Stuxnet Scenario: Smart Grid Infrastructure Sabotage
Smart Grid ICS Sabotage • Stuxnet
STAKES
Grid stability + Critical-service continuity + Infrastructure trust + National security response
HOOK
Grid operators observe unexplained switching behavior in automated distribution controls, contradictory telemetry between field devices and control dashboards, and unauthorized parameter changes in renewable balancing logic. Security monitoring also detects abnormal traffic associated with recently deployed vendor update packages.
PRESSURE
- Decision deadline: 5:45 PM
- Peak-risk window: 5:00 PM heatwave demand peak
- Facility profile: Electric utility with 500 employees serving 800,000 customers
- Exposure estimate: USD 28 million projected outage and recovery exposure
FRONT • 180 minutes • Expert
Smart Grid ICS Sabotage • Stuxnet
NPCs
- Director Patricia Hoffman (CEO): Owns strategic incident decisions and executive coordination
- Kevin Torres (Grid Operations Director): Manages real-time dispatch integrity and service continuity
- Dr. Sarah Chen (Smart Grid Engineer): Validates automation logic and control-parameter integrity
- Frank Morrison (CISO): Leads containment, evidence quality, and external authority engagement
SECRETS
- High-trust vendor update workflows introduced unverified automation changes into production controls
- Control-parameter manipulation focused on balancing functions that are hardest to challenge in real time
- Timing indicators show intent to trigger instability during predictable demand stress windows
Stuxnet Scenario: Smart Grid Infrastructure Sabotage
Smart Grid ICS Sabotage • Stuxnet
STAKES
Grid stability + Critical-service continuity + Infrastructure trust + National security response
HOOK
Grid operators observe unexplained switching behavior in automated distribution controls, contradictory telemetry between field devices and control dashboards, and unauthorized parameter changes in renewable balancing logic. Security monitoring also detects abnormal traffic associated with recently deployed vendor update packages.
PRESSURE
- Decision deadline: 17:45
- Peak-risk window: 17:00 Energiewende demand peak
- Facility profile: German municipal utility with 700 employees modernizing smart-grid operations
- Exposure estimate: EUR 31 million projected outage and recovery exposure
FRONT • 180 minutes • Expert
Smart Grid ICS Sabotage • Stuxnet
NPCs
- Thomas Muller (CEO): Owns strategic incident decisions and executive coordination
- Stefan Weber (Grid Operations Director): Manages real-time dispatch integrity and service continuity
- Dr. Sabine Schneider (Smart Grid Engineer): Validates automation logic and control-parameter integrity
- Andreas Hoffmann (CISO): Leads containment, evidence quality, and external authority engagement
SECRETS
- High-trust vendor update workflows introduced unverified automation changes into production controls
- Control-parameter manipulation focused on balancing functions that are hardest to challenge in real time
- Timing indicators show intent to trigger instability during predictable demand stress windows
Planning Resources
For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:
Stuxnet Smart Grid Sabotage Planning Document
Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.
Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:
Stuxnet Smart Grid Sabotage Scenario Slides
Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support
Scenario Details for IMs
Hook
“It is Tuesday at 7:40 AM at Great Plains Energy Cooperative. Morning balancing operations show feeder automation issuing commands that do not match expected dispatch plans, while field telemetry conflicts with control-center dashboards. Engineers tracing the anomaly find unauthorized parameter edits in renewable load-balancing logic shortly after a routine vendor update cycle. Security teams confirm abnormal traffic patterns tied to the same update deployment window.”
“Initial smart-grid anomaly logged at 7:40 AM in United States.”
“It is Tuesday at 07:40 at Stadtwerke Rheinland. Morning balancing operations show feeder automation issuing commands that do not match expected dispatch plans, while field telemetry conflicts with control-center dashboards. Engineers tracing the anomaly find unauthorized parameter edits in renewable load-balancing logic shortly after a routine vendor update cycle. Security teams confirm abnormal traffic patterns tied to the same update deployment window.”
“Initial smart-grid anomaly logged at 07:40 in Germany.”
