SC-072: Smart Grid and Power Infrastructure Attack¶
Scenario Overview¶
| Field | Detail |
|---|---|
| ID | SC-072 |
| Category | Critical Infrastructure / Energy / OT-ICS |
| Severity | Critical |
| ATT&CK Tactics | Initial Access, Lateral Movement, Collection, Inhibit Response Function, Impair Process Control, Impact |
| ATT&CK Techniques | T1566.002, T1021.002, T1078.003, T1040, T0855, T0857, T0831, T0882, T0826, T0836 |
| Target Environment | Electric utility SCADA/EMS, Advanced Metering Infrastructure (AMI), substation IEDs, distribution automation |
| Estimated Impact | Manipulation of grid control systems serving 780,000 customers; mass meter data falsification causing $47M in revenue loss; targeted substation breaker operations causing cascading outages |
Narrative¶
Cascade Power & Light (CP&L), a fictional investor-owned electric utility serving 1.2 million customers across four states in the Pacific Northwest, operates a modern smart grid infrastructure. The utility's control center at 10.50.1.0/24 runs a SCADA/Energy Management System (EMS) that monitors and controls 87 substations, 340 distribution feeders, and 2.4 million smart meters through an Advanced Metering Infrastructure (AMI) network. CP&L completed a major grid modernization program in 2025, deploying IEC 61850-compliant Intelligent Electronic Devices (IEDs) at all substations and a neighborhood area network (NAN) mesh for AMI communications.
In January 2026, a threat actor group designated VOLT SPECTER — assessed with moderate confidence as a nation-state proxy group — begins a multi-month campaign targeting CP&L's grid infrastructure. The initial compromise occurs through a spear-phishing email sent to a SCADA engineer via a compromised vendor email account at support@gridcontrol-systems.example.com. The email contains a link to a watering hole site hosting a browser exploit that drops a custom RAT (Remote Access Trojan) designated GRIDLOCK onto the engineer's corporate workstation at 10.50.1.47. From this foothold in the IT network, VOLT SPECTER pivots through a misconfigured IT/OT demilitarized zone (DMZ) firewall at 10.50.5.1 to reach the OT network.
Over six months, VOLT SPECTER achieves three strategic objectives: (1) they manipulate the AMI head-end system at 10.50.10.20 to falsify meter readings across 340,000 smart meters, reducing reported energy consumption by an average of 12% and causing $47 million in unrecoverable revenue loss; (2) they deploy a modified IEC 61850 GOOSE (Generic Object Oriented Substation Event) publisher that can issue unauthorized breaker trip commands to 23 critical transmission substations; and (3) they install persistent backdoors in substation RTUs (Remote Terminal Units) at three key interconnection points, providing the capability to initiate a cascading grid failure affecting 780,000 customers during peak demand. CP&L's security team discovers the intrusion only when a junior analyst notices a statistical anomaly in meter reading distributions during a quarterly revenue reconciliation.
Attack Flow¶
graph TD
A[Phase 1: Spear Phishing via Vendor<br/>Compromised vendor email account] --> B[Phase 2: Corporate IT Foothold<br/>GRIDLOCK RAT on SCADA engineer workstation]
B --> C[Phase 3: IT/OT DMZ Pivot<br/>Exploit misconfigured firewall rules]
C --> D[Phase 4: SCADA Network Reconnaissance<br/>Map substations, protocols, IEDs]
D --> E[Phase 5: AMI Head-End Compromise<br/>Falsify smart meter readings]
E --> F[Phase 6: Substation IED Access<br/>Compromise IEC 61850 relays]
F --> G[Phase 7: GOOSE Message Spoofing<br/>Craft unauthorized breaker trip commands]
G --> H[Phase 8: RTU Backdoor Installation<br/>Persistent OT-level access]
H --> I[Phase 9: Revenue Manipulation<br/>Systematic meter data falsification]
I --> J[Phase 10: Staged Grid Disruption<br/>Capability for cascading outage] Phase Details¶
Phase 1: Vendor Email Compromise and Spear Phishing¶
ATT&CK Technique: T1566.002 (Phishing: Spear Phishing Link)
VOLT SPECTER compromises the email account of a support engineer at GridControl Systems (a fictional SCADA vendor) — one of CP&L's primary automation vendors. Using the compromised vendor email account, the attackers send a targeted phishing email to a CP&L SCADA engineer, referencing an ongoing support ticket for a legitimate RTU firmware issue. The email contains a link to a trojanized knowledge base article hosted at kb.gridcontrol-systems.example.com.
