Stuxnet Scenario: Power Plant Maintenance Window
Nuclear ICS Sabotage • Stuxnet
STAKES
Nuclear safety + Grid stability + Industrial control integrity + National security response
HOOK
During a scheduled maintenance outage, control-room teams observe subtle mismatches between sensor readings and physical equipment behavior, unexpected activity on engineering workstations, and unauthorized logic changes in industrial controllers. Security monitoring also detects suspicious removable-media artifacts on contractor devices used in maintenance areas.
PRESSURE
- Decision deadline: 6:00 PM
- Grid impact: potential shortages affecting 2.8 million residents
- Facility profile: Nuclear power plant with 800 employees
FRONT • 180 minutes • Expert
Nuclear ICS Sabotage • Stuxnet
NPCs
- Director Frank Morrison (Plant Director): Owns restart authorization and public safety decisions
- Dr. Sarah Chen (Chief Nuclear Engineer): Verifies process integrity and safety margins under abnormal conditions
- Kevin Torres (IT/OT Director): Leads containment and forensic triage across engineering networks
- Jennifer Park (Security Director): Coordinates evidential controls and external authority engagement
SECRETS
- Maintenance workflows temporarily bridged normally isolated engineering pathways
- Contractor removable media entered high-trust update processes without full chain-of-custody controls
- Controller logic changes indicate preparation for process manipulation during restart pressure
Stuxnet Scenario: Power Plant Maintenance Window
Nuclear ICS Sabotage • Stuxnet
STAKES
Nuclear safety + Grid stability + Industrial control integrity + National security response
HOOK
During a scheduled maintenance outage, control-room teams observe subtle mismatches between sensor readings and physical equipment behavior, unexpected activity on engineering workstations, and unauthorized logic changes in industrial controllers. Security monitoring also detects suspicious removable-media artifacts on contractor devices used in maintenance areas.
PRESSURE
- Decision deadline: 18:00
- Grid impact: potential shortages affecting 3.2 million residents
- Facility profile: Nuclear power plant with 1,200 employees
FRONT • 180 minutes • Expert
Nuclear ICS Sabotage • Stuxnet
NPCs
- Jean-Pierre Moreau (Plant Director): Owns restart authorization and public safety decisions
- Dr. Camille Durand (Chief Nuclear Engineer): Verifies process integrity and safety margins under abnormal conditions
- Antoine Lefebvre (IT/OT Director): Leads containment and forensic triage across engineering networks
- Nathalie Petit (Security Director): Coordinates evidential controls and external authority engagement
SECRETS
- Maintenance workflows temporarily bridged normally isolated engineering pathways
- Contractor removable media entered high-trust update processes without full chain-of-custody controls
- Controller logic changes indicate preparation for process manipulation during restart pressure
Planning Resources
For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:
Stuxnet Power Plant Maintenance Planning Document
Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.
Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:
Stuxnet Power Plant Maintenance Scenario Slides
Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support
Scenario Details for IMs
Hook
“It is Wednesday at 8:10 AM at Columbia River Nuclear Station. Maintenance teams preparing restart checks report that control screens show stable values while field technicians observe irregular vibration and cooling behavior. Engineers tracing the issue find unauthorized logic updates on ICS workstations tied to maintenance activity. Security staff then identify suspicious removable-media artifacts on contractor tools used during the outage window.”
“Initial engineering anomaly logged at 8:10 AM in United States.”
“Operating profile: critical energy infrastructure.”
“It is Wednesday at 08:10 at Centrale Nucleaire du Loire. Maintenance teams preparing restart checks report that control screens show stable values while field technicians observe irregular vibration and cooling behavior. Engineers tracing the issue find unauthorized logic updates on ICS workstations tied to maintenance activity. Security staff then identify suspicious removable-media artifacts on contractor tools used during the outage window.”
“Initial engineering anomaly logged at 08:10 in France.”
“Operating profile: OIV-designated nuclear operator.”
