bucks for it." -- SCEA President Jack Tretton
6 Common-Sense Security Measures Every Business Should Adopt
December 27, 2012, 8:45 AM
U.S., Britain Doing Little to Protect Power, Gas, Water From Cyberattacks
April 19, 2011, 9:28 AM
Anonymous Hacker Threatens System Security Breach at U.S. Wind Facility
April 19, 2011, 8:36 AM
Whitelisting: Ban Those "Naughty" Devices and Beef up Security
December 14, 2010, 12:17 PM
USB Stick Led to Worst Cyber Attack on U.S. Military; Russia Suspected
August 26, 2010, 9:57 AM
Obama Admin Looks to Revive Bill for Greater Media Protection in Wake of AP Controversy
May 16, 2013, 1:47 PM
Notre Dame Designs Camera to Detect Age of Bruise for Abuse Checks
May 16, 2013, 9:05 AM
Report: Climate Change Could Wash Away Historic Jamestown Site Within 100 Years
May 15, 2013, 5:39 PM
U.S. Navy Launches First Unmanned X-47B Aircraft from Carrier Flight Deck
May 15, 2013, 12:13 PM
Government Creates Global Warming "Refugee" Crisis in Alaska
May 15, 2013, 6:37 AM
Quick Note: ISS Astronaut Records David Bowie Cover from Space
May 13, 2013, 1:01 PM
Most Popular Articles
Report: Microsoft Eyes Return to "Dying" Windows 7 Path After Windows 8 Flop
May 13, 2013, 9:50 AM
Windows 8.1 Will Be Free; Microsoft Holds Onto Struggling ARM Variant
May 14, 2013, 2:57 PM
Bill Gates Gets Teary-Eyed While Discussing Steve Jobs, Shows Off Life-Saving Tech on 60 Minutes
May 13, 2013, 12:30 PM
Google Announces "Pure" Galaxy Nexus S4 for $649, Android Updates
May 15, 2013, 1:42 PM
Google's Eric Schmidt: "Don't Be Evil" was Stupid
May 14, 2013, 11:00 AM
Latest Blog Posts
Parents of Pre-Teen Drivers Commonly Practice Distracted Driving Says Study
May 9, 2013, 7:16 AM
Apple's iOS 7 Running Into Internal Delays Due to Massive Overhaul
May 1, 2013, 4:26 PM
Elon Musk Willing to Spend More Money on Widening of 405 Freeway
Apr 26, 2013, 7:28 PM
New $100 Bill Due in October
Apr 24, 2013, 11:52 PM
Volkswagen Shows off iBeetle in Shanghai
Apr 22, 2013, 9:29 PM
More Blog Posts
Copyright 2013 DailyTech LLC. -
Terms, Conditions & Privacy Information