• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • February 26th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

Malware Found in Two US Power Stations Infecting the Control System

January 16th, 2013 Waqas Security 0 comments
Malware Found in Two US Power Stations Infecting the Control System
Share on FacebookShare on Twitter

The US Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has reported that two US power stations were attacked and infected by a malicious malware in the last quarter of 2012.USB-Malware-found

The experts have blamed not anyone else but USB flash drives filled with viruses for infecting and compromising the industrial control systems in both cases. Yet the names of infected power plant were not mentioned in the released report.

The first case came to light when an engineer realized USB flash drive that was used by him for back up control system settings had become dubious. The engineer then referred the case to the station’s IT department, which found three different malicious malwares after scanning.

The second case came into notice when another USB drive was scanned, this time an outsider contractor was blamed to plugin the USB and unintentionally spreading the malware in more then 10 computers at that power station.

ICS-CERT reports that with confirmation that the sophisticated malware existed on the two engineering  workstations, attention shifted quickly to the remaining eleven operator stations in the  control environment. Manual analysis using the known characteristics of the malware  revealed no signs of the malicious software on these operator stations.

After the onsite visit, ICS-CERT had two primary goals for assisting the organization.

Identify effective and safe cleaning procedures that could be used to remove the 
remaining malicious artifacts.

Identify best practices to prevent and detect future malware infections in this 
organization’s control environment.

ICS-CERT is educating and updating the power station operators all over the US regarding the dangerous outcome of malware and using of USB flash drives in an industrial control system environments. If you want to get in more information related to the case and a research by ICS-CERT into SCADA security, click here.

Follow @HackRead

  • Tags
  • US Power stations Malware
  • USB Malware
  • USB Virus
  • Virus found
Facebook Twitter LinkedIn Pinterest
Previous article Incapsula Security Firm Analyze Reality Behind Recent U.S. Cyber Attacks
Next article Mark Zuckerberg Presents Facebook Search Engine aka Graph Search
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Botnet Abusing Bitcoin Blockchain To Evade Detection

Botnet Abusing Bitcoin Blockchain To Evade Detection

Mozilla releases Firefox 86 equipped with ‘Total Cookie Protection’

Mozilla releases Firefox 86 equipped with ‘Total Cookie Protection’

Deleted Keybase chat images retrievable on Windows, macOS, Linux

Deleted Keybase chat images retrievable on Windows, macOS, Linux

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Cryptocurrency exchange in liquidation due to hack, hacked again
Hacking News

Cryptocurrency exchange in liquidation due to hack, hacked again

5G Promises to Increase Adoption of Cryptocurrency Investing
Technology News

5G Promises to Increase Adoption of Cryptocurrency Investing

Botnet Abusing Bitcoin Blockchain To Evade Detection
Cyber Crime

Botnet Abusing Bitcoin Blockchain To Evade Detection

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us