Initial Symptoms to Present:
- “Automated switching behavior no longer aligns with operator dispatch instructions”
- “Control-center dashboards and field telemetry diverge during balancing operations”
- “Renewable integration logic includes unauthorized parameter edits”
- “Recent vendor update pathways show unusual command traffic and integrity anomalies”
Key Discovery Paths:
Detective Investigation Leads:
- Forensic sequencing links control anomalies to high-trust vendor update workflows
- Logic-diff analysis reveals targeted changes in balancing and switching behavior
- Timeline reconstruction indicates preparation for activation during forecasted demand stress
Protector System Analysis:
- Real-time control validation identifies high-risk automation zones requiring manual safeguards
- Stability analysis shows cascading-risk pathways across interconnected feeders and substations
- Containment design must preserve service continuity while restoring control integrity
Tracker Network Investigation:
- Session mapping identifies coordinated command patterns across automation management tiers
- Threat profile indicates highly resourced targeting of modernized grid balancing functions
- Intelligence correlation suggests strategic interest in high-impact energy disruption windows
Communicator Stakeholder Interviews:
- Grid leadership requires clear thresholds for manual override and staged automation rollback
- Governance teams need defensible language for regulator and public briefings under uncertainty
- Control operators need concise incident criteria to maintain safe decision cadence
Crisis Manager Strategic Coordination:
- Round 1: Initiate critical-infrastructure reporting through {{regulatory_body}} and engage {{cyber_authority}} – escalation obligations under {{regulatory_framework}} exist regardless of investigation maturity; establish the compliance and notification timeline
- Round 2: Manage dual pressures – regulatory communications must be accurate and timely but must not disrupt peak-demand operational decision-making; Crisis Manager owns the boundary between incident transparency and grid operational security
- Round 3: Prepare public communication contingency – if grid operations degrade toward {{demand_window}}, communications must be pre-coordinated with {{regulatory_body}} and {{state_authority}} alignment
- Round 5+: Lead federal critical infrastructure briefing through {{cyber_authority}}; engage energy sector information sharing on the vendor update pathway as a supply-chain attack vector
Threat Hunter APT Investigation:
- Round 1: Hunt for pre-positioned implants beyond the compromised balancing systems – grid sabotage operations typically stage across multiple substations or grid management systems before activation; what else was accessed that hasn’t yet triggered an alert?
- Round 2: Investigate the vendor update pathway – if this was a supply-chain attack, every other grid operator using the same vendor is potentially pre-compromised; develop indicators of compromise for sector-wide hunting
- Round 3: Reconstruct adversary lateral movement through grid management infrastructure – the goal is identifying the full scope of access before {{demand_window}} creates pressure to declare the environment clean prematurely
- Round 5+: Lead post-incident threat intelligence development on grid-targeting TTPs; coordinate with {{cyber_authority}} on sector-wide hunting campaign using indicators developed from this investigation
Mid-Scenario Pressure Points:
- Hour 1: Dispatch teams report widening mismatch between planned and executed switching actions
- Hour 2: Reliability stakeholders request confidence estimates before entering peak-load interval
- Hour 3: Engineers identify additional unauthorized edits in balancing control domains
- Hour 4: Leadership must choose between aggressive isolation and constrained continued operations
Evolution Triggers:
- If manipulation persists into peak demand, local instability can propagate across regional connections
- If rollback sequencing is rushed, human-operator overload can create secondary operational risk
- If authority messaging is delayed, regulatory and public trust impacts escalate faster than recovery
Resolution Pathways:
Technical Success Indicators:
- Unauthorized control changes are removed and validated against trusted operational baselines
- Automation pathways are segmented with explicit trust and verification gates
- Monitoring strategy detects process deception before dispatch-critical decisions
Business Success Indicators:
- Service continuity remains stable through demand peaks with documented safeguards
- Authority communication remains timely, evidence-based, and operationally consistent
- Recovery improves long-term resilience without degrading normal grid performance
Learning Success Indicators:
- Team demonstrates understanding of automation-layer sabotage in modern grid environments
- Participants balance operational continuity with verification discipline under pressure
- Group coordinates engineering, cyber, and governance roles through a high-consequence scenario
Common IM Facilitation Challenges:
If Teams Over-Rely on Dashboard Confidence:
“Field telemetry disagrees with control dashboards. Which source governs your safety decisions, and why?”
