AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.
Energy | Customer Stories

Enhancing Renewable Energy Supply Chain Security with OPSWAT MetaDefender Drive™

How MetaDefender Drive Transformed on-premises Security and BYOD Policies for a Leading Renewable Energy Provider
Share this Post

About the Company: The client is a leading renewable energy producer in the European and North American markets with extended operations in Asia. The company operates renewable energy sites located in over 15 countries, with over 5,000 employees. It specializes in wind, solar, and bioenergy, focusing on developing sustainable low-carbon solutions.

What's the Story? Due to the nature of the industry, third-party vendors operate using their laptops inside many air-gapped zones. In our client's case, internal company employees needed to access remote control centers using their internet connected laptops. To ensure the security of these transient devices, our client urgently needed an effective and quick-to-deploy solution to ensure the security of external contractors and vendor laptops before granting them access to air-gapped OT networks and control centers.

The company deployed MetaDefender Drive at a wind power plant in Denmark as a three-month pilot to ensure all employees and third-party laptops were thoroughly scanned. Following the success of the pilot, the unprecedented malware detection rates and the detection of multiple files containing sensitive data, more MetaDefender Drives were planned to be deployed in 26 locations. MetaDefender Drive has even become an integral part of the company’s BYOD policy. In addition, a further decision was made to utilize MetaDefender Drive’s Country of Origin Detection technology to determine the authenticity of files and hardware entering their facilities.

Due to the nature of the business, the name of the organization featured in this story has been kept anonymous in order to protect the integrity of their work.

INDUSTRY:

Renewable Energy

LOCATION:

Europe, and North America

The Growing Concern with Power Grid Cyberattacks

The threat of cyberattacks that can lead to a total shutdown of critical infrastructure facilities or entire power grids isn’t just speculation. Events like the 2015 Ukraine power grid hack, which left nearly 230,000 people without electricity, and the 2016 cyberattack on Kyiv's transmission station, which plunged parts of the city into darkness, highlight the devastating potential of such breaches.

Besides power grids, other critical infrastructure facilities are constantly at risk of cyberattacks. For instance, the Colonial Pipeline hack (2021) was considered a national security threat and led to the declaration of a state of emergency. This incident was caused due to a leaked password.

Challenges with Securing Transient Devices

The air-gapped renewable energy sites and the remote control centers operated by our client required constant access from transient devices. These devices included third-party vendor laptops and internet-connected company employees’ laptops. The company had a set of internal compliance rules for vendors' and employees' laptops that included installing a specific live AV (antivirus) scanning solution on the transient devices. Using such solutions to scan vendors’ devices before using them in secure zones wasn’t sufficient to detect certain types of malware that can be well disguised. The security of the remote employees' personal devices was also a matter of concern since many control center employees were permitted to use their own devices while working remotely.

Introducing Bare Metal Scanning to Secure Renewable Energy Supply Chains

Prior to implementing MetaDefender Drive into their existing cybersecurity operations, the live AV scanning solutions used by our client included a single antivirus engine. In addition, these live scanners ran their scans after booting the device’s operating system, giving certain types of malware the ability to avoid detection. The incorporation of bare metal scanning, the ability to detect files with sensitive data, and the ability to scan hidden areas, such as boot sectors, were fairly new to the organization’s cybersecurity procedures. As a result, an initial 3-month pilot was conducted in one of the company’s wind power facilities, with a new policy to perform a bare metal scan on every transient device entering the facility. The aim of the pilot was to decide how MetaDefender Drive could be utilized within the company’s cybersecurity operations.