Initial Symptoms to Present:
- “Control-room displays appear stable, but field instruments report inconsistent physical behavior”
- “Engineering workstations show unauthorized logic updates in controller project files”
- “Safety-verification scripts return intermittent mismatches across cooling and rotation loops”
- “Removable-media scans from contractor kits reveal suspicious artifacts in maintenance directories”
Key Discovery Paths:
Detective Investigation Leads:
- Timeline reconstruction links initial compromise to planned outage maintenance procedures
- Firmware and logic-diff analysis shows targeted modifications in safety-relevant process control
- Artifact chain indicates staged persistence designed to remain hidden during routine checks
Protector System Analysis:
- Integrity validation reveals discrepancies between operator displays and physical-state telemetry
- Isolation review identifies maintenance exceptions that bypassed intended segmentation boundaries
- Containment design must preserve safe process control while evidence remains admissible
Tracker Network Investigation:
- Engineering-network telemetry shows low-volume command patterns consistent with staged ICS operations
- Cross-segment traces map movement through trusted update and diagnostic workflows
- Threat profile suggests highly resourced targeting with process-specific objectives
Communicator Stakeholder Interviews:
- Operations leadership needs confidence thresholds before restart decisions are defensible
- Safety teams require clear sequencing between containment actions and process verification
- External authorities require timely, evidence-backed status updates under regulated obligations
Crisis Manager Strategic Coordination:
- Round 1: Initiate mandatory reporting under {{regulatory_framework}} – escalate to {{regulatory_body}} with accurate safety posture statement; neither overstate confidence nor trigger unnecessary alarm; establish the compliance clock
- Round 2: Manage restart authorization – {{regulatory_body}} controls go/no-go; negotiate evidence and verification thresholds needed to satisfy compliance requirements before any restart conversation begins
- Round 3: Coordinate grid operator communications – executive leadership requires a defensible decision point with current evidence before {{decision_deadline}}
- Round 5+: Establish post-incident compliance roadmap; participate in sector-wide critical infrastructure threat briefing through {{cyber_authority}}; ensure facility meets enhanced ICS requirements before regulatory clearance
Threat Hunter APT Investigation:
- Round 1: Do not assume remediation is complete – hunt for dormant implants in safety instrumented systems (SIS) and historian servers that standard incident response may not have reached; Stuxnet-style attacks target components investigators rarely check first
- Round 2: Reconstruct adversary dwell time – search for earliest indicators of compromise to determine whether the attacker was present before the maintenance window began; the timing of {{decision_deadline}} may not be coincidental
- Round 3: Hunt for pre-positioned re-entry mechanisms – adversaries targeting critical infrastructure often leave backdoors designed to survive remediation; verify clean state before any restart conversation reaches {{regulatory_body}}
- Round 5+: Develop hunting playbook for hidden persistence in ICS/SCADA environments; contribute findings to {{cyber_authority}} critical infrastructure threat intelligence program
Mid-Scenario Pressure Points:
- Hour 1: Scheduled regulator touchpoint requests a current integrity statement for restart-critical systems
- Hour 2: Grid coordinators request an updated restart probability due to demand pressure
- Hour 3: Engineering teams confirm additional logic anomalies in process-control loops
- Hour 4: Leadership must decide whether to extend outage or proceed under constrained conditions
Evolution Triggers:
- If logic manipulation persists, restart actions can amplify physical risk in safety-critical processes
- If outage extends without clear communication, regional grid stress and public pressure escalate
- If forensic confidence weakens, regulatory and legal exposure increases alongside technical uncertainty
Resolution Pathways:
Technical Success Indicators:
- Unauthorized logic changes are removed and independently validated against known-good baselines
- Segmentation and maintenance controls are re-established with verified trust boundaries
- Continuous monitoring is aligned to detect process deception before restart authorization
Business Success Indicators:
- Restart governance remains evidence-based and safety-first under schedule pressure
- Authority communication is consistent with verified scope and response milestones
- Recovery protects both operational continuity and long-term infrastructure confidence
Learning Success Indicators:
- Team demonstrates practical understanding of ICS sabotage patterns and detection limits
- Participants balance safety engineering and cyber response priorities under real constraints
- Group coordinates technical, regulatory, and operational stakeholders with clear decision logic
Common IM Facilitation Challenges:
If Teams Prioritize Schedule Over Safety Evidence:
“Restart pressure is rising, but controller integrity is still contested. What proof is required before any restart decision is acceptable?”
