O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8

ICS MALWARE

Malware, short for malicious software, is a woe common to many computers and users. Unfortunately, these same types of threats can also target and affect ICS devices. This chapter provides an overview of the types of malware and the mechanics that they use. We then examine ICS-specific malware, as well as introductory methods for analyzing it. For those looking for a deeper dive into ICS malware analysis, we provide several great references at the end of this chapter.

ICS Malware Primer

Traditionally, malware has slowly evolved to perform many different functions. For instance, a single piece of malware can communicate to many command-and-control servers via different protocols. That same malware can also move laterally ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required