Skip to content
OT Cybersecurity | | | 11 min read

USB Removable Media Security in ICS Networks - Threats and Controls

USB threats in OT environments - malware, sabotage, data exfiltration. IEC 62443 controls, security kiosk, and policies.

M
Michal Stepien
Jozef Sulwinski Jozef Sulwinski
USBremovable mediaOTICSIEC 62443malwareStuxnet
USB Removable Media Security in ICS Networks - Threats and Controls
)}

December 11, 2017, at 1:21 AM, a night shift worker at an industrial facility in the Middle East plugged a USB drive into a shared workstation. He wanted to watch the movie “La La Land,” which he had previously downloaded onto the removable media. He did not know that along with the movie, malware was delivered to the workstation, initiating an operation later named Operation Copperfield. The malware, based on the H-Worm (Houdini RAT) trojans, spread across the facility’s network, collecting configuration data and conducting reconnaissance of critical infrastructure.

This incident was not an exception. Removable media remain one of the most frequently exploited attack vectors targeting OT systems - from Stuxnet in 2010, through Agent.BTZ in US Department of Defense networks, to contemporary campaigns targeting energy and water infrastructure. In this article, we discuss current data on USB threats, normative requirements, and practical controls that help mitigate the risk.

Why USB still poses a threat in OT

OT networks have a specific characteristic that makes them vulnerable to attacks via removable media: many of them are isolated from the internet (air-gapped). Paradoxically, this very isolation makes USB the primary data transfer channel - for firmware updates, configuration files, diagnostic logs, and service software.

Employees and external contractors regularly bring to OT networks:

  • USB drives with software updates for PLC controllers and SCADA systems
  • Service laptops with diagnostic tools
  • External drives with configuration backups
  • Media with technical documentation and schematics

Each of these media may have previously been in a corporate, home, or another client’s network. If infected - it will carry malware directly past the air gap boundary, bypassing firewalls, IDS systems, and network segmentation.

Scale of the problem - data from Honeywell reports

Honeywell has published reports on USB-borne threats in industrial environments for several years, based on data from the Secure Media Exchange (SMX) system, which scans removable media at facilities worldwide.

51%

of malware designed for USB (6x increase since 2019)

82%

of USB malware capable of disrupting OT processes

1 in 4

Honeywell IR incidents linked to USB

31M

files scanned by SMX (2025)

Source: Honeywell USB Threat Report 2024, Honeywell Cyber Threat Report 2025

Data for 2024 shows that 51% of detected malware was deliberately designed to spread via USB media - a sixfold increase compared to 9% in 2019. More importantly, 82% of this malware is capable of disrupting industrial processes - through loss of view or loss of control.

In the first quarter of 2025, the SMX system detected 1,826 unique USB threats, including 124 never-before-seen variants. One in four incidents handled by the Honeywell Incident Response team involved a USB plug-and-play event.

Three removable media attack scenarios

The following scenarios are worth discussing during training for employees and external contractors servicing OT installations.

Scenario 1: Infected media from a corporate or home network

An employee copies a presentation to a USB drive from a work laptop, then uses the same drive on a personal computer at home. The media becomes infected. The next day, the employee brings it to the facility and plugs it into an engineering workstation on the OT network. The malware crosses the air gap boundary.

This is exactly how Stuxnet spread - via infected USB media and Step 7 project files, carried by companies servicing the Natanz installation. Simply viewing the media contents in Windows Explorer was enough to trigger code exploiting a .LNK file handling vulnerability.

Scenario 2: External contractor’s service laptop

An automation system integrator arrives with a laptop containing service software, configuration files, and diagnostic tools. The same laptop was used at other clients and connected to various networks. If it was infected - it will carry malware to every subsequent installation it connects to.

Scenario 3: Tampered project files or updates

Attackers modify PLC controller project files or firmware update packages, embedding malicious code. When a technician loads such a file onto a controller, the malware gains direct access to the process control layer.

WARNING

USB media are not just USB drives. Threats also include keyboards with hidden payloads (BadUSB), USB cameras with embedded code, network adapters creating unauthorized connections, and external hard drives. Every device connected through a USB port is a potential attack vector.

Normative requirements

IEC 62443

The IEC 62443 standard directly addresses threats related to removable media. Key requirements include:

RequirementDescriptionReference
Physical port controlRestricting access to USB ports on devices in critical zonesIEC 62443-2-1, IEC 62443-3-3
Media scanningMandatory scanning of media before connecting to OT networksIEC 62443-2-4
Device whitelistingAllowing only registered removable mediaIEC 62443-3-3 SR 2.3
File type controlRestricting permitted file formats on mediaIEC 62443-3-3
Principle of least privilegeMinimum permissions for operations with removable mediaIEC 62443-3-3 SR 2.1
Logging and auditingRecording all operations with removable mediaIEC 62443-2-1

These requirements should be implemented in the context of zones and conduits - segmentation details are discussed in our article on Defense in Depth in DCS systems.