If Teams Treat This as Standard IT Malware:
“This incident targets process behavior, not office endpoints. How does your response change when physical systems can be manipulated while dashboards appear normal?”
If Teams Delay Authority Coordination:
“External authorities request immediate status under regulated obligations. What do you report now, and what evidence supports each claim?”
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 3 investigation rounds, 1 decision round
Focus: Identify ICS manipulation risk and establish immediate safety-governed response
Key Actions: Confirm control integrity gaps, isolate risky pathways, and set restart criteria
Lunch & Learn (75-90 minutes)
Structure: 5 investigation rounds, 2 decision rounds
Focus: Balance outage pressure, authority coordination, and high-confidence verification
Key Actions: Trace maintenance-vector compromise, validate controller state, align escalation plans
Full Game (120-140 minutes)
Structure: 7 investigation rounds, 3 decision rounds
Focus: End-to-end critical-infrastructure response under regulatory and grid pressure
Key Actions: Coordinate multi-team forensics, protect process safety, and restore trusted operations
Advanced Challenge (150-170 minutes)
Structure: 8-9 investigation rounds, 4 decision rounds
Expert Elements: Ambiguous process telemetry, contested restart thresholds, and multi-agency pressure
Additional Challenges: Escalating public scrutiny, supply-chain uncertainty, and extended outage economics
This French variation can be adapted to other EU countries during facilitation. EU members share GDPR, but energy and nuclear oversight structures vary by country.
When localizing this power-plant scenario, substitute the relevant institutions below:
| Germany |
BfDI |
Bundesnetzagentur / state nuclear authorities |
BSI |
KRITIS operator |
| Netherlands |
Autoriteit Persoonsgegevens |
ANVS |
NCSC-NL |
Vital infrastructure operator |
| Sweden |
IMY |
SSM (Stralsakerhetsmyndigheten) |
CERT-SE |
National critical infrastructure operator |
| Finland |
Tietosuojavaltuutettu |
STUK |
NCSC-FI |
National critical infrastructure operator |
| Belgium |
APD/GBA |
FANC |
CCB-CERT.be |
NIS2 essential entity |
Notes:
- Safety governance: Nuclear and grid oversight can be split across multiple agencies.
- Escalation paths: National cyber authorities and energy regulators may have parallel reporting expectations.
- Facilitation: Keep attack flow and technical learning stable, localize only institutions, role labels, and legal framing.
Quick Demo Materials (35-40 min)
Guided Investigation Clues
- Clue 1 (Minute 5): Plant Director Frank Morrison opens the incident bridge and states that restart cannot proceed without verified control-system integrity. Chief Nuclear Engineer Dr. Sarah Chen reports discrepancies between instrument displays and physical measurements in key process loops. IT/OT Director Kevin Torres confirms unauthorized logic changes in engineering stations and requests immediate containment of maintenance pathways. Security Director Jennifer Park starts evidence preservation and federal notification preparation under critical-infrastructure procedures.
- Clue 2 (Minute 10): NRC channels request a documented safety-integrity status before restart authorization, while federal cyber partners request forensic artifacts tied to removable-media activity and controller changes.
- Clue 3 (Minute 15): Federal analysts warn that high-end ICS campaigns often stage quietly during planned outages, then trigger process manipulation when restart pressure is highest.
- Clue 1 (Minute 5): Directeur de Centrale Jean-Pierre Moreau opens the incident bridge and states that restart cannot proceed without verified control-system integrity. Ingenieure Nucleaire en Chef Dr. Camille Durand reports discrepancies between instrument displays and physical measurements in key process loops. Directeur IT/OT Antoine Lefebvre confirms unauthorized logic changes in engineering stations and requests immediate containment of maintenance pathways. Directrice Securite Nathalie Petit starts evidence preservation and regulator notification preparation under OIV procedures.
- Clue 2 (Minute 10): ASN and ANSSI channels request a documented safety-integrity status before restart authorization, while national cyber partners request forensic artifacts tied to removable-media activity and controller changes.
