Industrial sabotage has been the exclusive territory of nation-state malware so far. With a more sophisticated cyber criminal gang, there is a chance they may develop, buy, or stumble upon a leaked malware with enough cyber capabilities to make it a potent weapon that can take control of an energy supply source or a distribution grid.