AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.
Utility | Customer Stories

Protecting the Grid: How One Utility Secured Its Infrastructure from Removable Media and Transient Cyber Asset Threats

A Fortune 500 utility deployed OPSWAT’s purpose-built solution to secure against threats from removable media and transient cyber assets.
Share this Post

About the Company: This Fortune 500 electric utility serves millions of customers across North America. With more than 20,000 employees, the company plays a critical role in delivering reliable power, modernizing the grid, and leading a large-scale transition to clean energy. Its operations span generation, transmission, and distribution, with a growing emphasis on digitalization and interconnectivity. The company must uphold strict regulatory compliance while protecting complex, often distributed infrastructure from evolving cyberthreats.

What's the Story? To defend its infrastructure from growing cyberthreats and meet strict requirements under NERC CIP 003-7 and nuclear cybersecurity directives, the company needed a better way to control and secure how data entered its operational systems. Removable media and transient devices posed particular risks. Their internal scanning tools couldn’t keep up. Detection rates were low, processes were inconsistent, and they lacked protection against advanced and zero-day threats. The organization turned to OPSWAT for a new approach that is based on purpose-built tools for media scanning, device inspection, and centralized oversight.

Due to the nature of the business, the name of the organization featured in this story has been kept anonymous in order to protect the integrity of their work.

INDUSTRY:

Energy (Electric Utility)

LOCATION:

North America

SIZE:

20,000+ Employees; Fortune 500 Company Serving Millions of Customers

PRODUCTS USED:

MetaDefender Kiosk™,
MetaDefender Drive™

KEY TECHNOLOGIES:

MetaScan™ Multiscanning, 
File-Based Vulnerability Assessment

Why Legacy Tools Fell Short

The utility's internal defenses were no longer enough. Their homegrown scanning system was inefficient and failed to keep up with modern threats. The detection rates were poor. Scans required manual oversight, often delaying work or introducing inconsistencies across plants.

More importantly, the system couldn’t address the rising risks associated with transient cyber assets, such as contractor laptops and removable media brought onsite for maintenance and diagnostics, which posed new risks. Without a proper scanning process, there was no reliable way to identify malware hiding at the firmware, boot sector, or kernel level.

This weakness was not just operational. It risked deep regulatory penalties. Under NERC CIP 003-7, violations can result in fines of up to $1.5 million per day, per violation. The largest fine issued to date reached $10 million. To avoid such consequences, the company needed a compliant approach to managing transient devices and removable media as their existing tools lacked centralized control, consistent enforcement, or reporting capabilities.

Meanwhile, threat actors were evolving. According to the IBM X-Force Threat Intelligence report, in 2024, nearly one in three intrusions exploited valid credentials or public-facing vulnerabilities, many of them undetected for weeks. Credential harvesting surged, infostealer malware grew by 84% year-over-year, and critical infrastructure operators faced a growing wave of campaign-level attacks targeting supply chains and air-gapped networks.

For a utility that manages physical assets, complex supply partners, and operational zones not designed for modern cybersecurity, the risks were real and growing by the day.

A Purpose-Built Approach to Removable Media & Third-Party Laptop Security

The company started with a pilot program at one site, testing MetaDefender Kiosk and MetaDefender Drive in live operational environments. Field teams found the tools immediately valuable and easy to use. That early success led to a broader rollout across major plants, eventually scaling to dozens of Kiosks and hundreds of Drives. Together, these tools formed a robust, OT-ready solution that brought confidence back to device and media handling inside sensitive environments.

3 Key Solutions for Integrated Defense

1. MetaDefender Kiosk 

MetaDefender Kiosk serves as a critical security checkpoint for all removable media devices, acting as the first line of defense at your network's entry point. USBs, External Hard Drives, MicroSD, SD Cards, and CD/DVDs are rigorously scanned for malware, vulnerabilities, sensitive data, blocking threats before they reach critical networks. Additionally, Kiosk leverages these core technologies:

MetaScan Multiscanning

Scans with 30+ anti-malware engines for broad threat detection.

Deep CDR

Sanitizes files by rebuilding them into safe, usable versions.

Proactive DLP

Prevents sensitive data from entering or leaving the network.

File-Based Vulnerability Assessment

Identifies known weaknesses in files and applications.

