Skip to main content

MITRE ATT&CK for ICS:
Kaspersky’s viewpoint

To increase critical systems resilience, we have to understand techniques used by attackers targeting industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA). Let’s put our knowledge to the test.

The MITRE Corporation, whose MITRE ATT&CK for Enterprise matrix continues to prove so valuable in the fight against cybercrime, has also introduced the MITRE ATT&CK for ICS knowledge base, specifically addressing actions an adversary may take when targeting Industrial Control Systems. ATT&CK for ICS focuses on attackers whose key objectives may include disrupting industrial control processes, destroying property and causing suffering among all who are reliant on critical infrastructures. Here we discuss how the attack techniques from MITRE ATT&CK for ICS are detected and repelled by Kaspersky products and services.

ATT&CK for ICS: Industroyer
See how Kaspersky Industrial CyberSecurity deals with an Industroyer-based APT
READ MORE
ATT&CK for ICS: Stuxnet
See how Kaspersky Industrial CyberSecurity can respond to Stuxnet-based APT
READ MORE
Mapping to ICS ATT&CKs
Kaspersky Industrial CyberSecurity techniques that counter MITRE ICS ATT&CKs
READ MORE