![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-07/Portada_APT.png)
In the industrial environment, the interconnection of industrial equipment for maintenance via the Internet is becoming increasingly common. However, this has also opened the door to a new and dangerous landscape of threats. This article reviews one of the most representative threats within this current new paradigm, APTs, how concern about this type of threat is increasing, and how they operate during an industrial attack.
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-04/Portada_CAPEC.png)
CAPEC (Common Attack Pattern Enumeration and Classification) is a project that focuses on enumerating and classifying common attack patterns on computer systems and providing a systematic approach to understanding and addressing the tactics used by attackers. Like CWE (Common Weakness Enumeration), CAPEC is an initiative of the computer security community and is maintained by the National Institute of Standards and Technology (NIST) in the United States. Recently in version 3.9, the project has incorporated a number of attack patterns related to the industrial world.
This article aims to show the reader the use of these codes, such as those used at the identifier level in CVEs, CWEs, etc., and which are related to many of the jobs that are carried out on a daily basis in the industrial cybersecurity sector.
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2024-03/portada_dragonfly.jpg)
Currently, industrial infrastructures are suffering more attacks than ever before, and it is expected that attacks on these types of infrastructures will continue to grow exponentially in the coming years. This is why, throughout this article, an analysis will be made of a group of cybercriminals and their standard attack, showing how information can be obtained on the modus operandi, when and by what tactics and techniques they managed to attack an industrial infrastructure
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)
![Imagen de Noticia Imagen decorativa Noticia](/sites/default/files/images/ImagenGeneral-INCIBE.jpg)