Hidden Threats in Critical Infrastructure: How Léargas Protects Against Supply Chain Kill Switches

In May 2025, a Reuters investigation revealed what many of us in security have long feared: Chinese-manufactured solar inverters—deployed across the U.S. power grid—contained embedded, unauthorized cellular radios. These radios enabled direct command-and-control, bypassing local networks entirely. They functioned as silent kill switches for critical infrastructure.

This isn’t theory. It’s verified. It’s happening now.

At Léargas, we built our platform with threats like this in mind—not just phishing and malware, but deeply embedded, supply-chain-driven risks that evade traditional defenses. While you’re watching logs, we’re watching everything else.


Understanding the Threat: What Makes This Different

Unlike malware that needs phishing emails or vulnerabilities to exploit, these radios are hardware implants. They don’t rely on your firewall. They don’t care about your EDR. They connect directly to cellular towers over GSM/LTE bands—without touching your internal network.

So how do you see what never hits the wire?

That’s where Léargas, Zeek, and Suricata come in.


How Léargas Protects Against LTE-Backhauled Threats

Let’s be clear: Zeek and Suricata can’t see LTE traffic that bypasses your infrastructure. If a device is exfiltrating over 4G and doesn’t route through your switches or taps, there’s no Ethernet-based telemetry to inspect.

But that doesn’t mean the attack is invisible.

1. Behavioral Detection and Anomaly Modeling
  • Zeek creates a rich behavioral profile of devices—how often they communicate, which protocols they use, and how predictable their behavior is.

  • Suricata inspects inline traffic for changes in packet size, frequency, or protocol misuse.

If a device that normally speaks Modbus TCP every 5 seconds suddenly goes silent—but still performs operational tasks—you’ve got a ghost.

2. East-West Silence as a Signal

If that device:

  • Stops generating DHCP renewals

  • Drops out of ARP tables

  • Ceases sending telemetry via your LAN

…but you still see its effects downstream (e.g., grid output changing, breakers opening), that’s a red flag. It may have shifted to its embedded LTE interface.

3. Integrated RF and SIM Correlation

Léargas integrates well with:

  • RF sensors like Pwnie Express or SDR platforms to detect rogue cellular activity in secure zones.

  • SIM telemetry from mobile operators to correlate unauthorized IMSIs or unexpected data spikes.

While not native to Zeek or Suricata, we bring these feeds into our XDR correlation engine to flag unseen paths of communication.


Protocol-Aware OT Monitoring

Léargas has deep support for ICS/SCADA protocols:
  • Modbus

  • OPC-UA

  • DNP3

  • IEC 60870-5-104

  • PROFINET

When devices start issuing strange write commands, initiate unusual polling behavior, or change their control parameters without local network observability, we detect it—and tie it to known behavioral baselines.


Deployment: Architected for Hybrid Visibility

Recommended Integration
  • Zeek and Suricata sensors at core OT switches or between inverter VLANs and control systems.

  • Out-of-band collection via mirrored ports ensures passive capture, avoiding operational disruption.

  • Léargas XDR centrally aggregates logs, alerts, behavioral deviations, and SIM/RF intel for cross-layer correlation.

Even when the LTE modem hides in plain sight, Léargas sees the shadows it casts.


Real-World Detection Strategy

✅ What You CAN See:
SignalToolDetection Example
Loss of expected trafficZeekInverter stops sending Modbus data but still active
Protocol misuseSuricataOPC-UA write commands from read-only devices
RF activity in isolated zonesExternal (Bastille, SDR)New cellular signal detected in controlled environment
SIM data/cell connectionsMDM / Telco IntegrationUnregistered SIM initiating LTE session

Beyond Alerts: Strategic Correlation

Léargas enriches this data with:
  • Dark Web intelligence (e.g., references to compromised solar firmware)

  • Sentiment scoring across Telegram and TOR marketplaces

  • Historical anomaly detection, including prior firmware behavior baselines

Combined, this allows your SOC to respond before the device is fully weaponized.


Conclusion: You Can’t Patch a SIM Card—But You Can Detect It

Covert LTE radios are invisible to traditional tooling—but not to Léargas.
We’re not waiting for kill switches to flip.
We’re watching for the moment a trusted device starts acting like it doesn’t belong.

That’s the power of Zeek, Suricata, and a behavioral XDR built for ICS and hybrid IT/OT defense.


References

  1. Reuters: Ghost in the Machine – Rogue Devices in Chinese Inverters

  2. Yahoo News: Chinese Kill Switches Found in U.S. Power Inverters

  3. Elastic: Léargas Chooses Elastic for Threat Detection

  4. Critical Path Security: Work-from-Home Security Support

Recommended Posts