# Simulated phishing email (educational only)
From: r.martinez@gridcontrol-systems.example.com
To: d.nguyen@cascadepl.example.com
Subject: RE: Support Ticket #GCS-2026-0847 — RTU Firmware Update Procedure
Date: Mon, 13 Jan 2026 08:42:17 -0800
Hi Daniel,
Following up on your firmware update question. I've prepared a detailed
procedure for the SEL-3530 RTAC units in your Northridge substation.
Please review the updated KB article here:
https://kb.gridcontrol-systems.example.com/articles/rtac-fw-update-3530
Let me know if you need anything else.
Best,
Roberto Martinez
Senior Support Engineer
GridControl Systems
# Watering hole payload:
# Browser exploit → PowerShell download cradle → GRIDLOCK RAT
# C2: 203.0.113.122:443 (HTTPS, certificate: *.cdn-analytics.example.com)
Phase 2: Corporate IT Foothold¶
ATT&CK Technique: T1059.001 (Command and Scripting Interpreter: PowerShell)
The browser exploit delivers the GRIDLOCK RAT to the SCADA engineer's workstation at 10.50.1.47. GRIDLOCK establishes persistence via a scheduled task disguised as a Windows Update health check. The RAT provides keylogging, screenshot capture, file exfiltration, and remote command execution. Critically, the compromised engineer's workstation has RDP access to the SCADA engineering workstation in the OT DMZ at 10.50.5.30 — a dual-homed system used for SCADA application maintenance.
# Simulated GRIDLOCK RAT characteristics (educational only)
Malware: GRIDLOCK v2.1
Type: Remote Access Trojan
Persistence: Scheduled task "WindowsUpdateHealthCheck"
Runs every 15 minutes
C2 Protocol: HTTPS (port 443)
C2 Server: 203.0.113.122 (cdn-analytics.example.com)
Beacon Interval: 60 seconds (jittered ±30%)
Capabilities:
- Keylogging (focused on SCADA application credentials)
- Screenshot capture (triggered by SCADA window focus)
- File search and exfiltration (targeting .pcap, .dmp, .cfg, .icd)
- Remote shell execution
- RDP session hijacking
- Network scanning (passive ARP monitoring)
# Persistence mechanism
schtasks /create /tn "WindowsUpdateHealthCheck" /tr
"powershell.exe -WindowStyle Hidden -ep Bypass -File
C:\ProgramData\Microsoft\Windows\UpdateHealth\healthcheck.ps1"
/sc minute /mo 15 /ru SYSTEM
Phase 3: IT/OT DMZ Pivot¶
ATT&CK Technique: T1021.002 (Remote Services: SMB/Windows Admin Shares), T1078.003 (Valid Accounts: Local Accounts)
VOLT SPECTER captures the SCADA engineer's RDP credentials (testuser/REDACTED) via keylogging and uses them to access the dual-homed engineering workstation at 10.50.5.30 in the OT DMZ. From this workstation, the attackers discover that the DMZ firewall at 10.50.5.1 permits several OT protocols from the engineering workstation to the SCADA network:
- DNP3 (TCP/20000) — to RTUs and data concentrators
- IEC 61850 MMS (TCP/102) — to substation IEDs
- Modbus TCP (TCP/502) — to legacy substation equipment
- ICCP/TASE.2 (TCP/102) — to the EMS/SCADA server
# Simulated network reconnaissance from OT DMZ (educational only)
$ nmap -sS -p 20000,102,502,2404 10.50.20.0/24 10.50.30.0/24
10.50.20.10 — EMS/SCADA Server (ICCP, MMS)
10.50.20.15 — Historian Server (no OT protocols — SQL only)
10.50.20.20 — DNP3 Data Concentrator
10.50.10.20 — AMI Head-End System
10.50.30.1 — Northridge Substation Gateway (DNP3, MMS, GOOSE)
10.50.30.2 — Eastview Substation Gateway (DNP3, MMS, GOOSE)
10.50.30.3 — Summit Creek Substation Gateway (DNP3, MMS, GOOSE)
...
10.50.30.23 — Pinecrest Substation Gateway (DNP3, MMS, GOOSE)
Phase 4: SCADA Network Reconnaissance¶
ATT&CK Technique: T1040 (Network Sniffing), ICS: T0855 (Unauthorized Command Message)
VOLT SPECTER deploys a passive network tap on the OT DMZ engineering workstation to capture SCADA traffic. Over three weeks, they map the entire SCADA network topology, identify all DNP3 outstations (RTUs), catalog IEC 61850 GOOSE multicast groups, and capture the IEC 61850 Substation Configuration Description (SCD) files that define the complete substation data model.
