{"id":15124,"date":"2020-05-18T06:26:47","date_gmt":"2020-05-18T04:26:47","guid":{"rendered":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/counter-measures-cyber-attack\/"},"modified":"2025-03-19T10:45:32","modified_gmt":"2025-03-19T09:45:32","slug":"counter-measures-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/","title":{"rendered":"Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2"},"content":{"rendered":"<p>In the previous article, <strong><em>Anatomy of a cyber attack- <a href=\"\/en?p=3016\" target=\"_blank\" rel=\"noopener noreferrer\">ICS Cyber Kill Chain-Part 1<\/a><\/em><\/strong>&#8211; we briefly went through the phases of a cyber attack and how an adversary can select their targets, initiate attacks, etc. The Cyber Kill Chain helps Cyber Security organizations and companies to understand a cyber attack from an adversary\u2019s perspective and helps them to grasp a <a href=\"\/en?p=2637\" target=\"_blank\" rel=\"noopener noreferrer\">cyber attack<\/a> in detail. <strong>MITRE<\/strong><strong><sup>\u00ae<\/sup><\/strong> has released its version of ATT&amp;CK knowledgebase covering tactics and techniques used in attacks against Industrial Control Systems.<\/p>\n<h2><strong>ICS ATT&amp;CK Matrix<\/strong><\/h2>\n<p><strong><em>ATT&amp;CK for ICS<\/em><\/strong> knowledgebase provides critical infrastructure companies and other security organizations with information about the most common ICS application and protocols which can be exploited by adversaries. MITRE<strong><sup>\u00ae<\/sup><\/strong>\u2019s ATT&amp;CK framework is widely used by<a href=\"\/en?p=2983\" target=\"_blank\" rel=\"noopener noreferrer\"> Cyber Security<\/a> professionals and organizations to check whether their defenses are good enough to detect and block attacks. Security vendors use this framework to check their products against the detection of specific attacks.<\/p>\n<figure id=\"attachment_3302\" aria-describedby=\"caption-attachment-3302\" style=\"width: 795px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/collaborate.mitre.org\/attackics\/index.php\/Main_Page\"><img decoding=\"async\" class=\" wp-image-3302\" src=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/Mitre-counter-measures-300x148.png\" alt=\"counter measures\" width=\"795\" height=\"392\" \/><\/a><figcaption id=\"caption-attachment-3302\" class=\"wp-caption-text\">Source: https:\/\/collaborate.mitre.org\/attackics\/index.php\/Main_Page<\/figcaption><\/figure>\n<p>The Cyber kill chain explains the phases\/stages of a cyber attack and how adversaries can achieve their goal using different tactics. The ATT&amp;CK for ICS provides Tactics, Techniques, and Procedures (TTPs) based on real world observations of adversaries. It contains information about 11 different tactics and 81 techniques that adversaries can use to achieve their goal in the ICS environment.<\/p>\n<h2><strong>Example Tactic and Technique in relation to a Cyber Attack- Stuxnet<\/strong><\/h2>\n<p>The initial access to the plant or a system can be gained through a phishing process targeting someone who corresponds with people working at the victim\u2019s organization. Once the attacker is in the network, they can start injecting the malicious code or initiate other attacks. There are different ways to gain access to the <a href=\"\/en?p=3016\" target=\"_blank\" rel=\"noopener noreferrer\">plant network<\/a>. In an ICS environment, there are few entry points from the IT network to the OT network such as remote access, internet accessible device, wireless access points, etc. Upon gaining access to the production environment, the adversary has multiple ways to cause enough damage. Attacks like Stuxnet where the adversaries infected the ICS with a different program code depending on the target system <strong><em>(MITRE Tactic- Impair Process Control, MITRE Technique- Program Download)<\/em><\/strong> to cause the fast spinning centrifuges to tear apart, which turns to be the last action. But before this disastrous event, the adversary exploited every possible flaw or vulnerability in the system such as Zero-day flaws. Most importantly, the whole event went under the radar as the adversaries used rootkit to hide from any possible cyber security counter measures. This raises a question about the counter measures in place.<\/p>\n<h2><strong>How can we decide on Counter Measures?<\/strong><\/h2>\n<p>Different Malware serves different purposes in a targeted attack; intrusion, data theft, destruction, and more. To a threat actor, maintaining a presence in a victim\u2019s system is crucial. They need to be able to give commands continuously to their malware. This communication is usually called command and control (C&amp;C) server where malware has the highest priority. The attackers update their malware regularly to stay ahead of their corresponding security countermeasures. So, deciding on the counter measures is a significant step in designing the overall security concept of the plant. Starting from selecting the hardware for the engineering stations to the firewall between the IT and OT network, the ICS Threat modelling helps organizations to identify the attack surface and the corresponding risks. It allows a cross functional cooperation between the IT and OT stakeholders. This allows scaling the threat modeling across all devices, software applications, protocols of the ICS environment. Ultimately, the organizations can improve their approach towards <a href=\"\/en?p=1985\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Security<\/a> starting from the design- <strong><em>\u201cSecurity by design\u201d.