NIST SP 800-82 Rev. 3 and NIST SP 1334

NIST SP 800-82 Rev. 3 (Guide to Operational Technology Security, September 2023) includes a security control overlay (OT overlay) based on SP 800-53r5, incorporating specific requirements for removable media in OT environments.

In 2025, NIST additionally published SP 1334 “Reducing the Cybersecurity Risks of Portable Storage Media in OT Environments” - a document dedicated exclusively to the security of portable storage media. It covers four areas of controls:

  1. Procedural controls - authorization policies, training, media handling procedures
  2. Physical controls - secure storage, labeling, media inventory
  3. Technical controls - malware scanning, port blocking, hardware encryption (FIPS)
  4. Transport and sanitization - integrity verification (hash/checksum), secure data wiping

TIP

When transferring files between an integrator and a facility operator, it is worth using hash or checksum verification. This confirms that the file has not been modified during transport - a simple safeguard that significantly complicates supply chain attacks.

Practical USB security controls

Security kiosk (scanning kiosk)

A security kiosk is a physical station where removable media are scanned before being admitted to the OT network. It acts as a “checkpoint” - every media device must pass scanning before being used in the production zone.

Solutions such as Honeywell Secure Media Exchange (SMX) consist of four components:

  • SMX Gateway - physical kiosk for scanning media
  • Cyber Threat Engine - threat detection engine
  • Enterprise Threat Management Portal - threat management portal
  • SMX Client - agent enforcing policies on endpoints

In the first quarter of 2025, the SMX system blocked nearly 5,000 threats, including almost 700 instances of the Ramnit worm.

Checklist: implementing USB controls in an OT environment

The following list covers controls worth implementing as a priority:

  • Conduct an inventory of all USB ports on the OT network (more on asset inventory)
  • Implement media whitelisting - only registered USB devices permitted for use
  • Install a security kiosk for scanning media before entry to the OT zone
  • Physically block unused USB ports (caps, locks, or BIOS deactivation)
  • Label media with a color code: separate media for OT, corporate, and private networks
  • Implement hardware encryption on all media approved for use in OT
  • Require external contractors to scan laptops and media before entering the facility
  • Implement network quarantine mechanisms for external service provider connections
  • Log and audit all USB media connection operations on the OT network
  • Conduct regular training for employees and contractors covering USB attack scenarios

Comparison of protection methods

MethodEffectivenessImplementation costOperational impactApplication
Physical port blockingHighLowHigh (hinders legitimate use)Stations without USB needs
Media whitelistingHighMediumMediumAll stations with USB
Scanning kioskVery highHighLow (checkpoint)Entrances to OT zones
Media encryptionMedium (protects data, not against malware)MediumLowMedia with sensitive data
USB deactivation in BIOSVery highLowVery highSystems not requiring USB
Endpoint agent (SMX Client)HighHighLowOT workstations

Cases of USB attacks on OT infrastructure

YearIncidentUSB vectorImpact
2008Agent.BTZInfected USB drive in a military base parking lotCompromise of US Department of Defense networks
2010StuxnetUSB media and Step 7 files through the supply chainDestruction of ~1,000 centrifuges at Natanz
2017Operation CopperfieldUSB drive with the movie “La La Land”Reconnaissance of critical infrastructure in the Middle East
2019Kudankulam nuclear power plant attack (India)Infected mediaCompromise of the plant’s administrative network
2024Ramnit campaignUSB media in industrial facilities3,000% increase in infections in Q4 2024 per Honeywell

Removable media security policy

Effective protection requires not only technical solutions, but above all a coherent organizational policy. Key elements below:

For employees:

  • Prohibition of personal USB media use on the OT network
  • Mandatory scanning of every media device before use
  • Unique labeling of media designated exclusively for the OT network
  • Reporting every instance of connecting an unknown device

For external contractors:

  • Data exchange exclusively through approved control mechanisms
  • Mandatory antivirus scanning of laptops and media before entering the facility
  • Full disk encryption on portable computers used for servicing purposes
  • Network quarantine for contractor device connections

NOTE

USB control implementation should be linked to a broader OT security program. USB port inventory is a natural element of ICS asset inventory, and media control policies should be consistent with the OT network segmentation policy and the zones and conduits model.

Summary

Removable media remain one of the most serious attack vectors targeting OT networks. Honeywell data from 2024-2025 confirms that the threat is not diminishing - it is growing, both in terms of malware volume and its ability to disrupt industrial processes.

Protection against USB threats requires a multi-layered approach: organizational policies, physical controls, technical solutions, and regular training. The IEC 62443 standards and NIST SP 1334 guidelines provide frameworks within which an effective removable media control program can be built.

We help industrial organizations assess risks related to removable media, design USB security policies compliant with IEC 62443, and implement technical solutions - from scanning kiosks to whitelisting and port monitoring systems.

Sources

Omówimy zakres, metodykę i harmonogram.