- Clue 3 (Minute 15): ANSSI warns that high-end ICS campaigns often stage quietly during planned outages, then trigger process manipulation when restart pressure is highest.
Pre-Defined Response Options
Option A: Safety-First Extended Outage
- Action: Extend outage, complete full controller validation, and defer restart until independent assurance is complete.
- Pros: Maximizes confidence in physical safety and long-term evidential defensibility.
- Cons: Increases grid pressure, cost exposure, and public scrutiny over outage duration.
- Type Effectiveness: Super effective for neutralizing stealth manipulation risk before restart.
Option B: Parallel Validation with Conditional Restart
- Action: Conduct accelerated validation while preserving strict go/no-go criteria for each restart-critical subsystem.
- Pros: Balances operational urgency with structured integrity checks.
- Cons: Requires sustained high-tempo coordination and leaves less margin for ambiguity.
- Type Effectiveness: Moderately effective when verification discipline remains uncompromised.
Option C: Segmented Recovery and Deferred Noncritical Loads
- Action: Restore only validated control domains first, defer noncritical capacity, and continue forensic expansion in parallel.
- Pros: Improves resilience by reducing restart scope while preserving essential service.
- Cons: Extends partial-operating period and complicates coordination across teams.
- Type Effectiveness: Moderately effective with strong governance and monitoring controls.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Compromise Mapping and Safety Prioritization (30-35 min)
- Opening: Plant Director Frank Morrison opens the incident bridge and states that restart cannot proceed without verified control-system integrity. Chief Nuclear Engineer Dr. Sarah Chen reports discrepancies between instrument displays and physical measurements in key process loops. IT/OT Director Kevin Torres confirms unauthorized logic changes in engineering stations and requests immediate containment of maintenance pathways. Security Director Jennifer Park starts evidence preservation and federal notification preparation under critical-infrastructure procedures.
- Clue 1 (Minute 10): “Maintenance teams report restart-critical loops still show conflicting physical and digital telemetry.”
- Clue 2 (Minute 20): “Immediate escalation is required through FBI, CISA, and NRC Cyber under NRC, NERC CIP, and FERC obligations with immediate federal coordination.”
- Opening: Directeur de Centrale Jean-Pierre Moreau opens the incident bridge and states that restart cannot proceed without verified control-system integrity. Ingenieure Nucleaire en Chef Dr. Camille Durand reports discrepancies between instrument displays and physical measurements in key process loops. Directeur IT/OT Antoine Lefebvre confirms unauthorized logic changes in engineering stations and requests immediate containment of maintenance pathways. Directrice Securite Nathalie Petit starts evidence preservation and regulator notification preparation under OIV procedures.
- Clue 1 (Minute 10): “Maintenance teams report restart-critical loops still show conflicting physical and digital telemetry.”
- Clue 2 (Minute 20): “Immediate escalation is required through ANSSI and DGSI under GDPR, ASN safety obligations, and ANSSI OIV requirements with immediate regulator and OIV escalation.”
Round 2: Restart Decision Under Grid and Regulatory Pressure (30-35 min)
- Clue 3 (Minute 35): “Grid coordinators project potential shortages affecting 2.8 million residents if restart remains delayed beyond current maintenance assumptions.”
- Clue 4 (Minute 45): “Enhanced independent monitoring package is priced at USD 5 million for sustained post-incident assurance.”
- Pressure Event (Minute 55): “Executive leadership requires a defensible restart decision by 6:00 PM with current evidence and formal updates to NRC oversight channels.”
- Clue 3 (Minute 35): “Grid coordinators project potential shortages affecting 3.2 million residents if restart remains delayed beyond current maintenance assumptions.”
- Clue 4 (Minute 45): “Enhanced independent monitoring package is priced at EUR 5.5 million for sustained post-incident assurance.”
- Pressure Event (Minute 55): “Executive leadership requires a defensible restart decision by 18:00 with current evidence and formal updates to ASN and ANSSI oversight channels.”
Debrief Focus
- How maintenance windows create predictable opportunities for high-consequence ICS compromise
- Why process deception in control environments demands different response logic than IT incidents
- Which verification thresholds should govern restart authorization under uncertainty
- How regulator and grid coordination should be structured during prolonged outage pressure