The increase in cyber attacks targeting power companies is happening at an explosive rate. It has been confirmed that advanced persistent threat (APT) actors have penetrated into the networks of an American-based nuclear power plant and successfully installed malware to command and control computers located at the nuclear generation plant. With electric utilities there is no intellectual property to steal, no credit cards to pilfer – there is only one goal: reconnaissance to prepare for an attack. Attacking and understanding the electric grid is critical for the adversary, and using cyber means is the most effective way for them to accomplish those goals. MalCrawler protects Coal, Fossil, Hydro, Nuclear, Solar, Wind, or whatever the generation plant uses is being targeted by cyber attacks.
The electrical substation has advanced more than ever, from the expansion of communication to various devices to the expansion of substation automation. The increasing use of RTUs and the dependency of the EMS haveexacerbated cyber threats that have targeted the power grid. Incidents are popping up all over the world in which substations equipment (relays, capacitor bank, transformers) are being targeted by malware in a variety of ways, from sending spoof packets from an “EMS” to opening a relay in a transmission substation.
MalCrawler is the only advanced malware protection tool that detects, analyzes, and destroys malware targeting critical infrastructure. MalCrawler is designed to help protect assets found throughout the electric grid from the RTUs, Relays, IEDs, and so on that can be found in power generation plants to substations.
Examples of Power Utility Equipment & Technology MalCrawler analyzes:
- Substation Equipment
- Voltage Regulator Control
- Capacitor Bank Control
- Switch Control
- Recloser Control
- Voltage Regulators
- Line Monitoring
- And more