Hacking

MITRE and CISA release Caldera for OT attack emulation

MITRE and CISA released a Caldera extension for OT that allows the emulation of attacks on operational technology systems.

MITRE Caldera is an open-source adversary emulation platform that helps cybersecurity practitioners to automate security assessments. The tool is built on the MITRE ATT&CK framework, which is a widely-recognized framework for understanding and responding to cyber threats.

“Without further ado, the MITRE Caldera team is proud to announce the release of Caldera™ for OT; a collection of Caldera plugins that provide support for common industrial protocols.” reads the announcement for the product. “The initial release includes support for BACnet, Modbus, and DNP3 protocols.”

Caldera can be used to automate a variety of security assessments, including:

  • Red teaming: This is a simulated attack on an organization’s systems and networks to identify and assess vulnerabilities.
  • Blue teaming: This is the process of defending an organization’s systems and networks from attack.
  • Purple teaming: This is a collaborative approach to security that brings together red and blue teams to work together to improve an organization’s security posture.

MITRE and CISA have announced the availability of Caldera for OT, a new extension, to allow security teams to emulate attacks targeting operational technology systems.

“A collection of plugins that extend Caldera to the Operational Technology (OT) environment.” reads the description of the plugin published on GitHub. “This repository contains all the Caldera for OT plugins as git submodules. As described in each individual plugin README, it is also possible to git clone a specific protocol plugin directly into the Caldera plugins directory, following the “Installation” guidance.”

Caldera for OT extension was developed in collaboration with the Homeland Security Systems Engineering and Development Institute (HSSEDI) and CISA.

HSSEDI and CISA collaborated on automated adversary emulation simulations conducted at the CISA’s Control Environment Laboratory Resource (CELR).

“The Control Environment Laboratory Resource (CELR) is an environment for government and private industry partners to experience the possible effects of kinetic cyber-physical attacks. CELR allows users to perform security research on industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. CELR is a test range that uses multiple platforms capable of hosting simulated risk scenarios against real critical infrastructure (CI) processes.” 

“Protecting our nation’s critical infrastructure is essential. With Caldera for OT, we are pleased to partner with CISA to help defenders of operational technology exercise and improve the defenses of these critical systems,” said Yosry Barsoum, vice president and director, Center for Securing the Homeland at MITRE.

“Continued cyber threats to OT systems require a concerted focus on supporting the critical infrastructure community with actionable tools and resources,” said Eric Goldstein, executive assistant director for cybersecurity at CISA. “Through our ongoing collaboration with HSSEDI, we are leveraging our collective expertise and resources to develop innovative measures that safeguard critical systems. Caldera for OT, as well as CELR, can help critical infrastructure owners and operators protect their systems against emerging threats.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, MITRE)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FBI seized the notorious BreachForums hacking forum

An international law enforcement operation coordinated by the FBI led to the seizure of the…

2 hours ago

A Tornado Cash developer has been sentenced to 64 months in prison

One of the developers of the Tornado Cash cryptocurrency mixer has been sentenced to 64…

4 hours ago

Adobe fixed multiple critical flaws in Acrobat and Reader

Adobe addressed multiple code execution vulnerabilities in several products, including Adobe Acrobat and Reader. Adobe…

12 hours ago

Ransomware attack on Singing River Health System impacted 895,000 people

The Singing River Health System revealed that the ransomware attack that hit the organization in…

17 hours ago

Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days

Microsoft Patch Tuesday security updates for May 2024 fixed 59 flaws across various products including…

1 day ago

VMware fixed zero-day flaws demonstrated at Pwn2Own Vancouver 2024

VMware fixed four flaws in its Workstation and Fusion desktop hypervisors, including three zero-days exploited…

1 day ago

This website uses cookies.