Back to Resources
Field Note January 2026 7 min read

Cryptomining on Plant Networks: Detection and Economic Impact

Cryptominers compromise industrial networks for computing power. We explain how to detect them and quantify the operational and security costs.

C

Cascadia OT Security

OT & ICS Security

PLC-01HMIRTU-02DMZHISTSCADACORPZONE TOPOLOGYTRAFFIC FLOW →

Cryptomining malware on industrial networks presents a unique threat. Unlike malware designed for espionage or destruction, miners run continuously, consuming computational resources and power. This creates immediate operational degradation—slower systems, higher cooling costs, equipment wear. The financial incentive also attracts less sophisticated attackers, meaning detection opportunities are higher than with advanced threats.

We have observed cryptominers on plant networks at three major manufacturing facilities in the Pacific Northwest over the past two years. In each case, the infection had persisted for several months before discovery. The impact included accelerated hardware failure, reduced production throughput, and inflated power consumption that triggered facility-wide investigations before the underlying cause was identified.

How Miners Persist Undetected

Cryptominers establish persistence through compromised credentials, unpatched systems, or supply chain routes identical to other threats. What distinguishes them is their low profile. Unlike ransomware, miners do not announce their presence. They consume resources gradually and remain dormant during peak production hours to avoid triggering alarms that operations teams would notice.

Some miners specifically target GPU-equipped engineering workstations and graphics-enabled HMI systems, where mining can run alongside legitimate work without obvious performance degradation.

Detection and Investigation Methods

Incident Response and Prevention

Cryptomining infections require the same response rigor as any malware incident. Assume the attacker has deeper access than the miner alone suggests. Rotate credentials, scan systems comprehensively, and implement controls to prevent reinfection. If you'd like to discuss cryptomining detection or incident response for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call