<\/em><\/strong><\/p>\n<h2><strong>Constant testing and improving the Counter Measures<\/strong><\/h2>\n<p>Frameworks such as ATT&amp;CK for ICS help <a href=\"\/en?p=2650\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Security<\/a> organizations and professionals to understand and evaluate the cyber attack and also to describe the post-compromise adversary behavior. The counter measures that are already implemented may no longer be valid or not sufficient enough to prevent and detect an attack if there is no regular validation.\u00a0 As an example, a regular anti-virus signature update is important to prevent against the zero-day threats, a firewall firmware update against its vulnerability, regular security updates of workstations, etc. Therefore, constant validation of counter measures is equally important apart from deciding and implementing them.<\/p>\n<p>The ICS ATT&amp;CK Matrix provides an extensive overview of different cyber attacks that can be targeted towards the ICS by the adversaries. The importance of choosing the countermeasures for a specific attack is pivotal to reduce or avoid the damage caused by adversaries. The mitigations mentioned for each technique listed in the matrix can help security organizations and professionals to a greater extent. \u00a0It helps ICS Vendors and customers to gain insights about the different techniques used by the adversaries to gain access to the system, thereby helps them to decide on the counter measures. Preparing for any cyber attack involves extensive planning of budget and resources.<\/p>\n<p><strong><em>Are you prepared to face a cyber attack? If not, do not hesitate to contact us via our <a href=\"https:\/\/www.yokogawa.com\/eu\/solutions\/services\/asset-performance-monitoring\/maintenance-support-system\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact page<\/a>.\u00a0 We&#8217;re happy to support you.\u00a0<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the previous article, Anatomy of a cyber attack- ICS Cyber Kill Chain-Part 1&#8211; we briefly went through the phases of a cyber attack and how an adversary can select their targets, initiate attacks, etc. The Cyber Kill Chain helps&hellip; <\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\"> <span class=\"screen-reader-text\">Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":14076,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","footnotes":""},"categories":[2344],"tags":[],"coauthors":[2413],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Anatomy of a Cyber Attack \u2013 ICS ATT&amp;CK Matrix \u2013 Part 2<\/title>\n<meta name=\"description\" content=\"Deciding on the counter measures is a significant step in designing the overall security concept of the plant. Starting from selecting the hardware...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anatomy of a Cyber Attack \u2013 ICS ATT&amp;CK Matrix \u2013 Part 2\" \/>\n<meta property=\"og:description\" content=\"Deciding on the counter measures is a significant step in designing the overall security concept of the plant. Starting from selecting the hardware...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Energy and Renewables\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-18T04:26:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T09:45:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"848\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ashok Sadasivam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\"},\"author\":{\"name\":\"Rudi Tester\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/0bf50cfccfc1b2310dcc4976d069d1e6\"},\"headline\":\"Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2\",\"datePublished\":\"2020-05-18T04:26:47+00:00\",\"dateModified\":\"2025-03-19T09:45:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\"},\"wordCount\":880,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\",\"name\":\"Anatomy of a Cyber Attack \u2013 ICS ATT&CK Matrix \u2013 Part 2\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website\"},\"datePublished\":\"2020-05-18T04:26:47+00:00\",\"dateModified\":\"2025-03-19T09:45:32+00:00\",\"description\":\"Deciding on the counter measures is a significant step in designing the overall security concept of the plant. Starting from selecting the hardware...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/\",\"name\":\"Energy and Renewables\",\"description\":\"Yokogawa\",\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization\",\"name\":\"Energy and Renewables\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png\",\"contentUrl\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png\",\"width\":302,\"height\":89,\"caption\":\"Energy and Renewables\"},\"image\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/0bf50cfccfc1b2310dcc4976d069d1e6\",\"name\":\"Rudi Tester\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/image\/0b44e4d1ba5237e8c26b293a1660c476\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/72b34d08d8c5de4ae05f8ea29d24031e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/72b34d08d8c5de4ae05f8ea29d24031e?s=96&d=mm&r=g\",\"caption\":\"Rudi Tester\"},\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Anatomy of a Cyber Attack \u2013 ICS ATT&CK Matrix \u2013 Part 2","description":"Deciding on the counter measures is a significant step in designing the overall security concept of the plant. Starting from selecting the hardware...