http://www.theregister.co.uk/2013/01/16/us_power_plant_malware/ By John Leyden The Register 16th January 2013 Two US power stations were infected by malware in the last quarter of 2012, according to a report by the US Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). USB flash drives packed with software nasties were blamed for a compromise of industrial control systems in both cases. Neither infected power plant was named. The first case emerged after a maintenance engineer noticed the thumb drive he used to back up control system settings had become unreliable. The worker then referred the matter to the IT department, which found three infections on the gadget. Investigators found sophisticated although unspecified malware on two engineering workstations associated with running critical applications. The subsequent cleanup operation was complicated by a lack of backups. [...] ______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.orgReceived on Wed Jan 16 2013 - 22:14:52 PST
This archive was generated by hypermail 2.2.0 : Wed Jan 16 2013 - 22:31:03 PST