# Simulated SCADA traffic analysis (educational only)
$ tshark -r scada_capture_14days.pcap -Y "dnp3" -T fields \
-e ip.src -e ip.dst -e dnp3.al.func | sort | uniq -c | sort -rn
8472 10.50.20.20 10.50.30.1 READ (Northridge — polling)
8471 10.50.30.1 10.50.20.20 RESPONSE (Northridge — response)
7839 10.50.20.20 10.50.30.2 READ (Eastview — polling)
7838 10.50.30.2 10.50.20.20 RESPONSE (Eastview — response)
12 10.50.20.20 10.50.30.1 DIRECT_OPERATE (Northridge — control)
8 10.50.20.20 10.50.30.2 DIRECT_OPERATE (Eastview — control)
# IEC 61850 GOOSE multicast groups discovered
$ tshark -r scada_capture_14days.pcap -Y "goose" -T fields \
-e goose.gocbRef -e goose.datSet | sort -u
NorthridgeSS/LLN0$GO$BreakerStatus NorthridgeSS/LLN0$BreakerDS
NorthridgeSS/LLN0$GO$ProtTrip NorthridgeSS/LLN0$ProtTripDS
EastviewSS/LLN0$GO$BreakerStatus EastviewSS/LLN0$BreakerDS
SummitCreekSS/LLN0$GO$BreakerStatus SummitCreekSS/LLN0$BreakerDS
Phase 5: AMI Head-End Compromise and Meter Data Falsification¶
ATT&CK Techniques: ICS: T0831 (Manipulation of Control), ICS: T0882 (Theft of Operational Information)
VOLT SPECTER accesses the AMI head-end system at 10.50.10.20, which manages 2.4 million smart meters through a mesh radio network. The head-end runs a commercial Meter Data Management System (MDMS) with a web-based administration interface. Using credentials captured from the SCADA engineer's keylogger data, the attackers log into the MDMS and identify the meter data ingestion API.
The attackers deploy a scheduled script on the head-end system that intercepts meter reading uploads and systematically reduces reported kWh consumption by 8-15% for 340,000 residential meters. The modification is applied after the meter data is received but before it is processed by the billing system, making the falsification invisible to the meters themselves (which continue to report accurate readings to the head-end).
# Simulated meter data manipulation logic (educational only — NOT functional)
# Deployed on AMI head-end at 10.50.10.20
import random
def intercept_meter_reading(meter_id, raw_kwh, timestamp):
"""
Intercept meter readings before billing pipeline ingestion.
Reduce reported consumption by 8-15% for targeted meter group.
"""
# Target: residential meters in billing districts 12-47
target_districts = range(12, 48)
meter_district = int(meter_id[4:6]) # CPAM-XX-XXXXXXX format
if meter_district in target_districts:
# Apply reduction factor (8-15%, randomized per reading)
reduction = random.uniform(0.08, 0.15)
modified_kwh = raw_kwh * (1 - reduction)
# Log original for attacker's records
# exfil_queue.append({meter_id, raw_kwh, modified_kwh, timestamp})
return round(modified_kwh, 3)
return raw_kwh # Non-target meters pass through unmodified
# Impact calculation (simulated):
# 340,000 meters × avg 900 kWh/month × 12% reduction × $0.12/kWh
# = $47.2M annual revenue loss
Phase 6: Substation IED Compromise¶
ATT&CK Techniques: ICS: T0857 (System Firmware), ICS: T0826 (Loss of Availability)
VOLT SPECTER targets IEC 61850-compliant protection relays and breaker controllers at 23 critical transmission substations. Using the MMS (Manufacturing Message Specification) protocol from the OT DMZ engineering workstation, the attackers read IED configuration files, modify protection relay settings, and upload modified firmware to substation gateway devices.
