Search Results

902 Results
Type
Resource Type
Industries
Partners
Products & Services
Threat Group
Topics
There are 902 results that match your search.
  • Uses LOTL techniques for reconnaissance, enumeration, lateral movement, and long-term persistent access.
  • Uses third-party connections from telecom providers for network access to industrial organizations.
  • Development of ICS malware to disrupt, degrate, and destroy industrial environments and processes.
  • Deep ICS environment information gathering, including operator credentials and industrial processes.
  • Credential capture and LOTL techniques employed for initial access, reconnaissance C2.
  • Spearphishing, exploiting SOHO routers, and leveraging custom capabilities to enable ELECTRUM operations.
  • Watering-hole and phishing attacks leading to ICS reconnaissance and screenshot collection.
  • Impersonates victims, exploits vulnerabilities, targets internet-exposed endpoints, and exfiltrates data.
  • Targets Oracle e-buisness suite iSupplier web services and assets across multiple industrial sectors.
  • Compromises IT networks via insecure VPNs to conduct reconnaissance activities.
  • Uses perimeter device compromise and LOTL techniques for reconnaissance and exfiltration.
  • Defend production lines and industrial operations against ransomware, IP theft, and operational disruption with purpose-built OT security.
  • Whitepaper
    This whitepaper provides insight into how to do effective incident response for industrial control systems (ICS) that is based on years of collective experience supporting OT defenders.
  • Whitepaper
    Get this essential resource to understand how the Dragos Platform provides the most comprehensive OT-native network visibility and security monitoring solution
  • Spearphishing and credential theft for reconnaissance and espionage targeting industrial sectors.
  • Relies on phishing campaigns, password sprating, and malware delivery for reconnaissance.
  • Spearphishing with malicious documents or executables for initial access compromise.
  • Exploits known VPN vulnerabilities and open-source pentesting tools for reconnaissance, initial access, C2.
  • Development of ICS malware for physical disruption, causing unsafe conditions and long-term persistence.
  • Employs known malware for remote access, credential capture, and lateral movement.
  • Targets vulnerable external-facing network appliances to access IT networks and establish foothold.
  • Watering-hole attacks, malware and covert communication for reconnaissance.
  • Electric grid disruption and long-term persistence using LOTL tactics and custom ICS Malware.
  • Employs LOTL tactics to establish persistent access to victim environments.
  • Employs spearphishing and backdoor capabilities for initial access, reconnaissance, C2.