Threat Intelligence

OT Threat Intelligence: What CISOs Need to Know About ICS Threat Actors

August 1, 202510 min readBy Beacon Security Team

Why Generic Threat Intelligence Fails OT

The threat intelligence market produces enormous volumes of information: malware indicators, phishing campaigns, credential dumps, dark web discussions, CVE exploitability assessments. This intelligence is valuable for enterprise IT security teams managing endpoints, email, web proxies, and cloud environments.

For OT security, much of it is noise. A CISO receiving weekly threat briefings filled with phishing IOCs, ransomware C2 addresses, and credential stuffing activity is not receiving intelligence that informs decisions about PLC hardening, SCADA segmentation, or SIS protection. The threat landscape facing industrial control systems is different in character, and the intelligence required to understand it is specific.

OT-relevant threat intelligence focuses on actors with demonstrated capability against or interest in industrial control systems, the techniques they use to interact with OT environments, and the targeting patterns that indicate which sectors and geographies face the highest risk.

The Threat Actor Landscape

Several threat groups have been publicly attributed with OT-specific capabilities, active reconnaissance against industrial targets, or successful attacks on operational technology systems.

CHERNOVITE — The PIPEDREAM Developers

Tracked by Dragos and assessed to be a sophisticated nation-state group, CHERNOVITE developed PIPEDREAM — the ICS attack framework disclosed by CISA and DOE in April 2022. PIPEDREAM is purpose-built for industrial environments, with modules targeting Schneider Electric Modicon PLCs, OMRON Sysmac controllers, Codesys runtimes, and OPC UA infrastructure.

What distinguishes CHERNOVITE from most cyber threat actors is the nature of their capability development. PIPEDREAM does not exploit a single CVE. It leverages the legitimate functionality of industrial protocols — Modbus, EtherNet/IP, FINS — to enumerate, authenticate against (via brute force), and control industrial devices. This approach is more durable than CVE exploitation because protocol features cannot be patched away.

PIPEDREAM was disclosed before it was deployed in an attack, which is itself significant: the intelligence community had visibility into its development and staged its disclosure to maximize defender preparation time. This suggests there may be comparable capability development efforts that have not been disclosed.

Defensive implication: Traditional signature-based detection has limited value against CHERNOVITE-style attacks because the activity resembles legitimate engineering traffic. Detection requires behavioral analytics and communication baselining — knowing what normal looks like well enough to identify PIPEDREAM's reconnaissance and enumeration as anomalous.

ELECTRUM — The Industroyer Group

ELECTRUM is assessed to be the threat group behind the 2015 and 2016 attacks on Ukrainian power distribution, and the 2022 Industroyer2 attack. The group is associated by multiple researchers with Russia's GRU military intelligence.

The Industroyer/CrashOverride malware framework demonstrated that ICS-targeted attacks could cause physical consequences at scale. The attacks cut power to portions of Kyiv by sending spoofed commands to substation equipment via IEC 104, IEC 101, and IEC 61850 — standard protocols used in power distribution. Industroyer2 showed that the group had modernized and maintained its OT attack capability five years after the original attacks.

ELECTRUM's targeting has focused on the energy sector, particularly electric power distribution infrastructure. Their operational pattern suggests sector-specific capability development rather than opportunistic targeting.

Defensive implication: For electric utilities, monitoring for anomalous IEC 104, IEC 101, and IEC 61850 traffic is directly relevant to defending against ELECTRUM-style attacks. Communication baselining that detects unusual command sequences or control operations from unexpected sources is the primary detection layer.

XENOTIME — The TRITON Developers

XENOTIME (Dragos designation) is the group responsible for the TRITON attack on Safety Instrumented Systems at a Saudi Arabian petrochemical facility in 2017. The attack demonstrated intent to disable safety protections as part of an attack designed to cause physical catastrophe — a qualitatively different objective from disruption or ransomware.

Following the TRITON disclosure, XENOTIME was observed conducting reconnaissance activities against electric utilities in North America, Europe, Asia-Pacific, and Australia. The reconnaissance included scanning for remote access infrastructure and attempting to identify accessible OT devices — consistent with preparatory activity for potential future attacks rather than immediate action.

XENOTIME's targeting of both petrochemical and electric utility sectors suggests broader critical infrastructure interest beyond any single industry. The group's demonstrated safety system focus makes them the highest-consequence threat to organizations operating Safety Instrumented Systems.

Defensive implication: Monitoring for reconnaissance activity targeting remote access infrastructure, SIS engineering workstations, and safety network communications is specifically relevant for XENOTIME defense. Hardening remote access, isolating SIS networks, and controlling access to safety system engineering tools are the most directly relevant defensive measures.

