Design and Build Productive and Secure Industrial Systems (Paper 1 of 3). A collaboration between General Electric and Dragos.
Reviewing previously unavailable data covering log, forensics, and various incident data, this paper will outline the CRASHOVERIDE attack in its entirety, from breach of the ICS network through delivery and execution of ICS-specific payloads.
There is a considerable amount of market confusion around the types of threat detection, how they are derived, and the uses for each. The purpose of this paper is to address those challenges by identifying the four types of threat detection and offering sample use-cases focused on industrial control system (ICS) and industrial internet of things (IIoT) environments.
This paper presents a modern challenge of defending an industrial system, using situational awareness to detect and understand if an attack exists against the environment.
Modern network and asset defense require far greater visibility into the industrial control system threat landscape than in years past.
TRISIS is malware that was developed and deployed to at least one victim in the Middle East to target safety instrumented systems (SIS).
CRASHOVERRIDE is a malware framework that has not been disclosed before today but is the capability used in the cyber-attack on the Ukraine electric grid in 2016 (not the 2015 attack).
As industrial control systems (ICS) become more interconnected with each other and homogenous, there needs to be sufficient compensating controls put into place to ensure the safety and reliability of the operations.