The document discusses several past and potential future ICS attacks:
- Stuxnet successfully disrupted Iranian nuclear centrifuges but had limited direct impact.
- CRASHOVERRIDE largely failed to impact the Ukrainian power grid as intended.
- TRISIS that targeted a safety instrumented system failed to cause damage.
Future attacks may seek to directly manipulate industrial processes, undermine electric utilities, or compromise safety systems to cause physical disruption or damage. Defenders need ICS-focused security strategies including process monitoring to detect and respond to these evolving threats.
Related topics: