
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OT Attacks Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/category/attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/category/attacks/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Mon, 24 Mar 2025 14:43:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>OT Attacks Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/category/attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Volt Typhoon Hackers Dwelled in US Electric for 300+ Days: Report</title>
		<link>https://www.icscybersecurityconference.com/volt-typhoon-hackers-dwelled-in-us-electric-for-300-days-report/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Fri, 14 Mar 2025 14:39:11 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[grid]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20285</guid>

					<description><![CDATA[<p>Dragos shared some details describing an intrusion attributed to the notorious Chinese threat actor Volt Typhoon into the US electric grid.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/volt-typhoon-hackers-dwelled-in-us-electric-for-300-days-report/">Volt Typhoon Hackers Dwelled in US Electric for 300+ Days: Report</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Water Treatment Facility in Arkansas City Switches to Manual Mode After Suspected Cyberattack</title>
		<link>https://www.icscybersecurityconference.com/water-treatment-facility-in-arkansas-city-switches-to-manual-mode-after-suspected-cyberattack/</link>
		
		<dc:creator><![CDATA[News Team]]></dc:creator>
		<pubDate>Wed, 25 Sep 2024 10:36:37 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[water]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20201</guid>

					<description><![CDATA[<p>Arkansas City said a cybersecurity issue at its Water Treatment Facility on September 22, 2024 forced the facility to switch to manual operations.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/water-treatment-facility-in-arkansas-city-switches-to-manual-mode-after-suspected-cyberattack/">Water Treatment Facility in Arkansas City Switches to Manual Mode After Suspected Cyberattack</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Iran-Linked &#8220;Cyber Av3ngers&#8221; Hackers Compromise Control System at Pennsylvania Water Utility </title>
		<link>https://www.icscybersecurityconference.com/iran-linked-cyber-av3ngers-hackers-compromise-control-system-at-pennsylvania-water-utility/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 14:12:34 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[water]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20107</guid>

					<description><![CDATA[<p>Iran-Linked "Cyber Av3ngers" hackers compromised an industrial control system at the Municipal Water Authority of Aliquippa (MWAA) in Pennsylvania.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/iran-linked-cyber-av3ngers-hackers-compromise-control-system-at-pennsylvania-water-utility/">Iran-Linked &#8220;Cyber Av3ngers&#8221; Hackers Compromise Control System at Pennsylvania Water Utility </a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Russian Sandworm Hackers Target Ukraine&#8217;s Power Grid in Coordinated Cyber-Physical Attack</title>
		<link>https://www.icscybersecurityconference.com/russian-sandworm-hackers-target-ukraines-power-grid-in-coordinated-cyber-physical-attack/</link>
		
		<dc:creator><![CDATA[News Team]]></dc:creator>
		<pubDate>Thu, 09 Nov 2023 11:31:59 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20105</guid>

					<description><![CDATA[<p>Russia’s Sandworm hackers disrupted power in Ukraine using a novel attack against operational technology (OT) coordinated with missile strikes.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/russian-sandworm-hackers-target-ukraines-power-grid-in-coordinated-cyber-physical-attack/">Russian Sandworm Hackers Target Ukraine&#8217;s Power Grid in Coordinated Cyber-Physical Attack</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Deep Dive: PIPEDREAM/Incontroller ICS Attack Framework</title>
		<link>https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/</link>
					<comments>https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Sat, 10 Dec 2022 16:01:23 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19359</guid>

					<description><![CDATA[<p>In this session, Mark Plemmons, Sr. Director for Threat Intelligence at Dragos, dives deep into the technical details and real-world impact on the modular ICS attack framework known as PIPEDREAM/Incontroller</p>
<p>The post <a href="https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/">Deep Dive: PIPEDREAM/Incontroller ICS Attack Framework</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/deep-dive-pipedream-incontroller-ics-attack-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Researchers Use IoT and IT to Deliver Ransomware Attack Against OT</title>
		<link>https://www.icscybersecurityconference.com/researchers-use-iot-and-it-to-deliver-ransomware-attack-against-ot/</link>
					<comments>https://www.icscybersecurityconference.com/researchers-use-iot-and-it-to-deliver-ransomware-attack-against-ot/#respond</comments>
		
		<dc:creator><![CDATA[News Team]]></dc:creator>
		<pubDate>Wed, 01 Jun 2022 14:22:37 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19300</guid>

					<description><![CDATA[<p>Critical industries must prepare themselves for a new wave of ransomware attacks specifically targeting OT</p>
<p>The post <a href="https://www.icscybersecurityconference.com/researchers-use-iot-and-it-to-deliver-ransomware-attack-against-ot/">Researchers Use IoT and IT to Deliver Ransomware Attack Against OT</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/researchers-use-iot-and-it-to-deliver-ransomware-attack-against-ot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Colonial Pipeline Still Mostly Offline After Ransomware Attack</title>
		<link>https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/</link>
					<comments>https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 10 May 2021 10:19:48 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=14291</guid>

					<description><![CDATA[<p>The Colonial Pipeline is working on a restart plan after a ransomware attack triggered the company to halt all pipeline operations on May 7, 2021.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/">Colonial Pipeline Still Mostly Offline After Ransomware Attack</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/colonial-pipeline-still-mostly-offline-after-ransomware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Past &#038; Future of Integrity Attacks in ICS Environments (Video)</title>
		<link>https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/</link>
					<comments>https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 14 Jan 2020 19:28:40 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[attacks]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=4250</guid>

					<description><![CDATA[<p>Integrity-based attacks can produce significant impacts through undermining a physical process and calling into doubt the viability of a specific facility.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/">The Past &#038; Future of Integrity Attacks in ICS Environments (Video)</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/the-past-future-of-integrity-attacks-in-ics-environments-video/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Growing Threat of Drones</title>
		<link>https://www.icscybersecurityconference.com/the-growing-threat-of-drones/</link>
					<comments>https://www.icscybersecurityconference.com/the-growing-threat-of-drones/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 11:12:59 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[dones]]></category>
		<category><![CDATA[facility]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=1841</guid>

					<description><![CDATA[<p>Drones are an increasing threat to industrial sites, enabling various attacks (cyber and physical) that historically were only possible in close proximity to a facility or device.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/the-growing-threat-of-drones/">The Growing Threat of Drones</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/the-growing-threat-of-drones/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Side-Channel Attacks Put Critical Infrastructure at Risk</title>
		<link>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/</link>
					<comments>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 05 Nov 2018 13:52:26 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[CPU]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[electric]]></category>
		<category><![CDATA[grid]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[power]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[Side-Channel]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1730</guid>

					<description><![CDATA[<p>ICS Devices Vulnerable to Side-Channel Attacks: Researcher Shows (Eduard Kovacs &#8211; SecurityWeek)  Side-channel attacks can pose a serious threat to industrial control systems (ICS), a researcher warned last month at SecurityWeek’s ICS Cyber Security Conference in Atlanta, GA. Demos Andreou, a lead engineer at power management company Eaton, has conducted an analysis of protection devices typically used in the energy sector, specifically in power distribution stations. Side-channel attacks can be used to extract data from a system based on information [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/">Side-Channel Attacks Put Critical Infrastructure at Risk</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