CategoryScanned AreaTypical Malware Classification(s) DetectionMetaDefender DriveLive Scanning
User Space (applications and data)Applications files
User files
Services patches
Macro Spyware
Trojan Horse Exploit
Kernel / OSDeep OS / KernelBinary Rootkit
Kernel Rootkit
Rootkit
Library Rootkit
Database Rootkit
Kernel Patches
Backdoor
Stealth Virus
Partial
Hypervisor KernelVM Kernel and OSRootkit of VMDK or VHDXPartial
PSRPartition Boot
Sector Record
Boot Virus
MBRMaster Boot
Sector Record
Boot Virus
EUFI / BIOSEUFI and BIOS partition sectorBoot Virus
Device HardwareEPROMs
FPGAs
NICs
Storage controllers
Embedded Programmable Bit Streams or Drivers
Global Use CaseSupply Chain SecurityIdentify Country of Origin for Embedded Hardware
icon quote

The ability to run bare metal scans and to detect files that include sensitive data enabled us to mitigate various cybersecurity risks, including early malware detection and preventing sensitive data leakage.

IT Security Operations Manager

Enhancing the Defense-In-Depth Strategy and Increasing the Malware Detection Rate

Enhanced malware detection and seamless deployment with MetaDefender Drive for secure file scanning

After the three months, MetaDefender Drive had a significantly higher detection rate than the previous solution. The main concern was the slow process of scanning devices using MetaDefender Drive and another AV scanning solution. However, it was only needed during the three-month pilot to validate the deployment of MetaDefender Drive as a robust security protocol that can replace the need for a single-engine solution.

The high increase in the malware detection rate led to relying on MetaDefender Drive as the primary scanning solution for transient device safety. To optimize the scanning process performance, the requirement to use a live AV scanning solution to scan a transient device was abolished at the pilot location, but the requirement to have it installed remained. The deployment of MetaDefender Drive was seen as a major enhancement to the company’s defense-in-depth cybersecurity strategy and a major leap forward in their supply chain security posture.

Strengthening BYOD Security

The organization had an established BYOD policy enabling employees to perform specific duties remotely using their own devices. The policy granted personal devices access to some of the organization’s critical systems. According to the BYOD policy, those devices were advised to be periodically scanned on-premises.

With the introduction of MetaDefender Drive into the organization, another layer of defense was added to its BYOD policy. It has become a requirement to perform monthly or bi-monthly on-premises scans, depending on the remote employee’s schedule, on every device granted remote access to the company’s internal systems.

MetaDefender Drive’s ability to detect files with sensitive data and Proactive DLP™ technology have proven to be a crucial enhancement to the company’s BYOD policy. The deployed configuration with 7 malware scanning engines has been tested and validated to achieve an 88.9% malware detection rate, offering a significant improvement over single engine anti-malware solutions.

icon quote

The number of sensitive data leakage and malware threat detection we have addressed after using MetaDefender Drive was beyond the capabilities of any scanning software we used in the past.

IT Security Operations Manager

Future Expansion of MetaDefender Drive Applications 

Following the company-wide satisfaction with the pilot results and the initial success of the BYOD policy enhancement, a decision has been made to expand the deployment of MetaDefender Drive to 26 additional locations across its global operations within 2 months. In addition, further considerations have been made to utilize more of MetaDefender Drive’s capabilities, particularly, the Country of Origin detection.

Threat detection report showing potential malware and data sensitivity from scanned files

Our client was actively seeking a solution that could detect the origin and the authenticity of the transient devices’ software and firmware. Country of Origin detection is crucial to ensure that the organization isn’t directly or indirectly dealing with a sanctioned entity. Since MetaDefender Drive was used effectively to identify these critical details, its use has been expanded to be the main Country of Origin detection solution in future deployments. 

To learn more about how OPSWAT can protect your critical infrastructure and discover more about MetaDefender Drive’s capabilities, reach out to an OPSWAT expert today. 

Similar Stories

Aug 15, 2025 | Company News

Energy Leader Blocks Removable Media Threats to Critical OT Systems with MetaDefender Kiosk

Aug 6, 2025 | Company News

OPSWAT Secures Aerospace and Defense Facilities from Removable Media and Third-Party Threats

Jul 29, 2025 | Company News

Airport Operator Secures Removable Media File Transfers with OPSWAT

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.