Malware infects two US power plants

Computers at two power plants in the US have been infected with malware, according to the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a section of the US Department of Homeland Security.

At one power station, a sophisticated virus was found on three computers, two of them crucial to the plant’s control environment. These workstations had no backup so a failed clean up would have impaired the plant’s operation, according to the latest ICS-CERT newsletter.

Department of Homeland Security logo

In early October, ten computers at another power company picked up a virus from a USB drive used to upload software updates during a scheduled outage for equipment upgrades. As the computers formed part of the plant’s turbine control system, the restart was delayed by three weeks.

To prevent such incidents, the ICS-CERT recommends maintaining a system of ‘hot spares’ or other backups for critical systems. USB device should be cleaned before each use or replaced with write-once media such as CDs or DVDs.

For more North America news

Did You Like this Article? Get All the Energy Industry News Delivered to Your Inbox

Subscribe to an email newsletter today at no cost and receive the latest news and information.

 Subscribe Now

Whitepapers

Logistics Risk Management in the Transformer Industry

Transformers often are shipped thousands of miles, involving multiple handoffs,and more than a do...

Secrets of Barco UniSee Mount Revealed

Last year Barco introduced UniSee, a revolutionary large-scale visualization platform designed to...

The Time is Right for Optimum Reliability: Capital-Intensive Industries and Asset Performance Management

Imagine a plant that is no longer at risk of a random shutdown. Imagine not worrying about losing...

Going Digital: The New Normal in Oil & Gas

In this whitepaper you will learn how Keystone Engineering, ONGC, and Saipem are using software t...