ICS/OT Incident Response in the Age of “Living-off-the-Land” Attacks

Spread the love

Why Industrial Cybersecurity Cannot Be Run Like IT Security

Modern cybersecurity programs are still heavily influenced by IT thinking.
That becomes a serious problem the moment an organization operates industrial systems.

Most incident response procedures were designed for laptops, servers, and cloud workloads. In those environments, isolating a machine, blocking network traffic, killing a process, or rebuilding an operating system is acceptable. Business disruption may occur, but it rarely threatens human safety.

Industrial environments are different.

In Operational Technology (OT) and Industrial Control Systems (ICS), computers are not just processing data — they control physical processes. They regulate pressure, temperature, chemical dosing, turbine rotation, conveyor movement, and electrical distribution. When those systems behave unexpectedly, the impact is not just downtime. It can be equipment damage, environmental impact, service outage, or human injury.

Because of that, applying traditional IT incident response procedures inside an industrial environment can actually make the situation worse.


The Dangerous Assumption: “A Cyber Incident = Shut It Down”

In IT security, containment is simple: isolate the compromised system as quickly as possible.

In ICS/OT, that decision may be unsafe.

Many industrial devices:

  • Cannot be quickly rebuilt

  • Cannot be patched rapidly

  • Cannot be powered off safely

  • Are tightly coupled to physical processes

Shutting down a controller, Human Machine Interface (HMI), or protection relay at the wrong moment may stop a production line, damage equipment, or create unsafe process conditions. A cybersecurity action taken without engineering awareness can unintentionally trigger a physical incident.

This is the central reality organizations must understand:

An IT-led response protects data.
An engineering-led response protects operations and safety.

Industrial cybersecurity must prioritize:

  1. Human safety

  2. Process stability

  3. Operational reliability

  4. Then cyber containment

Reversing that order is where organizations get into trouble.


Why ICS/OT Incident Response Is Fundamentally Different

Traditional IT incident response focuses on:

  • Confidentiality

  • Data protection

  • Rapid containment

  • Forensic preservation

Industrial incident response focuses on:

  • Safe operation

  • Process continuity

  • Controlled containment

  • Gradual recovery

Taking a server offline in IT is inconvenient.
Taking a PLC offline may stop water treatment, electricity supply, manufacturing, or critical services.

The same security action has completely different consequences.

This is why industrial response cannot be handled solely by IT security teams. Engineers, operators, and control system specialists must be directly involved in both planning and response execution.

Organizations that include plant engineers and operators in incident response exercises consistently recover faster and make safer decisions during real incidents.


Containment Does Not Always Mean Shutdown

One of the biggest misconceptions in industrial cybersecurity is that containment equals immediate isolation.

In reality, if an adversary’s activity is understood and controlled, maintaining monitored operations may be safer than abruptly disconnecting systems.

A controlled environment allows teams to:

  • Observe attacker behavior

  • Prevent unsafe state changes

  • Avoid sudden process interruption

  • Plan safe remediation

Aggressive containment actions — especially automated ones — can unintentionally create a self-inflicted outage.

Industrial response therefore requires coordinated decision-making between:

  • Cybersecurity teams

  • Control engineers

  • Plant operators

  • Management

Cybersecurity alone cannot make the decision.


The New Threat: Living-off-the-Land Attacks in Industrial Environments

Historically, organizations looked for malware inside industrial networks.
That model is now outdated.

Attackers increasingly do not deploy custom malware at all.

Instead, they use what already exists.

These are known as Living-off-the-Land (LotL) attacks.

Rather than exploiting vulnerabilities, adversaries:

  • Use stolen credentials

  • Access trusted remote connections

  • Operate legitimate engineering tools

  • Issue real control commands

Once inside the OT network, attackers may interact directly with physical processes using normal engineering workflows. From a software perspective, nothing appears malicious because authorized tools are being used.

Examples of attacker behavior include:

  • Modifying controller logic

  • Changing process parameters

  • Issuing control commands via industrial protocols

  • Manipulating HMIs

  • Using scripting tools such as PowerShell from trusted systems

Traditional anti-malware solutions often fail to detect these actions because no malicious executable is present. The attacker is operating as an authorized user.

This is why many recent industrial incidents were not detected until operational impact occurred.


Why Attackers Move from IT to OT

Industrial attacks rarely start in the plant network.

They start in corporate IT.

The common pathway looks like this:

  1. Compromise employee credentials

  2. Access VPN or remote access systems

  3. Move through shared identity infrastructure

  4. Reach the OT environment

  5. Use legitimate engineering tools

If IT and OT share identity services, remote access, or trust relationships, the attacker does not need to hack the control system. They simply log in.

This is precisely why ICS security cannot be treated as an isolated technical problem. It is an enterprise risk management issue.


Defensive Priorities Organizations Must Implement

To reduce risk from modern ICS/OT attacks, organizations should prioritize the following controls:

1. Network Segmentation Based on the Purdue Model

Proper separation between enterprise IT and control networks allows threats to be contained without shutting down operations.

2. Secure and Monitored Remote Access

All vendor and engineering access must be:

  • Authenticated

  • Logged

  • Monitored

  • Time-restricted

Uncontrolled remote access is one of the most common OT breach paths.

3. Industrial Protocol Visibility

Security teams must see control commands, not just network traffic. Monitoring industrial protocols helps detect unauthorized operational changes.

4. Engineering Change Monitoring

Controller logic, configurations, and setpoints must be baselined and monitored for unexpected modification.

5. Joint Incident Response Exercises

Tabletop and live simulations involving:

  • Engineers

  • Operators

  • SOC analysts

  • Leadership

These exercises dramatically improve real-world response performance.


Why Purpose-Built ICS/OT Incident Response Is Necessary

Industrial organizations often assume their existing incident response plan covers OT environments. In most cases, it does not.

An effective industrial response plan must include:

  • Process safety considerations

  • Engineering decision workflows

  • Operational fallback procedures

  • Controlled containment strategies

  • Coordinated communication channels

Without this, a cyber event can escalate into an operational crisis not because of the attacker, but because of the response.


Final Thoughts

Cyber incidents are no longer purely digital events.
They now have physical consequences.

As industrial systems become more connected, the boundary between cybersecurity and operational safety continues to disappear. Organizations that continue to manage ICS environments with IT-centric response models are exposing themselves to avoidable risk.

Effective industrial cybersecurity is not just about detecting attackers.

It is about responding without breaking the process you are trying to protect.

At Jypra Group, we believe industrial incident response must be engineering-aware, safety-driven, and operationally informed. The objective is not only to stop an intrusion — it is to ensure the organization can continue operating safely while doing so.

Because in ICS/OT environments, the worst incident is not always the attack.

Sometimes, it is the reaction.


Spread the love

Under Attack

Please fill out the form and we will be in touch shortly

Subscribe