REGISTRATION NOW OPEN:

Join us for our 9th Annual DISC Conference exclusively for OT asset owners & operators.

Skip to main content

When cyber criminals shift from stealing data to shutting down critical infrastructure, we’re dealing with a fundamentally different threat. Industrial control systems (ICS) malware is specifically designed to disrupt or manipulate the physical processes underlying operational technology (OT) environments. But what qualifies as ICS malware — and what doesn’t?

This whitepaper delivers a precise, evidence-based definition built on three critical properties: ICS capability, malicious intent, and ability to cause adverse OT impact. Through real-world case studies like TRISIS, FrostyGoop, and IOControl, Dragos reveals how to distinguish true ICS malware from red team tools, incidental infections, and standard IT threats.

Whether you’re protecting critical infrastructure or analyzing emerging threats, this framework helps you:

  • Accurately classify ICS-specific threats
  • Prioritize resources based on actual risk
  • Build defenses tailored to industrial environments

Get further insights from our threat intelligence experts. Dragos experts Jimmy Wylie and Matthew Pahl break down real ICS-specific threats, why your current detection misses them, and what actually works to protect critical systems. Join the webinar on July 17th

Discover More Resources Using Keyword Tags
OT Cybersecurity Threat Intelligence

Discover more resources.

Explore more resources to support you on your ICS cybersecurity journey.

Read our next whitepaper

whitepapers

Enhancing OT Visibility: Understanding the Time and Place for Active Collection

Dragos, Inc.
View Whitepaper
Right Arrow

View more whitepapers

Right Arrow

See the Dragos Platform in Action

Take the next step to protect your OT environment now with a free demo