7. The technician uses the downloaded patches and firmware files to update the ICS/SCADA devices under maintenance and, unknowingly, installs an infected version. 8. The infection is then inside the network, and the malware can now be executed from the SCADA devices causing malfunctions, creating backdoors, or carrying out other malicious activities. 9. From this point onward, the infected SCADA systems spread the infection to other devices and modify/corrupt other devices and systems connected, leading to a crash of the whole system and a full operations halt.