{"id":55943,"date":"2024-04-25T16:00:00","date_gmt":"2024-04-25T16:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/"},"modified":"2024-04-25T16:00:00","modified_gmt":"2024-04-25T16:00:00","slug":"investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/","title":{"rendered":"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework"},"content":{"rendered":"<p><span data-contrast=\"none\">Industrial Control Systems (ICS) security has been a subject of research for many years, spurred, in part, by recent <\/span><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2023-12\/aa23-335a-irgc-affiliated-cyber-actors-exploit-plcs-in-multiple-sectors-1.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><span data-contrast=\"none\">state-sponsored ICS-targeting malware<\/span><\/a><span data-contrast=\"none\"> and supply-chain attacks like the <\/span><a href=\"https:\/\/edition.cnn.com\/2024\/03\/07\/politics\/congressional-probe-communications-gear-chinese-cranes\/index.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><span data-contrast=\"none\">ZPMC cranes spying concerns<\/span><\/a> <span data-contrast=\"none\">that threaten critical infrastructure. Given the potential harm to thousands of people if water treatment facilities, power plants and nuclear reactors or other systems are breached, the stakes are high. Unfortunately, forensics for ICS devices is not as advanced as in IT environments like Windows and Linux. This can stall forensics investigation when incidents occur.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">To overcome this challenge, Microsoft released <\/span><a href=\"https:\/\/github.com\/microsoft\/ics-forensics-tools\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">ICSpector<\/span><\/a><span data-contrast=\"none\">, <\/span><span data-contrast=\"none\">an open-source framework that facilitates the examination of the information and configurations of industrial programmable logic controllers (PLCs). This framework simplifies the process of locating PLCs and detecting any anomalous indicators that are compromised or manipulated. This can assist you in safeguarding the PLCs from adversaries who intend to harm or disrupt their operations.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Many operational technology (OT) security tools based on network layer monitoring, such as<\/span> <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/endpoint-security\/microsoft-defender-iot\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Microsoft Defender for IoT<\/span><\/a><span data-contrast=\"none\">, <\/span><span data-contrast=\"none\">provide network protection for OT\/IoT environments, allowing analysts to discover their devices and respond to alerts on vulnerabilities and anomalous behavior. <span class=\"TextRun SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">However, o<\/span><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">ne of the biggest challenges is<\/span><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\"> retrieving the code<\/span> <span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">running on the <\/span><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">PLC and scanning it as part of an incident response<\/span> <\/span><span class=\"TrackedChange SCXW238819293 BCX8\"><span class=\"TextRun Highlight SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">to understand if it was tampered <\/span><\/span><\/span><span class=\"TextRun Highlight SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">with<\/span><\/span><span class=\"TrackedChange SCXW238819293 BCX8\"><span class=\"TextRun Highlight SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">. <\/span><\/span><\/span><span class=\"TrackedChange SCXW238819293 BCX8\"><span class=\"TextRun Highlight SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">T<\/span><\/span><\/span><span class=\"TrackedChange SCXW238819293 BCX8\"><span class=\"TextRun Highlight SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">his<\/span><\/span><\/span> <span class=\"TrackedChange SCXW238819293 BCX8\"><span class=\"TextRun Highlight SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">act<\/span><\/span><\/span><span class=\"TextRun SCXW238819293 BCX8\" data-contrast=\"none\"> <span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">requires <\/span><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">caution, because<\/span> <\/span><span class=\"TrackedChange SCXW238819293 BCX8\"><span class=\"TextRun Highlight SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">the PLCs are actively <\/span><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">operating<\/span><\/span><\/span><span class=\"TextRun SCXW238819293 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\"> vital industrial <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">process<\/span><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">. <\/span><span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">This is where <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">I<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">CSpector<\/span> <span class=\"NormalTextRun SCXW238819293 BCX8\" data-ccp-parastyle=\"Normal (Web)\">can help individuals or facilities perform this task with best practices.<\/span><\/span><\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><strong><span data-contrast=\"none\">Industrial control systems in brief<\/span><\/strong><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/p>\n<p><span data-contrast=\"none\">Industrial Control Systems (ICS) and Operational Technology (OT) are critical to modern society, powering everything from power grids and water treatment plants to manufacturing facilities and transportation systems. These systems typically rely on a combination of hardware and software components to perform their functions. Programmable logic controllers (PLCs) are used to manage and control the various processes within an industrial environment. As these systems become increasingly digitized and interconnected, they are also becoming more vulnerable to cyberattacks.