MITRE Engenuity Releases ATT&CK Evaluations for ICS Vendors

MITRE´s foundation for public good, MITRE Engenuity, will conduct an ATT&CK® evaluation to assess industrial control system (ICS) cybersecurity vendors against the threat posed by Triton, the company said.

This Russian-linked malware is one of the most disruptive and destructive types targeting critical infrastructure.

Triton has been used to compromise industrial systems across the globe, including oil and gas and electrical plants in the Middle East, Europe, and North America. Triton targets safety systems, preventing a response to a failure, hazard, or other unsafe conditions. Triton is one of the few known malware attacks in the ICS space capable of physical destruction.

The evaluations use ATT&CK for ICS, a MITRE-curated knowledge base of adversary tactics, techniques, and procedures based on known threats to industrial control systems. Announced in January 2020, ATT&CK for ICS provides common language to describe the tactics and techniques that cyber adversaries use when attacking the systems that operate some of the nation´s most critical infrastructures, including energy transmission and distribution plants, oil refineries, wastewater treatment facilities, and more.

This latest set of evaluations will be conducted by MITRE Engenuity, a non-profit tech foundation launched last November to collaborate with the private sector on complex public interest challenges, including securing and protecting industrial control systems that help keep America safe.

MITRE Engenuity is a non-profit tech foundation that collaborates with the private sector on challenges that require a public interest solution, like cybersecurity, infrastructure resilience, healthcare effectiveness, and next generation communications. www.mitre-engenuity.org

ATT&CK® was created by MITRE´s internal research program from its own data and operations. ATT&CK is entirely based on published, open source threat information. Increasingly, ATT&CK is driven by contributions from external sources.