SANDWORM — The Broadest OT Capability

Sandworm, attributed to Russia's GRU Unit 74455, has demonstrated the broadest and most persistent OT capability of any publicly tracked threat group. In addition to the Industroyer attacks via ELECTRUM (assessed by some researchers as a Sandworm subgroup), Sandworm has been linked to attacks on Ukrainian energy infrastructure in 2022 that combined cyber capabilities with missile strikes — a combined-arms operational model with no precedent in cybersecurity.

Sandworm's activity in Ukraine has served as a live testing environment for OT attack techniques, operational timelines, and the integration of cyber effects with physical operations. The techniques refined against Ukrainian infrastructure are assessed to be applicable against infrastructure in other countries.

Defensive implication: For organizations in sectors and geographies that align with Russia's strategic interests, Sandworm's observed techniques — living-off-the-land persistence in IT environments followed by deliberate OT targeting — emphasize the importance of robust IT/OT segmentation that limits an IT-side compromise from translating into OT access.

Ransomware Groups with OT Awareness

Beyond nation-state actors, several ransomware and financially motivated groups have demonstrated operational knowledge specific to industrial environments:

  • Cl0p has targeted industrial manufacturers and exploited OT-adjacent file transfer systems
  • BlackBasta encrypted manufacturing and energy sector OT management systems in multiple incidents
  • LockBit affiliates have specifically identified OT-related data (PLC configurations, SCADA projects, process documentation) for targeted exfiltration before encryption

These groups do not have PIPEDREAM-level ICS-specific capabilities, but they understand OT environments well enough to maximize disruption and payment pressure. Their targeting of OT management systems — historian servers, engineering workstations, SCADA servers — rather than PLCs directly shows growing operational sophistication.

Consuming and Operationalizing OT Threat Intelligence

Understanding which groups exist is valuable context. Translating that understanding into specific security controls and detection investments requires operationalization.

Map Actors to Your Sector and Geography

Not every threat actor is equally relevant to your specific situation. Begin by mapping:

  • Which threat actors have demonstrated targeting of your sector (energy, oil and gas, water, manufacturing, chemical)?
  • Which actors have been active in your geographic region?
  • Which actors' techniques align with vulnerabilities in your specific OT environment?

This mapping produces a prioritized threat model: the two or three actor profiles most relevant to your situation. Security investments should be weighted toward detecting and disrupting those specific actors' techniques rather than responding to a generic threat landscape.

Use ATT&CK for ICS as an Organizing Framework

MITRE ATT&CK for ICS provides a structured framework for mapping threat actor techniques to specific defense and detection requirements. Each CHERNOVITE, ELECTRUM, and XENOTIME technique has a corresponding ATT&CK for ICS entry with detection recommendations and mitigation mappings.

Using ATT&CK for ICS as an organizing framework, answer: which of these techniques can you currently detect? Which would succeed against your environment undetected? The gaps in your detection coverage, mapped against the techniques used by the actors most relevant to your situation, define your highest-priority detection development work.

Integrate Sector-Specific Intelligence Feeds

Several sources provide OT-specific threat intelligence that is significantly more actionable than generic feeds:

  • CISA ICS-CERT alerts and advisories: Often include actor attribution and specific defensive guidance
  • Dragos Year in Review: Annual reporting on OT threat groups, their activities, and sector targeting patterns
  • E-ISAC / WaterISAC / downstream ISACs: Sector-specific sharing of intelligence relevant to your industry
  • OT vendor security portals: Vendor-specific intelligence on attacks targeting their platforms

For most organizations, consuming these sources systematically provides better OT threat intelligence coverage than subscribing to generic commercial feeds.

From Intelligence to Detection

The final step is converting threat intelligence into specific detection rules and monitoring configurations. For each relevant threat actor technique:

  • What data source would capture activity associated with this technique? (Network traffic? Authentication logs? Process historian? OT monitoring platform alerts?)
  • What specific pattern would indicate execution of this technique versus normal operations?
  • What is the response action when an alert fires?

This translation — from intelligence to detection to response — is the work that converts threat awareness into operational security capability. It requires OT security engineers who understand both the threat and the industrial environment well enough to build detection logic that is sensitive to the threat without flooding analysts with false positives from normal operational activity.


Beacon Security provides OT threat intelligence analysis, ATT&CK for ICS mapping, and threat-informed detection development for industrial environments in critical infrastructure sectors. Contact us to build a threat intelligence program tailored to your sector and environment.

Industrial infrastructure
OT Cybersecurity Experts

Your OT Environment Deserves
Expert Protection

IT security tools were not built for Modbus, OPC, or safety-rated controllers. Get a dedicated OT cybersecurity team that understands industrial protocols, control system architecture, and the operational constraints of your environment.

IEC/ISA 62443 Aligned
NIST 800-82 Compliant
OTCC Ready
ECC Aligned
Zero Operational Disruption