If Teams Delay Containment for Perfect Attribution:
“Attribution can continue in parallel, but peak demand is approaching. What containment action cannot wait?”
If Teams Ignore Regulator Coordination:
“Authorities request immediate status under critical-infrastructure obligations. What can you report confidently right now?”
Success Metrics for Session:
Template Compatibility
This scenario adapts to multiple session formats with appropriate scope and timing:
Quick Demo (35-40 minutes)
Structure: 3 investigation rounds, 1 decision round
Focus: Detect automation-layer compromise and establish immediate stability controls
Key Actions: Confirm manipulation scope, preserve service continuity, and define peak-load safeguards
Lunch & Learn (75-90 minutes)
Structure: 5 investigation rounds, 2 decision rounds
Focus: Balance dispatch reliability, containment sequencing, and authority engagement
Key Actions: Validate control integrity, stage rollback decisions, and align regulator reporting
Full Game (120-140 minutes)
Structure: 7 investigation rounds, 3 decision rounds
Focus: End-to-end smart-grid incident response under modernization and demand pressure
Key Actions: Coordinate cross-domain forensics, protect critical operations, and restore trusted automation
Advanced Challenge (150-170 minutes)
Structure: 8-9 investigation rounds, 4 decision rounds
Expert Elements: Ambiguous telemetry, contested rollback thresholds, and cascading-system risk
Additional Challenges: Multi-operator coordination, parallel regulatory scrutiny, and compressed demand windows
This German variation can be adapted to other EU countries during facilitation. EU members share GDPR, but energy-grid oversight and critical-infrastructure designations vary.
When localizing this smart-grid scenario, substitute the relevant institutions below:
| France |
CNIL |
CRE |
ANSSI |
OIV operator obligations |
| Netherlands |
Autoriteit Persoonsgegevens |
ACM |
NCSC-NL |
NIS2 essential-entity obligations |
| Denmark |
Datatilsynet |
Danish Utility Regulator |
CFCS |
National critical-infrastructure obligations |
| Sweden |
IMY |
Ei (Energimarknadsinspektionen) |
CERT-SE |
NIS2 essential-entity obligations |
| Finland |
Tietosuojavaltuutettu |
Energy Authority Finland |
NCSC-FI |
NIS2 essential-entity obligations |
Notes:
- Energiewende adaptation: Countries differ in renewable balancing architecture and dispatch governance.
- Escalation structure: Cyber and energy regulators can issue parallel reporting demands.
- Facilitation: Keep technical attack flow stable, localize institutions and legal framing only.
Quick Demo Materials (35-40 min)
Guided Investigation Clues
- Clue 1 (Minute 5): CEO Patricia Hoffman convenes emergency operations and states that grid stability cannot rely on unverified automation behavior. Grid Operations Director Kevin Torres reports rising mismatch between dispatch intentions and executed switching actions. Smart Grid Engineer Dr. Sarah Chen confirms unauthorized control-parameter changes in balancing logic serving high-demand corridors. CISO Frank Morrison initiates containment actions and immediate critical-infrastructure escalation with federal partners.
- Clue 2 (Minute 10): NERC channels request immediate stability evidence and control-integrity status, while federal cyber partners request forensic artifacts linked to vendor update pathways.
- Clue 3 (Minute 15): Federal analysts warn that high-end grid intrusions frequently stage in automation layers and activate during demand peaks when recovery windows are narrow.
- Clue 1 (Minute 5): Geschaeftsfuehrer Thomas Muller convenes emergency operations and states that grid stability cannot rely on unverified automation behavior. Netzleiter Stefan Weber reports rising mismatch between dispatch intentions and executed switching actions. Smart-Grid-Ingenieurin Dr. Sabine Schneider confirms unauthorized control-parameter changes in balancing logic serving high-demand corridors. CISO Andreas Hoffmann initiates containment actions and immediate KRITIS escalation with national partners.
- Clue 2 (Minute 10): Bundesnetzagentur and BSI channels request immediate stability evidence and control-integrity status, while national cyber partners request forensic artifacts linked to vendor update pathways.
