Common ICS Cybersecurity Myth #2: Proprietary Systems and Protocols

ICS Cybersecurity Myth #2

Busting ICS Cybersecurity Myth #2

Although hacking ICS devices may be challenging due to their proprietary nature, threat actors behind targeted attacks are usually knowledgeable, persistent, and resourceful -in many cases, sponsored by nation states.

The TRITON Malware Attack

The TRITON malware attack targeted an industrial organization in the Middle East. The TRITON malware (also called TRISIS) was used to target a safety instrumented system (SIS) from Schneider Electric called Triconex. Attackers demonstrated their capabilities to compromise a proprietary system and communication protocol called TriStation.

ICS Incidents on the Rise

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
International Society of Automation - ISA Official

International Society of Automation - ISA Official

The International Society of Automation (isa.org) is a non-profit professional association founded in 1945 to create a better world through automation.