Malware, short for malicious software, is a woe common to many computers and users. Unfortunately, these same types of threats can also target and affect ICS devices. This chapter provides an overview of the types of malware and the mechanics that they use. We then examine ICS-specific malware, as well as introductory methods for analyzing it. For those looking for a deeper dive into ICS malware analysis, we provide several great references at the end of this chapter.
ICS Malware Primer
Traditionally, malware has slowly evolved to perform many different functions. For instance, a single piece of malware can communicate to many command-and-control servers via different protocols. That same malware can also move laterally ...
Get Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.