{"id":27332,"date":"2019-06-17T14:40:00","date_gmt":"2019-06-17T14:40:00","guid":{"rendered":"https:\/\/www.darkreading.com\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/d\/d-id\/1334977"},"modified":"2019-06-17T14:40:00","modified_gmt":"2019-06-17T14:40:00","slug":"utilities-nations-need-better-plan-against-critical-infrastructure-attackers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/","title":{"rendered":"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header>\n<\/header>\n<p><span class=\"strong black\">The attackers behind the Triton, or Xenotime, intrusions into critical infrastructure (CI) safety systems are testing their skills against electric power companies. Options for defense are still limited, however.<\/span> <\/p>\n<p class=\"p1\">In February 2019, the group behind the Triton attack on oil and gas companies changed their tactics: The group started scanning electric utility companies for vulnerabilities, according to critical infrastructure security firm Dragos.<\/p>\n<p class=\"p2\">The switch in targeting is the first publicly known instance of a group behind a specific critical infrastructure attack targeting multiple infrastructures, says Sergio Caltagirone, vice president of threat intelligence for Dragos. The capability to attack <a href=\"https:\/\/www.darkreading.com\/perimeter\/triton-attackers-seen-scanning-us-power-grid-networks\/d\/d-id\/1334968\" target=\"_blank\" rel=\"noopener noreferrer\">more than one target<\/a> suggests the actors in the group have become more sophisticated and better-funded, he says.<\/p>\n<p class=\"p2\">&#8220;The challenge is that for as long as we have been tracking industrial threats, the threats have effectively stayed in their own silo,&#8221; Caltagirone says. &#8220;They have either been geographically focused or sector-specific, and the reason is that it costs so much time and resources to attack one specific sector of industrial that there really hasn&#8217;t been any publicly known group that has been able to cross over.&#8221;<\/p>\n<p class=\"p2\">The problem is that, while attackers have increased their capabilities, defenders still remain stuck with a limited number of tools\u2014both technological and political\u2014to dissuade the attacks on their networks. Most governments and companies targeted by such attacks are left with a single option: Learn about the attackers and then kick them out of the infrastructure.&nbsp;<\/p>\n<p class=\"p2\">&#8220;We need a strategic response,&#8221; Caltagirone says. &#8220;There has to be some sort of recognition that we are all in the same space, and we have to somehow find a way to put pressure on them to stop.&#8221;<\/p>\n<p class=\"p2\">Critical infrastructure owners have a harder cybersecurity problem than most companies. Creating a reliable infrastructure has always been a priority, and that means not creating chaos with major changes or software updates. For that reason, industrial devices and critical infrastructure are designed to be deployed for decades rather than years, making the standard software security approach of frequent updates more a logistical nightmare, said Tim Mackey, principal security strategist at Synopsys.<\/p>\n<p class=\"p2\">&#8220;With digital sensors and computing devices within industrial plants having lifespans far exceeding those of commercial devices, a comprehensive patch management strategy designed with a detailed understanding of the software supply chain powering these devices is a critical component of ongoing threat mitigation,&#8221; he said in a statement.<\/p>\n<p class=\"p2\">For the most part, critical infrastructure companies keep watch on adversaries by passing around indicators of compromise (IOCs) among themselves through information sharing and analysis centers (ISACs). With adversaries changing their tactics frequently, however, they need to do more.&nbsp;<\/p>\n<p class=\"p2\">&#8220;We have to get beyond IOCs\u2014we have to, have to, have to,&#8221; Dragos&#8217;s Caltagirone says. &#8220;We have to start monitoring and identifying behavior. Because over time, over a year plus, these adversaries&#8217; (tools) are going to change so many times, it will be nearly impossible to protect yourself.&#8221;<\/p>\n<p class=\"p2\">On the national level, despite the constant attacks on critical infrastructure, strategic options to dissuade such attacks seem in short supply. In 2018, the U.S. Department of Justice, for example, continued to use legal tools against such attackers, indicting both Russian and Chinese actors for <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/mueller-probe-yields-hacking-indictments-for-12-russian-military-officers\/d\/d-id\/1332297\" target=\"_blank\" rel=\"noopener noreferrer\">attacking election infrastructure<\/a> and <a href=\"https:\/\/www.darkreading.com\/network-and-perimeter-security\/us-indicts-2-apt10-members-for-years-long-hacking-campaign\/d\/d-id\/1333535\" target=\"_blank\" rel=\"noopener noreferrer\">private industry<\/a>, respectively. The U.S. has imposed sanctions against both countries as well.<\/p>\n<p class=\"p2\">Nations and their critical industries need to go beyond those measures and cooperate on both limiting critical infrastructure attacks and improving defenses against such measures.&nbsp;<\/p>\n<p class=\"p2\">&#8220;There has to be a defender that is not just the utility\u2014meaning governments, transnational organizations, industry sharing groups, and so forth,&#8221; Caltagirone says. &#8220;You can&#8217;t have, say, Idaho protect against the Russians and have Mississippi have to do the same\u2014that is an untenable request to make, and we don&#8217;t make that request in any other domain.&#8221;<\/p>\n<p class=\"p2\">For now, the intent of attackers\u2014most of which are likely rival countries\u2014is to find their way into targets of interest, according to Caltagirone. This activity, called &#8220;access operations,&#8221; teaches attackers a great deal about the targets of interest and what countermeasures the defenders are deploying.&nbsp;<\/p>\n<p class=\"p2\">&#8220;What they are doing right now is very intelligent. This is what a mature organizations does\u2014they take the time to figure out what organizations they want to beat,&#8221; he says.<\/p>\n<p class=\"p2\">Yet, in the end, if we don&#8217;t figure out a way to deal with the attackers\u2014whether through technology or policy or both\u2014then the outcome is grim, Caltagirone says. &#8220;If we don&#8217;t accept that understanding of the world and defend in that way, the adversary is going to walk right through all our defenses,&#8221; he says.<\/p>\n<p class=\"p2\">&nbsp;<\/p>\n<p class=\"p1\"><strong>Related Content<\/strong><\/p>\n<p><span class=\"italic\">Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT&#8217;s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1161\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/d\/d-id\/1334977?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The attackers behind the Triton, or Xenotime, intrusions into critical infrastructure (CI) safety systems are testing their skills against electric power companies. Options for defense are still limited, however. Read More <a href=\"https:\/\/www.darkreading.com\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/d\/d-id\/1334977?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-27332","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-17T14:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers\",\"datePublished\":\"2019-06-17T14:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/\"},\"wordCount\":835,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/\",\"name\":\"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"datePublished\":\"2019-06-17T14:40:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/","og_locale":"en_US","og_type":"article","og_title":"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-17T14:40:00+00:00","og_image":[{"url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers","datePublished":"2019-06-17T14:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/"},"wordCount":835,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/","url":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/","name":"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","datePublished":"2019-06-17T14:40:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#primaryimage","url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","contentUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/utilities-nations-need-better-plan-against-critical-infrastructure-attackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27332"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27332\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}