PLC malware that doesn't need PC infection vector could spell disaster for critical infrastructure
Industry News
PLC malware that doesn't need PC infection vector could spell disaster for critical infrastructure
Alex · 11 May 2016
Security researchers from Germany have created a proof-of-concept malware that can hijack the systems used to automate crucial processes in critical infrastructure such as power plants without needing to first infect a computer to get to those systems.
Ralf Spenneberg and Maik Brüggeman, of security consultancy OpenSource Security Ralf Spenneberg have demonstrated a new malware that can spread like a cancer between default Siemens programmable logic controller (PLC) S7 1200 systems, causing havoc to important processes as well as making it incredibly difficult to detect and stop.
"Our worm is the first that can propagate through Siemens PLCs without support from PCs or any other system. Imagine a PLC is intercepted on the way to your plant, or by the vendor; there is little you could do to detect this and it would quickly spread throughout your plant," Spenneberg told The Register.
"We can create a denial of service, killing infected PLCs ... imagine this happening to a major plant."
A PLC is a type of digital computer armoured against severe weather conditions that is used to automate industrial electromechanical processes in power plants, water treatment facilities and even factories to make sure everything functions as it should, from the level of chemicals in water to the temperature of the furnaces used to convert coal to electricity, for example.
