MITRE ATT&CK for ICS: Kaspersky’s viewpoint

To increase critical systems resilience, we have to understand techniques used by attackers targeting industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA). Let’s put our knowledge to the test.

    The MITRE Corporation, whose MITRE ATT&CK for Enterprise matrix continues to prove so valuable in the fight against cybercrime, has also introduced the MITRE ATT&CK for ICS knowledge base, specifically addressing actions an adversary may take when targeting Industrial Control Systems. ATT&CK for ICS focuses on attackers whose key objectives may include disrupting industrial control processes, destroying property and causing suffering among all who are reliant on critical infrastructures. Here we discuss how the attack techniques from MITRE ATT&CK for ICS are detected and repelled by Kaspersky products and services.

    <h3 xmlns="http://www.w3.org/1999/xhtml">ATT&amp;CK for ICS: Industroyer</h3>

    ATT&CK for ICS: Industroyer

    See how Kaspersky Industrial CyberSecurity deals with an Industroyer-based APT

    Read more
    <h3 xmlns="http://www.w3.org/1999/xhtml">ATT&amp;CK for ICS: Stuxnet</h3>

    ATT&CK for ICS: Stuxnet

    See how Kaspersky Industrial CyberSecurity can respond to Stuxnet-based APT

    Read more
    <h3 xmlns="http://www.w3.org/1999/xhtml">Mapping to ICS ATT&amp;CKs</h3>

    Mapping to ICS ATT&CKs

    Kaspersky Industrial CyberSecurity techniques that counter MITRE ICS ATT&CKs

    Read more

    We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

    Accept and Close