WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts Knowledge is Key – ICS Cyber Operation Counterintelligence
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Knowledge is Key – ICS Cyber Operation Counterintelligence

Author: Jennifer Walker

Created: Tuesday, March 24, 2020 - 18:45

Categories: Cybersecurity, General Security and Resilience

While most of the nation is working and learning remotely (hopefully at home) to stop the spread of COVID-19, it is up to critical infrastructure owners and operators to keep the water running, toilets flushing, heat and lights on, and the shelves stocked with critical supplies. While many utilities are finding the proper balance between social distancing and maintaining operations, cyber threat actors across all categories have stepped up their campaigns in hopes to capitalize on the numerous distractions and our eagerness for greater situational awareness during this time. It is especially important during this time that we do not wane on our resolve to keep our critical infrastructure facilities safe from more than just coronavirus. We must continue to understand the tactics, techniques, and procedures (TTPs) used by ICS-focused threat actors, including reconnaissance activity, tools, and exploits used to compromise our critical facilities. It is important to know what the bad guys know about your facility, including publicly available information and ICS products used, and remediate those vulnerabilities before they are exploited.

Industrial cybersecurity firm Dragos and cybersecurity firm Fireeye have recently shared some resources to help owners and operators perform basic counterintelligence to keep our critical infrastructure resilient:

  • OSINT (open source intelligence) Primer (Dragos) – know what the bad guys know about your organization
  • Monitoring ICS Cyber Operation Tools and Software Exploit Modules to Anticipate Future Threats (Fireeye) – a review of ICS-based attack tools that lower the barrier for cyber threat groups to attack OT infrastructure

Other important resources that provide more background on ICS-focused tools and threat actor groups:

  • MITRE ATT&CK for ICS Software List
  • Dragos’ Adversary Reports on Industrial Threat Activity Groups

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar