The kill chain diagram below is a simplified version of the full attack path. Multi-stage TRITON kill chain showing initial compromise of IT network (step 0) and subsequent compromise of OT network and safety controllers (steps 1-3). The adversary initially compromised the corporate IT network...
TheTRITON attack on a petrochemical facilityis illustrative of how adversaries leverage living-off-the-land tactics and vulnerabilities to move laterally from IT to OT networks and compromise industrial control systems. The kill chain diagram below is a simplified version of the full attack path. Mul...