During efforts to correct a software problem, the microgrid management system is given limited
173 access to the internet. During this interval, a malicious actor gains access to the microgrid
174 management system. Using this access, the malicious actor locates a connection to the business
175 network that is used to provide information from the microgrid to a system that interacts with
176 energy markets.