TY - CHAP
T1 - Open source intelligence for energy sector cyberattacks
AU - Keliris, Anastasis
AU - Konstantinou, Charalambos
AU - Sazos, Marios
AU - Maniatakos, Michail
N1 - Generated from Scopus record by KAUST IRTS on 2022-09-13
PY - 2019/1/1
Y1 - 2019/1/1
N2 - In March 2018, the U.S. DHS and the FBI issued a joint critical alert (TA18-074A) of an ongoing campaign by Russian threat actors targeting U.S. government entities and critical infrastructure sectors. The campaign targets critical infrastructure organizations mainly in the energy sector and uses, among other techniques, Open Source Intelligence (OSINT) to extract information. In an effort to understand the extent and quality of information that can be collected with OSINT, we shadow the threat actors and explore publicly available resources that can generate intelligence pertinent to power systems worldwide. We undertake a case study of a real, large-scale power system, where we leverage OSINT resources to construct the power system model, validate it, and finally process it for identifying its critical locations. Our goal is to demonstrate the feasibility of conducting elaborate studies leveraging public resources, and inform power system stakeholders in assessing the risks of releasing critical information to the public.
AB - In March 2018, the U.S. DHS and the FBI issued a joint critical alert (TA18-074A) of an ongoing campaign by Russian threat actors targeting U.S. government entities and critical infrastructure sectors. The campaign targets critical infrastructure organizations mainly in the energy sector and uses, among other techniques, Open Source Intelligence (OSINT) to extract information. In an effort to understand the extent and quality of information that can be collected with OSINT, we shadow the threat actors and explore publicly available resources that can generate intelligence pertinent to power systems worldwide. We undertake a case study of a real, large-scale power system, where we leverage OSINT resources to construct the power system model, validate it, and finally process it for identifying its critical locations. Our goal is to demonstrate the feasibility of conducting elaborate studies leveraging public resources, and inform power system stakeholders in assessing the risks of releasing critical information to the public.
UR - http://link.springer.com/10.1007/978-3-030-00024-0_14
UR - http://www.scopus.com/inward/record.url?scp=85068603288&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-00024-0_14
DO - 10.1007/978-3-030-00024-0_14
M3 - Chapter
SP - 261
EP - 281
BT - Advanced Sciences and Technologies for Security Applications
PB - Springer
ER -