Attacks take place on industrial control systems (ICS) so as to undermine the integrity of processes that may lead to a malicious functional impact, according to a recent paper, "Stuxnet to CRASHOVERRIDE to TRISIS," written by Joe Slowik of Hanover, MD-based Dragos.In these attacks, purpose-built software was leveraged as part of multi-stage attacks that not only sought to undermine system integrity and disrupt the process, but that were also meant to cause destruction or bring coercion to bear.
展开▼