How Attackers Attack

Depending on motives and skills, an attacker may or may not need to know the details of a control process to disrupt operations. For example, if the motive is simply to shut down the process, they need very little knowledge. However, if an attacker wants to attack a specific machine or process, they need to understand the application program.

Highly vulnerable processes include but are not limited to:

  • Data acquisition databases - Names of databases vary from supplier to supplier but a majority use a common naming convention with a unique number, for example, pump1, pump2, furnace1, breaker2. On the communications protocol level, the devices are simply referred to by number, memory location or register address. For a precise attack, the attacker must translate the numbers into meaningful information.

  • Human Machine Interfaces (HMI) or Supervisory Control and Data acquisition (SCADA) display screens - Gaining access to an HMIClosed The user interface of a device, for example, a keypad, screen or mouse screen is one method for understanding a process and the interaction between an operator and the equipment. The information on the screen allows an attacker to translate the reference numbers into something meaningful.

  • Infection of equipment - All devices use software to operate. This could be in the form of an operating system, for example, Microsoft Windows, or any firmware or operating system used in network equipment, a SCADA system, programmable automation controllers (PAC)s or cameras. If an attacker manages to modify this software, access to information is easy and very difficult to detect.

In the ICS-CERT Monitor April/May/June 2013 issue, it was reported that they received a report from a gas compressor station owner on February 22nd 2013, about increased brute force attempts to access their process control networkClosed The portion of the control system network where process data is transferred, including Supervisory Control and Data Acquisition (SCADA) to Programmable Automation Controller (PAC) traffic and PAC to PAC traffic. The Stuxnet virus is one the most well-known, largest and successful industrial attack reported, it was used to target PLC systems in Iran's nuclear program.

Select from the options below to display the details required:

Whether an incident is an accident or a deliberate attack, preparation is key. Disaster recovery methods should be developed and tested so that recovery from an outage or other events can be quickly and reliably managed. High availability and redundant architecture play a role in this area when even a short system outage cannot be tolerated.

Last update - February 2026