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Due to their critical role in ensuring the smooth operation of industrial processes, and the physical danger or extreme financial losses that could result if attacked, ICS devices are prime targets of cyberattacks, making ICS security an increasingly critical issue in today&#8217;s digital landscape.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\" image-alt=\"Figure 1: Known ICS-targeted cyberattacks that occurred between 2010 and 2022. (Image from Cyber Signals: Risks to critical infrastructure on the rise)\"><img decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573399iC99A4EA4BFD56F6A\/image-size\/large?v=v2&amp;px=999\" role=\"button\" title=\"Trevor_Rusher_0-1713824232931.jpeg\" alt=\"Figure 1: Known ICS-targeted cyberattacks that occurred between 2010 and 2022. (Image from Cyber Signals: Risks to critical infrastructure on the rise)\" li-image-url=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573399iC99A4EA4BFD56F6A?v=v2\" li-image-display-id=\"'573399iC99A4EA4BFD56F6A'\" li-message-uid=\"'4120580'\" li-messages-message-image=\"true\" li-bindable class=\"lia-media-image\" tabindex=\"0\" li-bypass-lightbox-when-linked=\"true\" li-use-hover-links=\"false\"><span class=\"lia-inline-image-caption\" onclick=\"event.preventDefault();\">Figure 1: Known ICS-targeted cyberattacks that occurred between 2010 and 2022. (Image from Cyber Signals: Risks to critical infrastructure on the rise)<\/span><\/span><\/p>\n<p><span data-contrast=\"none\">With ICS cyberattacks on the rise, facilities require a holistic solution to address the unique nature of critical infrastructure environments. A common threat involves ICS malware attempting to modify the controller program logic to disrupt operations and cause physical harm.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Extracting data from a controller can be challenging, as it requires specialized expertise in communicating with the device and understanding the specific, and at many times proprietary, protocols used to transmit and store data. This expertise is critical for conducting forensic operations because investigators must be able to extract specific data from a controller to identify security risks and determine the root cause of issues. The challenges around securing OT and the potentially large impact from even one controller being infected in a critical environment, highlight the need for effective security measures and forensic tools to investigate and remediate incidents.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><strong><span data-contrast=\"none\">Challenges in ICS forensics<\/span><\/strong><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/p>\n<p><span data-contrast=\"none\">ICS forensics differs from standard IT forensics, because ICS environments possess distinctive features that distinguish them. <\/span><span>&nbsp;<\/span><\/p>\n<p><span><br \/><\/span><span data-contrast=\"none\">Cybersecurity forensics in IT environments involves the collection, analysis, and preservation of digital evidence to identify the cause and extent of a security breach or cyberattack. This includes analyzing network traffic, logs, and system data to identify the source of the attack and to patch vulnerabilities. In contrast, forensics in OT environments involves analyzing ICS data, including data from sensors and controllers used in manufacturing and industrial settings.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">While OT communication protocols and execution methods are based on general principles, each vendor can implement its own protocol for data exchange and management. As a result, there is no universal protocol that applies to all controllers, and researchers must investigate each device separately, from its communication patterns to its internal data structure.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Another challenge has to do with talent and tools. Because OT and IT environments were historically isolated and had distinct security operations center teams with different tools, most incident response specialists lack the expertise to analyze OT. And while the IT domain has a variety of forensics tools, such as Autopsy, The Sleuth Kit and FTK, the OT forensics domain is still emerging, lacks a common methodology, and requires OT experts to develop their own solutions.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Specialized tools and techniques have started to emerge to address the unique challenges of conducting investigations in ICS environments. These include the<\/span> <a href=\"https:\/\/www.plc-security.com\/index.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><span data-contrast=\"none\">Top 20 Secure PLC Coding Practices<\/span><\/a><span data-contrast=\"none\">, specific OT protocols implementations available on GitHub, and paid tools for an overview of controller programs for a specific set of protocols. Notably missing from these options has been an open-source solution that provides a comprehensive implementation of OT protocols and gives forensics investigators the ability to analyze extracted data and drill down into informative and suspicious areas within the controller loaded project.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><strong><span data-contrast=\"none\">ICSpector for industrial engineers and cybersecurity analysts<\/span><\/strong><span>&nbsp;<br \/><\/span><\/span><span data-contrast=\"none\">Microsoft aspired to fill the gap in the market by creating the ICSpector framework. Written in Python and available on GitHub, ICSpector is a framework with tools that enable investigators to:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"none\">Scan their network for programmable logic controllers.