Threat Intelligence

OT Threat Intelligence: What CISOs Need to Know About ICS Threat Actors

January 29, 202610 min readBy Beacon Security Team

Why Generic Threat Intelligence Fails OT

The average CISO receives more threat intelligence in a week than they can meaningfully act on. Malware indicators, phishing campaigns, credential dumps, dark web chatter, CVE exploitability assessments, it arrives in volume, and most of it is genuinely useful for enterprise IT security teams managing endpoints, email, web proxies, and cloud environments.

For OT security, most of it is noise.

A threat briefing filled with phishing IOCs, ransomware command-and-control addresses, and credential stuffing activity does not inform decisions about PLC hardening, SCADA segmentation, or Safety Instrumented System protection. The threat landscape facing industrial control systems is different in character, and the intelligence required to understand it is specific. What sector does the attacker target? What industrial protocols do they know? Have they demonstrated capability against OT environments or just adjacent IT systems?

These are the questions that matter, and they require a different kind of intelligence. At Beacon Security, when we work with clients on OT threat intelligence programs, the first task is almost always pruning, helping teams distinguish the signal from the noise and focus on the actors and techniques that are actually relevant to their environment.

The Threat Actor Landscape

Several threat groups have been publicly attributed with OT-specific capabilities, active reconnaissance against industrial targets, or successful attacks on operational technology.

CHERNOVITE, The PIPEDREAM Developers

Think of CHERNOVITE as a capability-development organization as much as a threat actor. Tracked by Dragos and assessed to be a sophisticated nation-state group, they developed PIPEDREAM: the ICS attack framework disclosed by CISA and DOE in April 2022. PIPEDREAM is purpose-built for industrial environments, with modules targeting Schneider Electric Modicon PLCs, OMRON Sysmac controllers, Codesys runtimes, and OPC UA infrastructure.

What makes CHERNOVITE genuinely alarming is how they built this capability. PIPEDREAM does not exploit a single CVE that can be patched. It leverages the legitimate functionality of industrial protocols, Modbus, EtherNet/IP, FINS, to enumerate, authenticate against, and control industrial devices. Protocol features cannot be patched away. An attacker using PIPEDREAM looks, at the network level, like legitimate engineering traffic. If you do not know what legitimate engineering traffic looks like in your environment, you cannot tell the difference.

The fact that PIPEDREAM was disclosed before it was deployed in an actual attack is itself significant. The intelligence community had visibility into its development and staged the disclosure to maximize defender preparation time. The implication: there are likely comparable capability development efforts that have not yet been disclosed.

Defensive implication: Traditional signature-based detection has limited value against CHERNOVITE-style attacks. Detection requires behavioral analytics and communication baselining, knowing what normal looks like well enough to identify PIPEDREAM's reconnaissance and enumeration as anomalous before it becomes an incident.

ELECTRUM, The Industroyer Group

ELECTRUM earned its place in ICS security history by demonstrating that a cyberattack could cut the lights for an entire city. Assessed to be the group behind the 2015 and 2016 attacks on Ukrainian power distribution, and the 2022 Industroyer2 attack, ELECTRUM is associated by multiple researchers with Russia's GRU military intelligence.

The Industroyer malware framework was not abstract. It sent spoofed commands to substation equipment via IEC 104, IEC 101, and IEC 61850, standard protocols used in power distribution worldwide, and caused real outages affecting real people. What made Industroyer2, five years later, even more concerning was the update: the group had maintained, refined, and modernized their OT attack capability over half a decade. This is not a one-time exploit. This is an ongoing program.

ELECTRUM's targeting has focused on the energy sector, particularly electric power distribution. Their operational pattern suggests deliberate sector-specific capability development rather than opportunistic targeting.

Defensive implication: For electric utilities, monitoring for anomalous IEC 104, IEC 101, and IEC 61850 traffic is directly relevant. Communication baselining that detects unusual command sequences or control operations from unexpected sources is the primary detection layer.

XENOTIME, The TRITON Developers

XENOTIME holds a specific distinction: they are the only publicly attributed group to have deliberately targeted Safety Instrumented Systems with the apparent goal of disabling safety protections as part of an attack designed to cause physical catastrophe. The 2017 TRITON attack on a Saudi Arabian petrochemical facility was not about disruption or financial gain. The goal was to cause a physical incident, an explosion, a chemical release, and they were stopped not by a security control but by a coding error in their own malware that triggered a safety system shutdown before they intended.

Following the TRITON disclosure, XENOTIME was observed conducting reconnaissance activities against electric utilities in North America, Europe, Asia-Pacific, and Australia, scanning for remote access infrastructure and attempting to identify accessible OT devices. This is the preparatory work that precedes attacks, not something happening at a distance.

Their interest spans both petrochemical and electric utility sectors, and their demonstrated focus on safety systems makes them the highest-consequence threat to organizations operating Safety Instrumented Systems.

Defensive implication: Monitoring for reconnaissance activity targeting remote access infrastructure, SIS engineering workstations, and safety network communications is specifically relevant for XENOTIME defense. Isolating SIS networks and controlling access to safety system engineering tools are the most directly relevant defensive measures.

