Skip to content

ICS Security: A Case Study with Red Eléctrica

Home News & Blogs ICS Security: A Case Study with Red Eléctrica

Cyber attacks on critical infrastructure and industrial control systems (ICS) are on the rise. In 2022, 605 major ransomware attacks targeting industrial organizations were detected, marking an 87% increase compared to the previous year. What’s also concerning is that 83% of the total analyzed vulnerabilities reside deep within industrial control systems. In fact, Gartner predicts 30% of critical infrastructure organizations will experience a security breach by 2025.

 

Red Eléctrica Uses Deception in their ICS Security Strategy

With those kinds of odds Red Eléctrica (REE), the national electricity grid in Spain, understood that taking a proactive cyber defense strategy is essential. Red Eléctrica wanted to detect cyber threats targeting their OT/industrial control systems while collecting intel on the IoCs and TTPs threat actors use to prevent future attacks.

cc-ree-ot-attacks-case-study

Download our latest whitepaper to find out how Red Eléctrica detects system attacks in real time.

 

In this case study, you will see a real life example of how Red Eléctrica was able to detect OT systems attacks before a breach occurred. Red Eléctrica, a CounterCraft client, contracted CounterCraft The Platform in order to gain visibility on what would happen if a configuration error exposed the access to the Internet via VPN to the substation.

 

“CounterCraft is a very important tool for us that helps us prioritize real vulnerabilities, obtaining TTPs, IoCs and metrics we wouldn’t be able to get any other way”

– Mario Castro, Head of Telecommunications of Red Eléctrica

 

Download the case study to see how CounterCraft delivered valuable, real-world threat intelligence including TTPs and IoCs to Red Electrica by creating a physical communication rack that mimicked their real electrical substation and how CounterCraft The Platform proved to be highly impactful for Red Eléctrica’s security team.