# Simulated IEC 61850 MMS interaction (educational only)
# Reading breaker status from Northridge substation
MMS Read Request:
ObjectName: NorthridgeSS/XCBR1$ST$Pos
Response:
Pos.stVal: ON (breaker closed)
Pos.q: good
Pos.t: 2026-03-15T14:22:33.000Z
# Reading protection relay settings
MMS Read Request:
ObjectName: NorthridgeSS/PDIS1$SE$StrVal
Response:
StrVal.setMag.f: 125.0 (pickup current: 125A)
StrVal.q: good
# Attacker modification — raise pickup threshold to disable protection
MMS Write Request:
ObjectName: NorthridgeSS/PDIS1$SE$StrVal
Value:
StrVal.setMag.f: 9999.0 (effectively disables overcurrent protection)
Phase 7: GOOSE Message Spoofing¶
ATT&CK Techniques: ICS: T0836 (Modify Parameter), T1557 (Adversary-in-the-Middle)
The most dangerous capability VOLT SPECTER develops is GOOSE (Generic Object Oriented Substation Event) message spoofing. GOOSE messages are high-speed, multicast Ethernet frames used for protection tripping within substations. They operate at Layer 2 with no authentication in default IEC 61850 deployments. VOLT SPECTER crafts a GOOSE publisher that can inject spoofed breaker trip commands that override the legitimate protection relay GOOSE messages.
# Simulated GOOSE spoofing tool output (educational only)
# WARNING: 100% synthetic — educational demonstration of attack concept
GOOSE Publisher Configuration:
GoCB Reference: NorthridgeSS/LLN0$GO$ProtTrip
Dataset: NorthridgeSS/LLN0$ProtTripDS
AppID: 0x0001
VLAN ID: 100
VLAN Priority: 4
Spoofed GOOSE Frame:
goosePdu:
gocbRef: NorthridgeSS/LLN0$GO$ProtTrip
timeAllowedtoLive: 2000
datSet: NorthridgeSS/LLN0$ProtTripDS
goID: ProtTripGOOSE
t: 2026-07-15T14:00:00.000Z
stNum: 8471 (incrementing to override legitimate publisher)
sqNum: 0
simulation: FALSE
confRev: 1
allData:
BOOLEAN: TRUE (trip command — open breaker)
Effect: Substation breaker XCBR1 receives trip command
138kV transmission line disconnected
Load transfer to adjacent substations
If coordinated across 5+ substations: cascading overload
Phase 8: RTU Backdoor Installation¶
ATT&CK Technique: ICS: T0857 (System Firmware)
VOLT SPECTER installs persistent backdoors in the firmware of three RTUs at key grid interconnection points. The backdoored RTU firmware allows the attackers to inject arbitrary DNP3 control commands without requiring SCADA operator authentication. The backdoor is triggered by a specific DNP3 function code sequence that would not appear in normal operations.
# Simulated RTU backdoor characteristics (educational only)
Target RTUs:
10.50.30.1 — Northridge SS (345kV interconnection)
10.50.30.7 — Cascade Junction SS (230kV tie line)
10.50.30.15 — Riverside SS (500kV interconnection)
Backdoor Trigger:
DNP3 sequence: COLD_RESTART → WARM_RESTART → WRITE (obj:80, var:1)
Within 5-second window
Backdoor Capabilities:
- Direct breaker trip/close (bypass operator authorization)
- Modify analog output setpoints (tap changer, capacitor bank)
- Suppress alarm reporting to SCADA master
- Report false telemetry (mask actual grid state)
Persistence:
- Survives RTU warm restart
- Embedded in RTU firmware flash
- Only removable via hardware programmer or factory reset
Detection Opportunities¶
KQL Detection — Anomalous DNP3 Control Commands¶
// Detect unusual DNP3 DIRECT_OPERATE commands outside maintenance windows
SCADANetworkLogs
| where Timestamp > ago(24h)
| where Protocol == "DNP3"
| where DNP3Function in ("DIRECT_OPERATE", "DIRECT_OPERATE_NR",
"SELECT", "OPERATE")
| where SourceIP != "10.50.20.20" // Not from authorized SCADA master
| project Timestamp, SourceIP, DestIP, DNP3Function,
ObjectGroup, Variation, ControlPoint
| summarize
CommandCount = count(),
UniqueTargets = dcount(DestIP),
Functions = make_set(DNP3Function)
by SourceIP, bin(Timestamp, 1h)
| where CommandCount > 5 or UniqueTargets > 3
| sort by CommandCount desc
KQL Detection — Meter Data Statistical Anomaly¶
// Detect systematic reduction in meter reading distributions
AMIMeterReadings
| where Timestamp > ago(30d)
| where MeterType == "Residential"
| summarize
AvgConsumption = avg(kWh_Reading),
StdDev = stdev(kWh_Reading),
MeterCount = dcount(MeterId)
by BillingDistrict, bin(Timestamp, 1d)
| join kind=inner (
AMIMeterReadings
| where Timestamp between (ago(90d) .. ago(30d))
| summarize BaselineAvg = avg(kWh_Reading) by BillingDistrict
) on BillingDistrict
| extend PercentChange = round((AvgConsumption - BaselineAvg)
/ BaselineAvg * 100, 2)
| where PercentChange < -5.0
| project Timestamp, BillingDistrict, AvgConsumption, BaselineAvg,
PercentChange, MeterCount
| sort by PercentChange asc
SPL Detection — Unauthorized GOOSE Messages¶
index=ot_network sourcetype=iec61850_goose
| where src_mac NOT IN ("00:30:A7:01:01:01", "00:30:A7:01:01:02",
"00:30:A7:01:01:03", "00:30:A7:01:02:01", "00:30:A7:01:02:02")
| eval is_trip = if(goose_data_boolean="TRUE" AND
goose_dataset="*ProtTrip*", "YES", "NO")
| stats count as goose_frames, sum(eval(if(is_trip="YES",1,0))) as trip_commands,
values(goose_gocbref) as gocb_references,
values(src_mac) as source_macs by goose_appid
| where trip_commands > 0
| table _time, goose_appid, source_macs, gocb_references,
goose_frames, trip_commands
| sort -trip_commands
SPL Detection — IT/OT DMZ Traversal¶
index=firewall sourcetype=paloalto_traffic
src_zone="IT_DMZ" dest_zone="OT_SCADA"
| where NOT (dest_port IN (20000, 102, 502) AND
src_ip="10.50.5.30" AND action="allow")
| eval protocol_name = case(
dest_port=20000, "DNP3",
dest_port=102, "IEC61850_MMS",
dest_port=502, "Modbus_TCP",
dest_port=2404, "IEC60870-5-104",
true(), "Unknown_OT")
| stats count as connections, dc(dest_ip) as unique_targets,
values(protocol_name) as protocols,
sum(bytes_sent) as total_bytes by src_ip, dest_zone
| where connections > 20 OR unique_targets > 5
| table _time, src_ip, dest_zone, protocols, connections,
unique_targets, total_bytes
| sort -connections
Sigma Rule — GOOSE Frame from Unauthorized Source¶
title: IEC 61850 GOOSE Message from Unauthorized MAC Address
id: b8c9d0e1-f2a3-4b5c-6d7e-890123456789
status: experimental
description: >
Detects GOOSE (Generic Object Oriented Substation Event) messages
originating from MAC addresses not in the authorized IED inventory,
indicating potential GOOSE spoofing attack
author: Nexus SecOps
date: 2026/04/03
references:
- https://attack.mitre.org/techniques/T0836/
- https://attack.mitre.org/techniques/T1557/
logsource:
category: network
product: ot_network_monitor
detection:
selection:
ethertype: '0x88B8'
filter_authorized_macs:
src_mac:
- '00:30:A7:01:*'
- '00:30:A7:02:*'
- '00:60:CA:01:*'
condition: selection and not filter_authorized_macs
falsepositives:
- New IED commissioning before inventory update
- IED replacement with new MAC address
level: critical
tags:
- attack.impact
- ics.t0836
- ics.t0826
Sigma Rule — DNP3 Control from Non-SCADA Source¶
title: DNP3 Control Command from Unauthorized Source
id: c9d0e1f2-a3b4-5c6d-7e8f-901234567890
status: experimental
description: >
Detects DNP3 DIRECT_OPERATE or SELECT-BEFORE-OPERATE control commands
originating from IP addresses other than the authorized SCADA master
station, indicating potential unauthorized grid control
author: Nexus SecOps
date: 2026/04/03
references:
- https://attack.mitre.org/techniques/T0855/
- https://attack.mitre.org/techniques/T0831/
logsource:
category: network
product: ot_network_monitor
detection:
selection_control:
dest_port: 20000
dnp3_function:
- 'DIRECT_OPERATE'
- 'DIRECT_OPERATE_NR'
- 'SELECT'
- 'OPERATE'
filter_scada_master:
src_ip:
- '10.50.20.20'
- '10.50.20.21'
condition: selection_control and not filter_scada_master
falsepositives:
- Authorized engineering access during maintenance windows
- SCADA master failover to backup server
level: critical
tags:
- attack.impact
- ics.t0855
- ics.t0831
Response Playbook¶
- Incident Classification: Classify as a critical OT/ICS incident. Activate the utility's Cyber Emergency Response Plan. Notify the Electricity Information Sharing and Analysis Center (E-ISAC) and CISA ICS-CERT.
