An OT hacking methodology
While some of the typical IoT attacks still apply here, leveraging those and other attacks on an IT-OT network necessitate advance planning. Typically, motivated threat actors launch sophisticated attacks to interfere with industrial processes. One thing working for the attackers is the lack of insight into the OT network, since traditional detection methods are not as effective. In many cases, IT security staff cannot load agents and collect telemetry on devices like with traditional IT networks. This is largely due to either legacy issues, meaning the device runs old or incompatible software such as embedded Windows, or the processor and memory do not have the capacity to load collection tools. These limitations make collecting telemetry difficult. However, that doesn’t mean there are no processes and procedures that can be employed. There is a knowledge base outlining the potential adversary operations within an ICS network, called ATT&CK for...