- Clue 3 (Minute 15): BSI analysts warn that high-end grid intrusions frequently stage in automation layers and activate during demand peaks when recovery windows are narrow.
Pre-Defined Response Options
Option A: Stability-First Isolation
- Action: Isolate affected automation domains, enforce manual dispatch controls, and defer full automation restart until validation completes.
- Pros: Maximizes control certainty during peak-risk windows.
- Cons: Reduces operational efficiency and increases operator workload.
- Type Effectiveness: Super effective for immediate cascade-risk reduction.
Option B: Parallel Validation with Controlled Automation
- Action: Keep low-risk automation active while validating high-risk domains with strict decision gates.
- Pros: Preserves partial efficiency and faster service normalization.
- Cons: Requires precise governance to prevent hidden manipulation from persisting.
- Type Effectiveness: Moderately effective when verification ownership is clear.
Option C: Segmented Recovery and Demand Curtailment Support
- Action: Restore validated feeders in phases and use demand-side support to reduce peak stress during recovery.
- Pros: Balances reliability and resilience under constrained conditions.
- Cons: Extends partial-risk period and complicates stakeholder coordination.
- Type Effectiveness: Moderately effective with strong cross-team discipline.
Lunch & Learn Materials (75-90 min, 2 rounds)
Round 1: Automation Compromise Mapping (30-35 min)
- Opening: CEO Patricia Hoffman convenes emergency operations and states that grid stability cannot rely on unverified automation behavior. Grid Operations Director Kevin Torres reports rising mismatch between dispatch intentions and executed switching actions. Smart Grid Engineer Dr. Sarah Chen confirms unauthorized control-parameter changes in balancing logic serving high-demand corridors. CISO Frank Morrison initiates containment actions and immediate critical-infrastructure escalation with federal partners.
- Clue 1 (Minute 10): “Control validation confirms additional balancing domains with unauthorized parameter drift.”
- Clue 2 (Minute 20): “Escalation through FBI, CISA, and DOE CESER is required under NERC CIP, FERC requirements, and state PUC obligations with immediate critical-infrastructure reporting.”
- Opening: Geschaeftsfuehrer Thomas Muller convenes emergency operations and states that grid stability cannot rely on unverified automation behavior. Netzleiter Stefan Weber reports rising mismatch between dispatch intentions and executed switching actions. Smart-Grid-Ingenieurin Dr. Sabine Schneider confirms unauthorized control-parameter changes in balancing logic serving high-demand corridors. CISO Andreas Hoffmann initiates containment actions and immediate KRITIS escalation with national partners.
- Clue 1 (Minute 10): “Control validation confirms additional balancing domains with unauthorized parameter drift.”
- Clue 2 (Minute 20): “Escalation through BSI and BKA is required under GDPR, Bundesnetzagentur obligations, and BSI KRITIS requirements with immediate KRITIS escalation.”
Round 2: Peak-Demand Decision and Authority Reporting (30-35 min)
- Clue 3 (Minute 35): “The next high-risk interval is 5:00 PM heatwave demand peak and current confidence in automation remains contested.”
- Clue 4 (Minute 45): “Current incident models estimate USD 28 million projected outage and recovery exposure if instability propagates across regional interconnects.”
- Pressure Event (Minute 55): “Executive leadership requires a defensible decision by 5:45 PM with interim evidence for NERC and federal energy oversight channels and partner authorities.”
- Clue 3 (Minute 35): “The next high-risk interval is 17:00 Energiewende demand peak and current confidence in automation remains contested.”
- Clue 4 (Minute 45): “Current incident models estimate EUR 31 million projected outage and recovery exposure if instability propagates across regional interconnects.”
- Pressure Event (Minute 55): “Executive leadership requires a defensible decision by 17:45 with interim evidence for Bundesnetzagentur and BSI KRITIS oversight channels and partner authorities.”
Debrief Focus
- How smart-grid modernization expands both resilience opportunities and attack surfaces
- Which evidence thresholds should govern automation rollback versus controlled continuation
- How to align cyber containment with dispatch reliability under peak-demand pressure
- Which long-term controls harden trusted update pathways and balancing logic integrity