Follow Slashdot stories on Twitter


Forgot your password?
Back for a limited time - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×

Submission + - Support Forums Reveal SCADA Infections (

chicksdaddy writes: "We hear a lot about vulnerabilities in industrial control system (ICS) software. But what about real evidence of compromised SCADA and industrial control systems?
According to security researcher Michael Toecker (@mtoecker), a consultant at the firm Digital Bond, the evidence for infected systems with links to industrial automation and control systems is right under our eyes: buried in public support forums.
Toecker audited support sites like, picking through data dumps from free malware scanning tools like HijackThis and DDS. He found scans of infected systems that were running specialized ICS software like Schweitzer Engineering Labs (SEL) AcSELerator Software and GE Power’s EnerVista Software (used to configure GE electric power protection products).
The infected end user systems could be the pathway to compromising critical infrastructure, including electrical infrastructure. “With access to a protection relay through a laptop, a malicious program could alter settings in the configuration file, inject bad data designed to halt the relay, or even send commands directly to the relay when a connection was made,” Toecker wrote."

This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Support Forums Reveal SCADA Infections

Comments Filter:

What this country needs is a dime that will buy a good five-cent bagel.