BLACK HAT USA – Las Vegas – A team of ICS experts who spent the past year studying and recreating the so-called TRITON/TRISIS malware that targeted a Schneider Electric safety instrumented system (SIS) at an oil & gas petrochemical plant have developed open-source tools for detecting it. Researchers from Nozomi Networks here today, along with independent ICS expert Marina Krotofil, previously with FireEye, demonstrated how the malware works, as well as a simulation of how it could be used to wage a destructive attack.
Read full news article on Dark Reading