This document discusses man-in-the-middle attacks on the IEC 60870-5-104 protocol. It describes how an attacker could intercept communications between an operator workstation and programmable logic controller to modify values like the cause of transmission field or an "ON/OFF" status to hide issues like an earth fault from operators. The document advocates for better security practices in new industrial control systems, such as monitoring networks and logs and enabling mitigation techniques to prevent these types of attacks.