SANDWORM, The Broadest OT Capability

Attributed to Russia's GRU Unit 74455, Sandworm has demonstrated the broadest and most persistent OT capability of any publicly tracked threat group. In addition to the Industroyer attacks (ELECTRUM is assessed by some researchers as a Sandworm subgroup), Sandworm's attacks on Ukrainian energy infrastructure in 2022 combined cyber capabilities with coordinated missile strikes, a combined-arms operational model that rewrote assumptions about how cyber effects can be integrated with physical operations.

Ukraine has, in an important and grim sense, served as Sandworm's live testing environment. The techniques, operational timelines, and integration methods refined against Ukrainian infrastructure are assessed to be applicable against infrastructure in other countries. Every technique that worked in Kyiv is a potential template for somewhere else.

Defensive implication: For organizations in sectors and geographies that align with Russia's strategic interests, Sandworm's established pattern, living-off-the-land persistence in IT environments followed by deliberate lateral movement into OT, emphasizes the importance of robust IT/OT segmentation. An IT-side compromise cannot be allowed to translate automatically into OT access.

Ransomware Groups with OT Awareness

Beyond nation-state actors, several financially motivated groups have developed operational knowledge specific to industrial environments. Cl0p has targeted industrial manufacturers and exploited OT-adjacent file transfer systems. BlackBasta has encrypted manufacturing and energy sector OT management systems across multiple incidents. LockBit affiliates have specifically identified OT-related data, PLC configurations, SCADA projects, process documentation, for targeted exfiltration before encryption.

These groups do not have PIPEDREAM-level ICS capabilities, but they understand OT environments well enough to maximize disruption and payment pressure. Their targeting of OT management systems, historian servers, engineering workstations, SCADA servers, rather than PLCs directly shows growing operational sophistication. They are learning.

Consuming and Operationalizing OT Threat Intelligence

Understanding which actors exist is valuable context. Translating that into specific security controls and detection investments is the work that actually makes organizations safer.

Map Actors to Your Sector and Geography

Not every threat actor is equally relevant to your situation. Begin by mapping which threat actors have demonstrated targeting of your specific sector, which actors have been active in your geographic region, and which actors' techniques align with vulnerabilities present in your specific OT environment.

This mapping produces a prioritized threat model: the two or three actor profiles most relevant to your situation. Security investments should be weighted toward detecting and disrupting those specific actors' techniques rather than responding to a generic threat landscape. A water utility and a natural gas pipeline face very different threat prioritizations, and their security programs should reflect that.

Use ATT&CK for ICS as an Organizing Framework

MITRE ATT&CK for ICS provides a structured framework for mapping threat actor techniques to specific defense and detection requirements. Each CHERNOVITE, ELECTRUM, and XENOTIME technique has a corresponding ATT&CK for ICS entry with detection recommendations and mitigation mappings.

The practical exercise: which of these techniques can you currently detect? Which would succeed against your environment undetected? The gaps in your detection coverage, mapped against the techniques used by the actors most relevant to your situation, define your highest-priority detection development work. This is a concrete, actionable way to turn threat intelligence into a security roadmap.

Integrate Sector-Specific Intelligence Feeds

Several sources provide OT-specific threat intelligence that is significantly more actionable than generic commercial feeds:

  • CISA ICS-CERT alerts and advisories often include actor attribution and specific defensive guidance
  • Dragos Year in Review provides annual reporting on OT threat groups, their activities, and sector targeting patterns
  • E-ISAC / WaterISAC and downstream ISACs facilitate sector-specific sharing relevant to your industry
  • OT vendor security portals provide intelligence on attacks targeting their specific platforms

For most organizations, consuming these sources systematically provides better OT threat intelligence coverage than subscribing to generic commercial feeds that were built for enterprise IT environments.

From Intelligence to Detection

The final step, and the one where most programs stall, is converting threat intelligence into specific detection rules and monitoring configurations. For each relevant threat actor technique, the questions are: What data source would capture activity associated with this technique? Network traffic? Authentication logs? Process historian? OT monitoring platform alerts? What specific pattern would indicate execution of this technique versus normal operations? And what is the response action when an alert fires?

This translation from intelligence to detection to response is the work that converts threat awareness into operational security capability. It requires engineers who understand both the threat and the industrial environment well enough to build detection logic that is sensitive to the threat without flooding analysts with false positives from normal operational activity. That is genuinely specialized work, and at Beacon Security, it is where we spend the most time when helping clients build OT threat intelligence programs that actually function in practice, not just in policy documents.


Beacon Security provides OT threat intelligence analysis, ATT&CK for ICS mapping, and threat-informed detection development for industrial environments in critical infrastructure sectors. Contact us to build a threat intelligence program tailored to your sector and environment.

Industrial infrastructure
OT Cybersecurity Experts

Your OT Environment Deserves
Expert Protection

IT security tools were not built for Modbus, OPC, or safety-rated controllers. Get a dedicated OT cybersecurity team that understands industrial protocols, control system architecture, and the operational constraints of your environment.

IEC/ISA 62443 Aligned
NIST 800-82 Compliant
OTCC Ready
ECC Aligned
Zero Operational Disruption