Process control system infection concerns – actual current cases

July 28, 2011
A number of control system networks in South America are currently being impacted by several different malware infections. In one case, the control systems utilize OPC for interoperability.  The company has configured their systems such that all of their facilities are on a common network. This is not unusual as fleet asset management and environmental dispatch needs often require direct or indirect communications to all plants in the fleet. In the South American case, once the infection occurs, it can spread to all facilities within the fleet.
A number of control system networks in South America are currently being impacted by several different malware infections. In one case, the control systems utilize OPC for interoperability.  The company has configured their systems such that all of their facilities are on a common network. This is not unusual as fleet asset management and environmental dispatch needs often require direct or indirect communications to all plants in the fleet. In the South American case, once the infection occurs, it can spread to all facilities within the fleet. Moreover, the infection can impact systems from vendors other than the one initially impacted. There is a saying that control system security can result in the system be hard on the outside, but soft and chewy on the inside. This seems to be an excellent example where even an unintentional infection by a vendor’s compromised laptop at one facility can impact the entire fleet. Additional complications are multiple older workstations that do not run antivirus and cannot be patched and the forensics cannot identify where the infection started. Even more problematic is that up-to-date anti-virus did not prevent a Conficker (Stuxnet?) infection in one of the process control networks. These types of vulnerability can impact process control networks in any industry. In the South American case, the systems affected are both power plant and steel mill control systems. The proper scope for cyber security is the correct application of the specifications in ISA99 in any industrial control system, in any industry, including fossil power and nuclear. In the South American case, there are steel mills and power plants affected. The system integrator from South America will discuss these cases at the September ACS Conference.
Joe Weiss

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.