There had been compromises of critical infrastructure sites before. What was unprecedented in this attack–and of concern to some investigators and infrastructure operators–has been the use of an advanced piece of malware which targeted the safety procedures of the site. Such safety instrumented programs (SIS) are a blend of hardware and software that many critical infrastructure websites use to prevent dangerous conditions from appearing. When gasoline fuel worries or reactor temperatures climb to thresholds that are unsafe, for example, valves will be automatically closed by a SIS or initiate cooling procedures to stop health- or life-threatening accidents.
Expand / Essential infrastructure websites like this petroleum refinery in Port Arthur, Texas, rely on security systems. (charge: IIP Photo Archive)
By focusing on the SIS of the site, the malware transported the threat of bodily destruction that depending on the kind of accident and the site had the potential. The malware has been named Triton and Trisis, because it targeted the Triconex product line made from Schneider Electric. It is development was finally linked to a Russian government-backed research institute.
Read 7 remaining paragraphs