White Paper
Understanding ICS Malware: Defining a Credible Threat to Industrial Infrastructure
This white paper introduces a formal definition of ICS malware, requiring three properties: ICS-capability, malicious intent, and ability to cause adverse effects on OT systems. Using case studies like TRISIS, IoT Exploit Tool, and IOControl, it shows how to distinguish genuine ICS malware from red-team tools or incidental infections. The framework provides defenders with a consistent language and method to assess and respond to industrial cyber threats.