Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for subsequent Lateral Movement or Discovery techniques. Functionality could exist within adversary tools to enable this, but utilities available on the operating system or vendor software could also be used.[1]
| ID | Name | Description |
|---|---|---|
| C0028 | 2015 Ukraine Electric Power Attack |
During the 2015 Ukraine Electric Power Attack, Sandworm Team remotely discovered operational assets once on the OT network. [2] [3] |
| C0063 | 2025 Poland Wiper Attacks |
During the 2025 Poland Wiper Attacks, the adversaries used |
| S0093 | Backdoor.Oldrea |
The Backdoor.Oldrea ICS malware plugin relies on Windows networking (WNet) to discover all the servers, including OPC servers, that are reachable by the compromised machine over the network. [5] |
| S1045 | INCONTROLLER |
INCONTROLLER can use the FINS (Factory Interface Network Service) protocol to scan for and obtain MAC address associated with Omron devices.[6][7] |
| S0604 | Industroyer |
Industroyer contains an OPC DA module that enumerates all OPC servers using the |
| ID | Mitigation | Description |
|---|---|---|
| M0814 | Static Network Configuration |
ICS environments typically have more statically defined devices, therefore minimize the use of both IT discovery protocols (e.g., DHCP, LLDP) and discovery functions in automation protocols.[8][9] Examples of automation protocols with discovery capabilities include OPC UA Device Discovery[10], BACnet[11], and Ethernet/IP.[12] |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0739 | Detection of Remote System Discovery | AN1872 |
Monitor for files (such as /etc/hosts) being accessed that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. |