Sorting by

×

Common cyber attack tactics used by adversaries for ICS

Tactics represent the “why” of an ATT&CK technique or sub-technique. It is the adversary’s tactical goal: the reason for performing an action. For example, an adversary may want to achieve credential access

Initial Access

The adversary is trying to get into your ICS environment.

Execution

 The adversary is trying to run code or manipulate system functions, parameters, and data in an unauthorized way.

Persistence

The adversary is trying to maintain their foothold in your ICS environment.

Privilege Escalation

The adversary is trying to gain higher-level permissions.

Evasion

The adversary is trying to avoid security defenses.

Discovery

The adversary is locating information to assess and identify their targets in your environment.

Lateral Movement

The adversary is trying to move through your ICS environment.

Collection

The adversary is trying to gather data of interest and domain knowledge on your ICS environment to inform their goal.

Command and Control

The adversary is trying to communicate with and control compromised systems, controllers, and platforms with access to your ICS environment.

Inhibit Response Function

The adversary is trying to prevent your safety, protection, quality assurance, and operator intervention functions from responding to a failure, hazard, or unsafe state.

Impair Process Control

The adversary is trying to manipulate, disable, or damage physical control processes.

Impact

The adversary is trying to manipulate, interrupt, or destroy your ICS systems, data, and their surrounding environment.

These 12 tactics are being utilized by adversaries specific to ICS, some examples of procedural attack examples are Triton, Sandworm, Marrochy attack, Oilrig, Bad Rabbit, Allanite and many more. This list is quite big but MITRE has done tremendous task to bring everything on a single page.

Reading all the tactics and understanding them will give you added advantage when you are thinking of putting a cybersecurity solution for your infrastructure.

Leave a Reply

Your email address will not be published. Required fields are marked *