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"none\">Extract project configuration and code from controllers.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"31\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"none\">Detect any anomalous components within ICS environments.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Security experts can use these forensic artifacts to identify compromised devices as part of manual verification, automated monitoring of tasks, or during incident response. The framework\u2019s modular, flexible design makes it convenient for investigators to customize it to their specific needs.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">The framework is composed of several components that can be developed and executed separately. The overall architecture is as follows:&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\" image-alt=\"Figure 2: The main modules of the ICSpector framework architecture (left to right) are: input handling, network scanner, protocol plugin, data analyzer, and output.\"><img decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573397i2DCAE8600AC90A64\/image-size\/large?v=v2&amp;px=999\" role=\"button\" title=\"Trevor_Rusher_1-1713824232934.png\" alt=\"Figure 2: The main modules of the ICSpector framework architecture (left to right) are: input handling, network scanner, protocol plugin, data analyzer, and output.\" li-image-url=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573397i2DCAE8600AC90A64?v=v2\" li-image-display-id=\"'573397i2DCAE8600AC90A64'\" li-message-uid=\"'4120580'\" li-messages-message-image=\"true\" li-bindable class=\"lia-media-image\" tabindex=\"0\" li-bypass-lightbox-when-linked=\"true\" li-use-hover-links=\"false\"><span class=\"lia-inline-image-caption\" onclick=\"event.preventDefault();\">Figure 2: The main modules of the ICSpector framework architecture (left to right) are: input handling, network scanner, protocol plugin, data analyzer, and output.<\/span><\/span><\/p>\n<p><span data-contrast=\"none\">The network scanner identifies devices that communicate in the supported OT protocol and ensures they are responsive, based on a provided IP subnet. Alternatively, a user can provide a specific IP list that was exported from OT security products such as <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/endpoint-security\/microsoft-defender-iot\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">MDIoT<\/span><\/a><span data-contrast=\"none\">, and the network scanner will only verify these devices are connected before beginning data extraction. After feeding the plugin the list of available devices, it extracts the PLC project metadata and logic. Then, the analyzer converts the raw data into a human-readable form and extracts different logic to highlight areas of the project artifacts that usually indicate malicious activity. The framework lets each component run independently with the required input. You can easily modify each component, adapting the operation to current needs, such as introducing protocol changes and analysis methods or altering the output. With the framework, users gain an inventory of assets based on the protocol scanning ability. In the data extraction phase, you can create snapshots of the controller projects and then compare changes over time.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><em><strong>Note<\/strong>: while the framework is not designed to disrupt the production process, due to the sensitive nature of ICS environments, we advise executing the data extracting component in a monitored environment.&nbsp;<\/em><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\" image-alt=\"Figure 3: Anomalous artifacts that can be extracted by ICSpector include timestamps outliers, author information, tasks usage, network capabilities, and online vs. offline project compare.\"><img decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573398iDCBB1FD458F8C77A\/image-size\/large?v=v2&amp;px=999\" role=\"button\" title=\"Trevor_Rusher_2-1713824232936.png\" alt=\"Figure 3: Anomalous artifacts that can be extracted by ICSpector include timestamps outliers, author information, tasks usage, network capabilities, and online vs. offline project compare.\" li-image-url=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573398iDCBB1FD458F8C77A?v=v2\" li-image-display-id=\"'573398iDCBB1FD458F8C77A'\" li-message-uid=\"'4120580'\" li-messages-message-image=\"true\" li-bindable class=\"lia-media-image\" tabindex=\"0\" li-bypass-lightbox-when-linked=\"true\" li-use-hover-links=\"false\"><span class=\"lia-inline-image-caption\" onclick=\"event.preventDefault();\">Figure 3: Anomalous artifacts that can be extracted by ICSpector include timestamps outliers, author information, tasks usage, network capabilities, and online vs. offline project compare.<\/span><\/span><\/p>\n<p><span data-contrast=\"none\">The forensic analysis component of ICSpector allows to dive deep into malicious modifications of controller code. With the ICSpector framework, you can extract timestamp outliers indicating that someone changed the controller code at an unexpected time. Author information is provided as well to help detect suspicious code writers. You can extract network capabilities to surface unexpected communication ports and network libraries. Tasks are the code components responsible for the entire code execution, and the framework gives you an overview of the execution flow Tasks are data structures that trigger the execution of the PLC project, and the framework gives you an overview of existing tasks and their configuration. Additionally, the entire call graph is exported to obtain a clear view of the execution flow. Stuxnet, a sophisticated computer worm that was responsible for causing significant damage to Iran\u2019s nuclear program in 2010, altered a cyclic task to monitor its malicious activities and added malicious logic to the main block of the program. Since <\/span><span data-contrast=\"none\">the code running on the controller may differ from an engineer\u2019s hard copy, the framework lets you compare the differences between the online and the offline code to catch malicious changes. All of these analysis capabilities could have helped detect the presence of Stuxnet in the network.