White Paper

Understanding ICS Malware: Defining a Credible Threat to Industrial Infrastructure

Understanding ICS Malware: Defining a Credible Threat to Industrial Infrastructure

Pages 18 Pages

This white paper introduces a formal definition of ICS malware, requiring three properties: ICS-capability, malicious intent, and ability to cause adverse effects on OT systems. Using case studies like TRISIS, IoT Exploit Tool, and IOControl, it shows how to distinguish genuine ICS malware from red-team tools or incidental infections. The framework provides defenders with a consistent language and method to assess and respond to industrial cyber threats.

Join for free to read