Adaptive Sandbox

Safely execute suspicious files in an isolated environment for analysis.

Country of Origin

Identifies the geographic source of uploaded files.

These technologies work in conjunction to provide a robust and multi-layered defense against threats carried by removable media. With its robust functionalities, MetaDefender Kiosk ensures OT compliance by enforcing security controls that meet NERC CIP 003-7, NIST 800-53, and ISA/IEC 62443, NEI 08-09 standards.

2. MetaDefender Drive

MetaDefender Drive plays a different but complementary role. Before any third-party laptop is powered on inside a secure zone, it's scanned offline using MetaDefender Drive’s contained, secure operating system. The tool inspects everything — from user files to firmware and boot sectors — with no need to install software. That means contractors can be cleared quickly and safely without touching the internal network.

By scanning vendor and contractor laptops offline before they connect to operational systems, the company now enforces a consistent supply chain protection policy, without disrupting workflows or requiring software installs. This process directly supports compliance with NERC CIP-003-7 for transient cyber assets, as well as NIST SP 800-53 and 800-82 guidelines for securing OT environments against external devices.

3. My OPSWAT Central Management

To manage the deployment at scale, the company brought all devices under My OPSWAT Central Management. This gave security teams unified control, automated reporting, and consistent policy enforcement across the fleet, which marked a critical improvement over manual oversight.

The platform provides a single pane of glass to manage policy enforcement, monitor system health, and coordinate updates across all MetaDefender devices. It also enables real-time visibility into global threat activity and deployment status, reducing manual effort while improving incident readiness.

A Safer, Faster & More Compliant Operation

The integrated deployment of MetaDefender Kiosk, MetaDefender Drive, and My OPSWAT Central Management helped the company proactively remediate detected issues, preventing potential threats from spreading across the network. As a result, the company saw four primary areas of improvement:

Workflow Automation

Today, every file is scanned upon arrival with no exceptions or manual steps. MetaDefender Kiosk enforces this automatically, removing the burden from site security managers and ensuring a consistent, auditable process. MetaDefender Drive is now used to scan third-party laptops offline before they enter sensitive OT zones, eliminating the need for temporary installations or trust-based approvals.

Advanced Threat Detection

Threat detection has significantly improved. With OPSWAT’s Multiscanning technology, which can achieve up to 99.2% malware detection when combining 30+ engines, the company can close the gaps that single-engine tools left behind. This multilayered scanning approach also includes protection against zero-day threats and deeply hidden malware, which traditional methods often miss.

Streamlined Compliance Reporting

Compliance efforts have become more streamlined. My OPSWAT Central Management provides centralized oversight and automated reporting, allowing compliance teams to generate reports with minimal effort.

Operational Efficiency

What used to take days now takes hours. The organization can now operate faster, with more confidence, knowing that every device and file entering the environment has been thoroughly vetted. The utility’s security team continues to adapt its strategy, prioritizing safety, continuity, and compliance across all operations.

icon quote

In OT environments, you can't afford assumptions. Every file, every device must be verified before it gets anywhere near our systems. With MetaDefender Drive and MetaDefender Kiosk, we not only block threats before they reach critical assets, but we also have the proof for compliance with confidence.

Site Security Manager

Proven Defense at Every Entry Point 

These improvements have strengthened the company’s ability to detect and contain sophisticated threats before they reach critical systems. By securing every file and device at the point of entry, the organization is better equipped to defend against targeted attacks on its infrastructure.

As cyberattacks grow more advanced and regulations more specific, organizations can no longer rely on ad hoc tools or manual checks. OPSWAT’s platform offers purpose-built protection that fits the reality of critical infrastructure environments: air gaps, compliance audits, and zero tolerance for downtime.

To see how OPSWAT solutions can help secure your critical infrastructure, talk to an expert today.

Similar Stories

Aug 21, 2025 | Company News

How a Leading SaaS with Over 500 Million Installations Worldwide Secures Its Builds with MetaDefender Core

Aug 18, 2025 | Company News

Protecting Air-Gapped Endpoints: USB Security in Production Networks

Aug 15, 2025 | Company News

Energy Leader Blocks Removable Media Threats to Critical OT Systems with MetaDefender Kiosk

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.