According to security researcher Michael Toecker (@mtoecker), a consultant at the firm Digital Bond, the evidence for infected systems with links to industrial automation and control systems is right under our eyes: buried in public support forums.
Toecker audited support sites like bleepingcomputer.com, picking through data dumps from free malware scanning tools like HijackThis and DDS. He found scans of infected systems that were running specialized ICS software like Schweitzer Engineering Labs (SEL) AcSELerator Software and GE Power’s EnerVista Software (used to configure GE electric power protection products).
The infected end user systems could be the pathway to compromising critical infrastructure, including electrical infrastructure. “With access to a protection relay through a laptop, a malicious program could alter settings in the configuration file, inject bad data designed to halt the relay, or even send commands directly to the relay when a connection was made,” Toecker wrote."