SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsThe evolution of targeted attacks against critical infrastructure in recent times sends a clear message to asset owners and operators. In industrial control systems - water management, oil and gas refineries and distribution operations, and power grids, etc. - that is, modern adversaries have illustrated brazen steps to defeat traditional security controls and have impacts to safety and engineering reliability. Today, proactive control system cyber defense requires dedicated ICS security teams with engineering knowledge to preserve safety of industrial control system (ICS) and operational technology (OT) operations.
With my firm ICS Defense Force, I perform industrial control system (ICS) security assessments, incident response tasks, and incident response tabletops across multiple critical infrastructure sectors, globally. It is important to describe my practical field work in this context. It allows me to meet with security teams, engineering staff, and those leading the charge of cybersecurity risk management and defense. Including the decision makers, who are seeking technical solutions and tactical training to address their identified cybersecurity challenges.
Recent threat landscape analysis for the Gulf Cooperative Council (GCC) indicates attacks against critical infrastructure are increasing in volume and sophistication. Critical infrastructure adversaries and cyber criminals alike are exploiting both ICS and IT environments to achieve malicious goals with impacts to the safety and engineering operations.
The Oil and Gas and Energy sectors specifically present valuable targets to modern advanced persistent threats (APTs) who are active and continue adjusting attack tradecraft to infiltrate multiple types of facilities and evade detection. Adversaries targeting facilities operating in GCC, in all energy sectors - electric, oil and gas, and related supply chain providers for equipment and software - are at increased risk then prior years. Adversaries consider cyber-attacks against critical infrastructure a legitimate component of warfare.
For example, industrial cyber incidents from active adversary groups target oil and gas operations across upstream, midstream, and downstream operations. Their purpose appears to have been consequences ranging from disruptive to destructive incidents, including potential personal safety and environmental impacts. 1This is evident with the discovered ICS targeted malware TRISIS/TRITON against oil and gas safety systems2.
Additionally, there has been a global increase of Ransomware events against ICS environments with no sign of slowing down. Ransomware impacting IT support services can also impact the ICS operations if the organization does not have suitable network segmentation in place to protect engineering networks from IT and the Internet. An example is the Colonial Pipeline3 incident in oil and gas, where other adversary groups are learning from such events to adapt and strengthen their own attack techniques. As well, ICS specific ransomware has been discovered in the form of EKANS4.
Threat intelligence reveals critical infrastructure could be at increased unnecessary risk of cyber incidents with impacts if the following scenarios are present, but other gaps exist.
According to the recent SANS 2023 ICS/OT Cybersecurity Survey data, only 52%5 of ICS facilities have an ICS/OT-specific incident response plan that is documented, tested using engineering driven tabletop exercises, and is kept up to date. 17% are unsure whether they have such a dedicated ICS incident response plan. What's critical to understand is this is not your IT incident response plan. "Copying and pasting" IT security controls into an ICS/OT facility's incident response plan will not work. In fact, this approach is likely to cause serious unintended or disastrous consequences to safety and engineering operations.
https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/blte7116afddba9b2de/65a6a7978c124a83aa159165/ICS_Cyber_Threats_&_The_Gulf_Region_Blog_5.pngIt is imperative top facility leadership, and engineering teams know the differences between traditional IT security and industrial control system security. ICS/OT assets are often incorrectly compared to traditional IT assets. Traditional IT assets focus on data at rest or data in transit, user data and user applications. Whereas ICS/OT are engineering assets, equipment, that focus on real-time systems for physical input values and controlled output physical action that have an effect in the real-world. It is this primary difference between IT and ICS/OT that drive differing cybersecurity design, security assessment approaches, risk surface understanding, safety, strategy, support, cyber tactical defense, and industrial incident response practices. "Standard cyber incident remediation actions deployed in IT business systems may result in ineffective and even disastrous results when applied to ICS cyber incidents, if prior thought and planning specific to operational ICS is not done."6
Those responsible for ICS/OT cybersecurity and infrastructure defence can position their facility to meet best practices by having an engineering-driven ICS-specific incident response plan. They can regularly exercise that plan by running ICS tabletops facilitated by ICS experts with realistic scenarios derived from sector specific threat intelligence. Ensure all the right teams are included.
Tactical practitioners working on the front lines to defend engineering operations should embrace the fact that IT and ICS/OT are different. Discover what can be adapted from IT security to actively respond to ICS specific threats using ICS specific controls, technologies, and processes, while prioritizing safety first. Realize that ICS Security is not a "copy and paste" of IT Security into the ICS. In many cases what works for IT will cause disruptive or disastrous consequences if applied to ICS.
I am very fortunate to be strengthening the SANS relationships in the region with senior leadership, decision makers, engineering, and security staff. I was recently in Dubai at the SANS EMEA Gulf Region event in November teaching both ICS515 and ICS418, meeting great people from the local sectors in oil and gas, energy, and manufacturing. It was fantastic being in-person delivering best-in-class practical risk management to leadership teams, and hands-on tactical ICS cybersecurity training to those in day-to-day operations.
https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/blt501b2df05c0b18b6/65a6a79da0613d2ec9529370/ICS_Cyber_Threats_&_The_Gulf_Region_Blog_1.jpgTeaching in Dubai at the SANS EMEA Gulf Region event in November 2023
During the break and networking sessions it gave us a wonderful opportunity to share experiences and assistance to facilities to help address some of the ICS/OT cybersecurity challenges they have today.
https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/blt24a944e94427ff56/65a6a79bbad37da3739df210/ICS_Cyber_Threats_&_The_Gulf_Region_Blog_4.jpgTeaching students in the Gulf region how to protect ICS systems using the ICS515 included student PLC hardware kit.
The SANS course, ICS515: ICS Visibility, Detection, and Response meets several modern ICS security challenges head-on. ICS515 teaches students how to perform tactical ICS incident response by leveraging hands-on labs. Labs include assembling and running a programmable logic controller (PLC) like you'd see on a plant floor. Students keep the PLC kit for continued learning after class is over. Students from IT, ICS, engineering, etc., will detect and defend against threats in several realistic ICS environments.
It's critical for critical infrastructure owners and operators to ensure they have their teams attend, complete and being certified in ICS specific security training, in order to defense against the latest threat groups that mean to cause disruption, downtime and safety impacts.
On behalf of myself and the EMEA team, thank you for taking the time to review this important topic as is relations to the protection of critical systems in the Gulf region. We look forward to seeing you all at our regional SANS training events! Stay tuned for additional ICS blogs in this series in a dedicated effort to provide actionable information to protect critical infrastructure in this region.
Be safe from industrial incidents!
Best,
1 https://www.dragos.com/industries/oil-gas-industrial-cybersecurity/
2 https://en.wikipedia.org/wiki/Triton_(malware)
3 https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack
4 https://attack.mitre.org/software/S0605/
5 https://www.sans.org/white-papers/ics-ot-cybersecurity-survey-2023s-challenges-tomorrows-defenses/
Dean Parsons, CEO of ICS Defense Force, has established comprehensive ICS security programs and leading industrial-grade incident responses across sectors like telecommunications and energy. He wrote the pivotal SANS ICS Cybersecurity Field Manuals.
Read more about Dean Parsons