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/","og_locale":"en_US","og_type":"article","og_title":"Anatomy of a Cyber Attack \u2013 ICS ATT&CK Matrix \u2013 Part 2","og_description":"Deciding on the counter measures is a significant step in designing the overall security concept of the plant. Starting from selecting the hardware...","og_url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/","og_site_name":"Energy and Renewables","article_published_time":"2020-05-18T04:26:47+00:00","article_modified_time":"2025-03-19T09:45:32+00:00","og_image":[{"width":848,"height":565,"url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s.jpg","type":"image\/jpeg"}],"author":"Ashok Sadasivam","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#article","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/"},"author":{"name":"Rudi Tester","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/0bf50cfccfc1b2310dcc4976d069d1e6"},"headline":"Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2","datePublished":"2020-05-18T04:26:47+00:00","dateModified":"2025-03-19T09:45:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/"},"wordCount":880,"commentCount":0,"publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization"},"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/","name":"Anatomy of a Cyber Attack \u2013 ICS ATT&CK Matrix \u2013 Part 2","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website"},"datePublished":"2020-05-18T04:26:47+00:00","dateModified":"2025-03-19T09:45:32+00:00","description":"Deciding on the counter measures is a significant step in designing the overall security concept of the plant. Starting from selecting the hardware...","breadcrumb":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/counter-measures-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/"},{"@type":"ListItem","position":2,"name":"Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#website","url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/","name":"Energy and Renewables","description":"Yokogawa","publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#organization","name":"Energy and Renewables","url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png","contentUrl":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/yokogawa-logo-e1651674418793.png","width":302,"height":89,"caption":"Energy and Renewables"},"image":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/0bf50cfccfc1b2310dcc4976d069d1e6","name":"Rudi Tester","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/#\/schema\/person\/image\/0b44e4d1ba5237e8c26b293a1660c476","url":"https:\/\/secure.gravatar.com\/avatar\/72b34d08d8c5de4ae05f8ea29d24031e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72b34d08d8c5de4ae05f8ea29d24031e?s=96&d=mm&r=g","caption":"Rudi Tester"},"url":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/author\/admin\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s.jpg",848,565,false],"thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s-150x150.jpg",150,150,true],"medium":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s-768x512.jpg",768,512,true],"large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s.jpg",848,565,false],"1536x1536":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s.jpg",848,565,false],"2048x2048":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s.jpg",848,565,false],"post-thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/10\/2022\/09\/109323799_s-356x200.jpg",356,200,true]},"uagb_author_info":{"display_name":"Rudi Tester","author_link":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"In the previous article, Anatomy of a cyber attack- ICS Cyber Kill Chain-Part 1&#8211; we briefly went through the phases of a cyber attack and how an adversary can select their targets, initiate attacks, etc. The Cyber Kill Chain helps&hellip; Anatomy of a Cyber Attack \u2013 ICS ATT&#038;CK Matrix \u2013 Part 2 Read More &raquo;","_links":{"self":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts\/15124"}],"collection":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/comments?post=15124"}],"version-history":[{"count":1,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts\/15124\/revisions"}],"predecessor-version":[{"id":15125,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/posts\/15124\/revisions\/15125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/media\/14076"}],"wp:attachment":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/media?parent=15124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/categories?post=15124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/tags?post=15124"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/renewables\/en\/wp-json\/wp\/v2\/coauthors?post=15124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}