WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Cyber Threat Intelligence - The Importance of OSINT for ICS
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Cyber Threat Intelligence – The Importance of OSINT for ICS

Author: Jennifer Walker

Created: Thursday, January 7, 2021 - 19:08

Categories: Cybersecurity

Adversaries do not usually have to work too hard to discover valuable information to plan and execute attacks against their targets. Even threat actors targeting ICS are able to find plenty of open source information during their reconnaissance phase to disrupt operational functions. For example, Dragos observed adversaries conducting ICS-targeting activities that sought data about energy infrastructure and physical processes necessary to recover from a compromise. According to Dragos, with this data, an adversary could target operational functions that are pertinent to recoverability to further the consequences of an attack. Therefore, it is important for organizations to think like an adversary and identify data about their organization that is found in open source (hopefully before the bad guys/girls do). In that light, Dragos revisits its OSINT Collection Risk Framework to help organizations identify and limit the information/data an adversary can use against them in a potential attack. The framework review includes a useful matrix to help ICS asset owners and operators assign severity scores on the risk that data poses to the organization.

All utilities are encouraged to at least identify sources and collect information to understand their public and semi-public facing exposure. For more information on open source intelligence assessments, Dragos published a whitepaper in December 2020 that discusses:

  • How ICS-specific attacks differ from traditional enterprise targets
  • How to develop an OSINT security assessment
  • How to improve your defense using an OSINT collection and risk framework
  • A useful and comprehensive set of OSINT key definitions

Access the blog post and whitepaper at Dragos.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar