homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured: Solutions for Emerging Risks

    Discover tailored resources that translate emerging threats into actionable strategies

    Risk-Based Solutions

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Living Off the Land Attacks and Countermeasures in Industrial Control Systems
DeanParsons_340x340.png
Dean Parsons

Living Off the Land Attacks and Countermeasures in Industrial Control Systems

As attacks on critical infrastructure and industrial control systems become brazen, ICS defenses must go beyond just preventative security.

October 10, 2023

As attacks on critical infrastructure and industrial control systems become increasingly brazen, ICS defenses must go beyond just preventative security. Control system defenses must be ICS-specific, teams need to be proactive and have ICS cyber specific knowledge and skills.

Brazen ICS Attack Techniques

The recent evolution of targeted attacks against critical infrastructure sends a clear message: proactive control system cyber defense requires engineering knowledge to preserve the safety of industrial control system (ICS) and operational technology (OT) operations.

Discussions in Facilities - On the Plant Floor

One of the many things I love about being an ICS-Certified SANS instructor is that in between teaching in the classroom, we spend our time as practitioners in the field. We bring up-to-the-minute threat intelligence-driven knowledge from the field directly into each class. For example, at my firm, ICS Defense Force, I perform cybersecurity control system assessments across multiple critical infrastructure sectors - oil and gas, water, electric power generation, distribution, critical manufacturing, etc.

That means I meet with security teams, engineering staff, facility stakeholders, operators, and those leading the charge of security and ICS risk management. Many meetings are held on the plant floor in hard hats, discussing how to practically apply new ICS defense technologies, tactical defense knowledge, incident response processes, and risk management strategies.

ICS Living-Off-the-Land Attacks Explained

ICS living-off-the-land attacks essentially turn control systems against themselves. This can be achieved when an adversary is abusing already deployed engineering software, industrial network protocols, trusted network access, engineering tools, control system libraries, etc. Living-off-the-land attacks can be much cheaper for adversaries to deploy, have higher success rates, are more difficult to detect, require more rapid industrial response, and can have immediate direct safety and engineering impacts. Let's look at just a few of the ways adversaries live off the ICS land.

Valid Credentials

Adversaries commonly abuse valid credentials to laterally move from IT to ICS/OT networks, then throughout control system networks by way of legitimate Active Directory (AD) accounts, for example. This is most commonly seen in high-risk environments that allow a trust relationship between both IT and ICS/OT ADs. Or where organizations have the same AD infrastructure that authenticates accounts on both IT and ICS/OT networks.

ICS Protocols

ICS cyber defenders must know what normal ICS network traffic looks like. As adversaries abuse deployed industrial network protocols, monitoring will detect anomalous unauthorized commands. This requires deep network visibility, or ICS network security monitoring (NSM) to identify engineering commands sent in packet payloads to/from key ICS assets and to ensure they are authorized, expected, and unmanipulated. Such assets are critical human machine interfaces (HMIs), programmable logic controllers (PLCs), remote terminal units (RTUs), protection control relays, meters, historians, etc.

Scripting

The abuse of already installed scripting interpreters is also common. Such interpreters like PowerShell can be used to build malware or run functions for malicious purposes inside the system without the adversary having to bring in attack tools or malicious payloads. This helps the adversary avoid detection. PowerShell is a great administrative tool for proactive ICS threat hunting and used in incident response (IR) situations. Ensure powerful scripting and interpreters are monitored and limited to only the systems and users that require it for engineering and IR purposes.

Engineering Controls System Applications

Why would an adversary group invest time, money, development, and testing of exploit code if already installed engineering applications can be abused to directly interact with the control systems to cause negative consequences? Engineering software is targeted because of its ability to directly monitor, control, and modify the physical process.

Trusted Network Paths

Adversaries abuse trusted network access paths. Firewalls will not defend against an attack group abusing legitimate allowed network ports or protocols over trusted pathways. The adversaries will be allowed access using existing access controls lists (ACLs). While network segmentation following Purdue1 and the SANS ICS410 SCADA Reference Architecture is a fundamental ICS security best-practice, modern ICS defense must go well beyond basic best-practice engineering network architecture. Additionally, know that once a strong network architecture is in place, all other ICS defense investments will have a much higher return on investment.

1https://www.sans.org/blog/introduction-to-ics-security-part-2/

Living-Off-the-Land Attack Examples - They're Not New, and Growing

One example of living-off-the-land is when attackers gain access to an HMI. The adversary uses HMI commands on-screen against the engineering process. An adversary gaining access to an HMI in an electric power facility could remotely open circuit breakers in the field causing power outages. Like in the 2015 Ukraine power distribution system attack. Or, in a water treatment facility in Oldsmar Florida where an adversary abused the HMI and altered the chemical mixture in the water to toxic levels.

Another example is the abuse of the engineering workstation (EWS) functionality to reprogram PLCs with manipulated logic over legitimate EWS-to-PLC communication ports, like the TRISIS/Triton malware.

Living-off-the-land attacks are not new (HAVEX, CRASHOVERRIDE, etc.). Other examples are seen with PIPEDREAM/Incontroller, which is a scalable ICS-specific attack framework which can be deployed for distribute and possibly physically destructive impacts to operations and safety, regardless of sector or region. The attack modules inside the PIPEDREAM toolkit help adversaries live off the land. The framework can impact a wide variety of vendor PLCs. It can abuse already installed legitimate industrial automation software. Additionally, attackers can abuse legitimate ICS protocols within the ICS network, including but not limited to OPC-UA, Modbus, and some proprietary control protocols.

Exploiting ICS Vulnerabilities Vs Living-Off-The-Land

When I'm teaching ICS515, ICS418 or conducting on-site assessments this question on pre-empting adversary tradecraft often comes up:

"Are adversaries shifting away from exploiting engineering hardware or software vulnerabilities to instead focus on ICS living-off-the-land attacks techniques?"

We should expect a blend of exploits and living-off-the-land attack techniques depending on the adversary's goals. This will also depend on the environment and current ICS security program maturity. The effort the adversary invests in attacks against your ICS will likely be directly related to the ICS-specific defenses in place, or lack thereof. Vulnerabilities in engineering hardware and software should continue to be addressed during scheduled engineering maintenance windows while always considering the engineering impacts of deploying patches and workarounds. Living-off-the-land attacks are not going aways any time soon. In fact in anything, they are likely to increase in frequently and be more creative. We must continuously assess risk while considering the following questions:

Do the engineering needs outweigh the risk of an identified vulnerably actually being exploited within the ICS network, such that the exploit provides the adversary the ability to impact the safety and reliability of operations?

Would the adversary take this expensive option of pre-positioning, developing, testing, and launching exploits, rather than just abusing the HMI, EWS, or other elements inside the ICS to enable the same or more harmful affect?

ICS Living-Off-the-Land Countermeasures

Those responsible for leading the charge in ICS/OT cybersecurity and risk management must plan to rely on more than just basic ICS-specific defense-in-depth preventative controls. We must have trained staff ready to respond and maintain engineering operations when those controls fail to detect ICS living-off-the-land attacks. Early detection of adversary pre-positioning in the ICS Cyber Kill Chain is a must.

  • ICS418: ICS Security Essentials for Managers provides ICS leaders with tons of industry resources, leadership drills, and the "must dos" of ICS security leadership into the two-day class. It empowers leaders to successfully address the need for dedicated ICS security programs, the teams that run them, and the skills required to map industrial cyber risk to business objectives while prioritizing safety in engineering environments.
  • ICS tactical defenders, engineering staff, and those coming into ICS/OT from IT can level-up their technical skills in ICS515: ICS Visibility, Detection, and Response. Students will walk away from this course with the ability to detect and respond quickly inside any ICS network with active defense, network visibility, ICS threat detection and industrial response.
  • Engineering and ICS cybersecurity staff can gain even more engineering-focused ICS defense-in-depth expertise in ICS612: ICS Cybersecurity In-Depth. ICS612 provides an advanced focus on engineering components, control system network architectures, and configurations.

Defend Your ICS/OT Critical Infrastructure

Join me in class for ICS515: ICS Visibility, Detection, and Response and ICS418: ICS Security Essentials for Managers. And don't forget to network in-person with the ICS community and connect with me in-person at the SANS ICS Summit in June 2024!

To learn more about effective strategies for safeguarding your ICS against sophisticated cyber threats like living off the land techniques, download the SANS Strategy Guide: ICS Is the Business.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Recommended Training

  • SEC511: Cybersecurity Engineering: Advanced Threat Detection and Monitoring™
  • SEC573: Automating Information Security with Python™
  • ICS612: ICS Cybersecurity In-Depth™

Tags:
  • Industrial Control Systems Security

Related Content

Blog
ICS_blog_-_Developing_ICS_OT_Engineering_Cyber_Defense_Teams2.jpg
Industrial Control Systems Security
August 17, 2022
Developing ICS/OT Engineering Cyber Defense Teams
ICS security managers don't get to choose if they're a target of a cyber attack, but do get to choose many things about their OT security program.
DeanParsons_340x340.png
Dean Parsons
read more
Blog
ICS_Blog_Series-_A_Look_into_ICS-Part_22.jpg
Industrial Control Systems Security
April 4, 2022
A Look Into ICS612: ICS Cybersecurity In-Depth: Part 2
In OT security, you'll eventually be placed in an environment where you'll face the pressures of dealing with a process that's not responding.
Jeffrey Shearer
Jeffrey Shearer
read more
Blog
ICS_Webcast_Series_-_Cyber_Resilience_Active_Defense_&_Safety_Blog2.jpg
Industrial Control Systems Security
January 24, 2022
ICS Cyber Resilience, Active Defense & Safety Series: Parts 1-5
This series covers foundational, intermediate, and advanced ICS cyber security defense techniques. Watch Parts 1 - 5 below.
ICS_Icon_Blue.png
SANS ICS Security
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn