[1] First described in a research paper released by the Georgia Institute of Technology,[2][1] the malware is capable of hijacking multiple PLCs from various popular vendors.
The ransomware is designed to bypass weak authentication mechanisms found in various PLCs and lock out legitimate users while planting a logicbomb into the PLC.
To further ensure a successful attack Encryption is employed to follow traditional cryptoransomware practices for future negotiations.
Endpoint security techniques such as password changes, disabling of unused ports and protocols and implementation of Access Control Lists (ACL), maintaining proper backups and firmware updates should be used.
[1] The training of employees to properly identify phishing emails, prohibition of USB devices and incorporating a comprehensive incident response plan should be used to assist in countering this threat.