- IT/OT Isolation: Immediately sever all connections between the IT network and OT DMZ at firewall 10.50.5.1. This eliminates the attacker's remote access path but preserves OT system operation in autonomous mode.
- SCADA Operator Alert: Notify SCADA operators of the compromise. Transition to manual monitoring and control procedures for all affected substations. Disable automated control actions from the EMS until integrity is verified.
- GOOSE Threat Neutralization: Deploy IEC 62351-6 compliant GOOSE message authentication on all critical substations immediately. As an interim measure, configure substation Ethernet switches to apply MAC address filtering on GOOSE multicast groups, blocking frames from unauthorized sources.
- AMI Head-End Forensics: Image the AMI head-end system at 10.50.10.20 for forensic analysis. Identify the meter data manipulation script, determine the full scope of falsified readings, and calculate the revenue impact. Restore meter data from pre-compromise backups and reconcile billing records.
- RTU Firmware Verification: For the three RTUs with suspected backdoors (10.50.30.1, 10.50.30.7, 10.50.30.15), extract firmware via JTAG debug ports and compare against known-good baselines from the vendor. Reflash compromised RTUs with verified firmware.
- Protection Relay Audit: Audit all IEC 61850 protection relay settings at 23 critical substations. Compare current settings against the engineering baseline. Restore any modified protection parameters to their correct values. Pay special attention to overcurrent pickup thresholds and zone distance settings.
- C2 Blocking: Block 203.0.113.122 and cdn-analytics.example.com at the corporate firewall. Hunt for the GRIDLOCK RAT across all IT endpoints using IOCs from the compromised workstation.
- Credential Reset: Rotate all OT system credentials including SCADA operator accounts, RTU access passwords, and IED engineering passwords. Implement multi-factor authentication for all IT/OT DMZ access.
- Network Segmentation Hardening: Redesign the IT/OT DMZ architecture to enforce strict unidirectional data flow using data diodes for telemetry from OT to IT. Eliminate direct RDP access from IT to OT engineering workstations.
- Vendor Notification: Alert GridControl Systems of their email compromise. Coordinate to identify any other utility customers who may have received phishing emails from the compromised account.
- Regulatory Compliance: Report the incident per NERC CIP-008 (Cyber Security Incident Reporting) requirements. Prepare a detailed incident report for the Public Utility Commission and relevant federal agencies.
Lessons Learned¶
- IT/OT segmentation failures enable grid compromise. A single misconfigured DMZ firewall rule allowing RDP from a compromised IT workstation to an OT engineering station provided the bridge that enabled the entire OT attack. Data diodes and strict unidirectional architectures are essential.
- IEC 61850 GOOSE messages lack authentication by default. GOOSE operates at Layer 2 with no built-in authentication, making it trivial to spoof breaker trip commands. IEC 62351-6 GOOSE authentication must be deployed proactively, not reactively.
- Meter data manipulation is a low-noise, high-impact attack. Unlike dramatic grid disruption, systematic revenue theft through meter data falsification can persist for months before detection. Statistical anomaly detection on meter reading distributions is essential.
- Vendor email compromise is a highly effective initial access vector. Phishing emails from legitimate vendor accounts bypass most awareness training because they originate from trusted correspondents discussing real business topics.
- RTU firmware integrity is rarely verified. Most utilities do not perform routine firmware integrity checks on field devices. Backdoored RTU firmware can persist for years without detection. Regular firmware attestation programs are critical.
- Cascading grid failures require pre-positioned access. VOLT SPECTER spent six months positioning themselves for a potential grid disruption. Early detection of OT reconnaissance and lateral movement is the key to preventing catastrophic impact.
Nexus SecOps References¶
- Chapter 21: OT/ICS/SCADA Security — SCADA, ICS, and smart grid security architecture
- Chapter 20: Critical Infrastructure Protection — NERC CIP and energy sector frameworks
- Chapter 22: Threat Actor Encyclopedia — Nation-state groups targeting critical infrastructure
- Chapter 27: Digital Forensics — OT forensics and firmware analysis
- Chapter 38: Threat Hunting Advanced — Hunting in OT/ICS environments
- Chapter 49: Threat Intelligence Ops — Critical infrastructure threat landscape
- Chapter 41: Red Team Methodology — OT penetration testing approaches
- Chapter 21: OT/ICS/SCADA Security — SCADA protocol analysis and exploitation
- Purple Team Exercise Library — OT/ICS attack and defense exercises
- Runbook: Data Breach Response — OT incident response procedures