2022
DOI: 10.1016/j.ijcip.2022.100521
|View full text |Cite
|
Sign up to set email alerts
|

APT attacks on industrial control systems: A tale of three incidents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…The infection technique primarily involved DLL injection. Additionally, we refer to existing research on hardware supply chain attacks in nuclear power infrastructures [22], [107] to develop a more explicit attack scenario.…”
Section: Case Studymentioning
confidence: 99%
“…The infection technique primarily involved DLL injection. Additionally, we refer to existing research on hardware supply chain attacks in nuclear power infrastructures [22], [107] to develop a more explicit attack scenario.…”
Section: Case Studymentioning
confidence: 99%
“…APT attack vectors that are specific tactics or strategies that attackers use to launch APT attacks (Kumar et al, 2022) include techniques such as spear-phishing, malware distribution, network exploitation, social engineering, backdoors, key loggers, video recording of victim activity, and remote administration tools (Stojanović et al, 2020). Frequently, these vectors are used to form a multiphase attack that enables attackers to gain and keep access to a target network while evading detection.…”
Section: Apt Attack Vectorsmentioning
confidence: 99%
“…In recent years, CPS technologies have been applied in a variety of scenarios such as smart homes, power grids, the Internet of Vehicles, and healthcare. However, such systems, like traditional network information systems, have become the targets of advanced persistent threats (APTs) [2][3][4][5]. According to ENISA [6] and NIST [7] guidelines, a recent trend in the IoT domain concerns the certification of security features of IoT devices [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, in 2010, the 'Stuxnet' worm attacked Iranian nuclear facilities [2]. In 2015, the Ukrainian power grid was attacked by the 'BlackEnergy' malware [3]. In 2016, the 'Mirai' malware compromised a large number of IoT devices and used them to launch large-scale distributed denial-of-service (DDoS) attacks, disrupting numerous mainstream sites [4].…”
Section: Introductionmentioning
confidence: 99%