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><strong><span data-contrast=\"none\">Get started with ICSpector<\/span><\/strong><span>&nbsp;<br \/><\/span><\/span><span data-contrast=\"none\">ICSpector is a novel solution that enables OT experts and cybersecurity analysts to enhance their reactive and proactive incident response capabilities in ICS environments. The OT cybersecurity community can participate in and benefit from security efforts in OT forensics, advancing our vision of better security practices in the OT field.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">ICSpector can be used in conjunction with <\/span><span data-contrast=\"auto\">Microsoft Defender for IoT, <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/endpoint-security\/microsoft-defender-iot\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Microsoft Security<\/span><\/a><span data-contrast=\"none\">\u2019s solution for defending IoT and ICS\/OT devices that maps out your OT network and alerts you of malicious activity. Defender for IoT, or any other OT security solution, can help with both proactive and reactive OT incident response. <\/span><a href=\"https:\/\/github.com\/microsoft\/ics-forensics-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Try ICSpector<\/span><\/a><span data-contrast=\"none\"> to see how it could benefit your organization. Our <a href=\"https:\/\/github.com\/microsoft\/ics-forensics-tools\/blob\/main\/HowToGuide.md\" target=\"_self\" rel=\"noopener noreferrer\">how-to guide<\/a> will walk you through the installation of the framework and explain the components and how to use them in your environment. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Currently, the system supports three OT protocols: Siemens S7Comm, which is compatible with the S7-300\/400 series, Rockwell RSLogix, using the Common Industrial Protocol, and Codesys V3, which is a widely used SDK for industrial control devices and is implemented by different vendors.&nbsp;&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><strong><span data-contrast=\"none\">We encourage you to contribute to the tool by adding new OT protocols and forensic logic.<\/span><\/strong><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span>&nbsp;<br \/><\/span><span data-contrast=\"none\">Learning about ICS basics, PLC programming and investigation methodologies can be done through the <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=g3KLq_IHId4&amp;t=2s\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><span data-contrast=\"none\">webinar<\/span><\/a><span data-contrast=\"none\">, hosted by Microsoft Defender for IoT Research team.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">To get started with OT security, watch the <\/span><a href=\"https:\/\/www.youtube.com\/playlist?list=PLmAptfqzxVEXz5txCCKYUdpQETAMpeOhu\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><span data-contrast=\"none\">\u201cIntroduction to ICS\/OT Security\u201d webinar series<\/span><\/a><span data-contrast=\"none\">, hosted by Microsoft Security Community.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p> READ MORE <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/investigating-industrial-control-systems-using-microsoft-s\/ba-p\/4120580\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u200bMicrosoft released ICSpector as an open-source framework to help organizations secure their industrial control systems. Read our blog post for details on how it works and why this solution is so critical given modern cybersecurity threats.<br \/>\nThe post \u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55944,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-55943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-25T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573399iC99A4EA4BFD56F6A\/image-size\/large?v=v2&amp;px=999\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework\",\"datePublished\":\"2024-04-25T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/\"},\"wordCount\":1734,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/\",\"name\":\"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg\",\"datePublished\":\"2024-04-25T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg\",\"width\":998,\"height\":564},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/","og_locale":"en_US","og_type":"article","og_title":"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-04-25T16:00:00+00:00","og_image":[{"url":"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/573399iC99A4EA4BFD56F6A\/image-size\/large?v=v2&amp;px=999","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework","datePublished":"2024-04-25T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/"},"wordCount":1734,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/","url":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/","name":"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg","datePublished":"2024-04-25T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework.jpg","width":998,"height":564},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/investigating-industrial-control-systems-using-microsofts-icspector-open-source-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"\u200b\u200bInvestigating industrial control systems using Microsoft\u2019s ICSpector open-source framework"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55943"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55944"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}