● PERFORMANCE-BASED QUESTION

Activity: Threat Intelligence
Water Treatment ICS Incident

You're a cybersecurity intelligence analyst investigating an intrusion at a water treatment plant. Read the scenario, then use the dropdown selectors to analyze the incident across the MITRE ATT&CK kill chain, conduct threat hunting, and harden the network against future attacks.

Instructions

Based on the scenario, use the dropdown selectors to select the best option to analyze the threat incident, conduct threat hunting, and harden the network against threat vectors.

STAGE 01

Initial Access

Initial access could have been prevented by . Management should also .

STAGE 02

Execution

can prevent execution through API. based IAM, requiring multifactor authentication, and strong before executing code are also recommended by MITRE ATT&CK as mitigations in the execution phase.

STAGE 03

Privilege Escalation

In the scenario, escalation to system-level access privileges was accomplished by directly accessing hardware modules through API hooking. First, any must be . If the servers are Windows-based, must be .

STAGE 04

Evasion

Mitigations such as or may have prevented unknown code from executing or masquerading as good code.

STAGE 05

Command and Control (C2)

Command and control was achieved by obtaining access through commonly used ports, which could be prevented by .

STAGE 06

Persistence and Lateral Movement

Mitigations for preventing persistent access and lateral movement through abusing valid accounts include or a change to the . Secure verification of may have protected the module firmware.

STAGE 07

Impair Process Controls and Inhibit Response Function

Inhibiting security response via alarm suppression could have been mitigated by setting up a(n) . The intruders attempted to impair process control with report spoofing. Module firmware replacement may have been detected with the use of .

0/14