{"id":2889,"date":"2024-05-14T16:48:58","date_gmt":"2024-05-14T14:48:58","guid":{"rendered":"https:\/\/www.spacesecurity.info\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/"},"modified":"2024-10-28T09:27:59","modified_gmt":"2024-10-28T08:27:59","slug":"how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/","title":{"rendered":"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm"},"content":{"rendered":"<h2>Introduction<\/h2>\n<p>In this article, I will show how I used the MITRE EMB3D\u2122 Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by the Stuxnet worm to sabotage the Iran&#8217;s nuclear centrifuges.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2886\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1024x367.jpg\" alt=\"\" width=\"696\" height=\"249\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1024x367.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-300x107.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-768x275.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1536x550.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-2048x734.jpg 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-696x249.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1068x383.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs-1920x688.jpg 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<h2>About the\u00a0MITRE EMB3D\u2122 Threat Model<\/h2>\n<p>EMB3D\u2122 is a Cybersecurity Threat Model release by MITRE in May 2024 and dedicated for Embedded Devices.<\/p>\n<p>EMB3D is aligned with and expands on several existing models, including <a href=\"https:\/\/cwe.mitre.org\/\">Common Weakness Enumeration<\/a>,\u00a0<a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK\u00ae<\/a>, and\u00a0<a href=\"https:\/\/cve.mitre.org\/\">Common Vulnerabilities and Exposures<\/a>, but with a specific embedded-device focus. The threats defined within EMB3D are based on observation of use by threat actors, proof-of-concept and theoretical\/conceptual security research publications, and device vulnerability and weakness reports. These threats are mapped to device properties to help users develop and tailor accurate threat models for specific embedded devices.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2859\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png\" alt=\"\" width=\"696\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-300x129.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-768x331.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1536x663.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-2048x883.png 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-696x300.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1068x461.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1920x828.png 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>Coming in the next release of EMB3D in Summer 2024, each threat description will include a set of Foundational, Intermediate, and Leading mitigations. These mitigations will provide guidance on what technical mechanisms can best prevent or reduce the risk of that threat.<\/p>\n<p>For each threat, EMB3D will suggest technical mechanisms that vendors should build into the device to mitigate the given threat. EMB3D is a comprehensive framework for the entire security ecosystem\u2014device vendors, asset owners, security researchers, and testing organizations.<\/p>\n<p>To know more about the MITRE EMB3D\u2122 Cybersecurity Threat Model for Embedded Devices, check our article <a href=\"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\">here<\/a>.<\/p>\n<h2>About the Stuxnet attack<\/h2>\n<p>Stuxnet is a highly sophisticated worm discovered in 2010, believed to be developed jointly by the United States and Israel. It targeted supervisory control and data acquisition (SCADA) systems, particularly those used in Iran&#8217;s nuclear program. Stuxnet specifically aimed at disrupting uranium enrichment processes by sabotaging centrifuges, demonstrating the potential of cyber weapons to physically damage critical infrastructure. Its complex code and ability to spread rapidly made it one of the most advanced and impactful cyber weapons ever deployed.<\/p>\n<figure id=\"attachment_2873\" aria-describedby=\"caption-attachment-2873\" style=\"width: 625px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/StuxNet_1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2873 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/StuxNet_1.png\" alt=\"\" width=\"625\" height=\"346\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/StuxNet_1.png 625w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/StuxNet_1-300x166.png 300w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/a><figcaption id=\"caption-attachment-2873\" class=\"wp-caption-text\">Stuxnet attack overview<\/figcaption><\/figure>\n<p>Stuxnet specifically targeted industrial process control systems manufactured by Siemens, including programmable logic controllers (PLCs). It exploited vulnerabilities in the software and communication protocols used by these systems to infiltrate and take control of the PLCs. Once infected, the PLCs could be manipulated to disrupt the operation of the centrifuges used in the Iranian nuclear program.<\/p>\n<h2>What is STEP 7 in Siemens PLC and how does Siemens PLC work<\/h2>\n<p>STEP 7 is a software platform developed by Siemens for programming and configuring its programmable logic controllers (PLCs). It is part of the Totally Integrated Automation (TIA) Portal, which provides a comprehensive suite of tools for automation tasks, including PLC programming, human-machine interface (HMI) design, and more.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP-7-software.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2877\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP-7-software.png\" alt=\"\" width=\"845\" height=\"614\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP-7-software.png 845w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP-7-software-300x218.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP-7-software-768x558.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP-7-software-696x506.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP-7-software-324x235.png 324w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><\/a><\/p>\n<p>Siemens PLCs are industrial control devices used to automate processes in various industries, such as manufacturing, energy, and transportation. They consist of hardware components, such as the CPU (central processing unit), input\/output modules, and communication modules, which interface with sensors, actuators, and other devices in the physical environment.<\/p>\n<p>The PLC&#8217;s operation is based on a programmed logic controller, which executes a control program created using software like STEP 7. The program defines the behavior of the PLC in response to inputs from sensors and other sources. When inputs change, the PLC processes this information according to the program&#8217;s logic and produces outputs to control actuators, machinery, or other devices.<\/p>\n<ul>\n<li>More about the Siemens STEP 7 software platform <a href=\"https:\/\/mall.industry.siemens.com\/mall\/en\/WW\/Catalog\/Products\/10314843?tree=CatalogTree&amp;ActiveTab=2\">here<\/a>.<\/li>\n<li>More about programming with STEP 7 <a href=\"https:\/\/cache.industry.siemens.com\/dl\/files\/825\/109751825\/att_933142\/v1\/STEP_7_-_Programming_with_STEP_7.pdf\">here<\/a> (PDF).<\/li>\n<\/ul>\n<h2>About Siemens S7-300 PLC<\/h2>\n<p>Iran&#8217;s nuclear centrifuges were using Siemens S7-300 and S7-400 PLCs.<\/p>\n<figure id=\"attachment_2875\" aria-describedby=\"caption-attachment-2875\" style=\"width: 444px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/S7-300.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2875 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/S7-300.png\" alt=\"\" width=\"444\" height=\"444\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/S7-300.png 444w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/S7-300-300x300.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/S7-300-150x150.png 150w\" sizes=\"auto, (max-width: 444px) 100vw, 444px\" \/><\/a><figcaption id=\"caption-attachment-2875\" class=\"wp-caption-text\">Siemens S7-300 PLC<\/figcaption><\/figure>\n<figure id=\"attachment_2879\" aria-describedby=\"caption-attachment-2879\" style=\"width: 450px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/s7-400.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2879 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/s7-400.jpg\" alt=\"\" width=\"450\" height=\"325\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/s7-400.jpg 450w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/s7-400-300x217.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/s7-400-324x235.jpg 324w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><figcaption id=\"caption-attachment-2879\" class=\"wp-caption-text\">Siemens S7-400 PLC<\/figcaption><\/figure>\n<p>To identify the main features and device properties of the Siemens S7 series PLC, I used the following datasheets (PDF) :<\/p>\n<ul>\n<li>More about the S7-300 Module data <a href=\"https:\/\/cache.industry.siemens.com\/dl\/files\/629\/8859629\/att_55794\/v1\/s7300_module_data_manual_en-US_en-US.pdf\">here<\/a> (PDF)<\/li>\n<li>More about the S7-400 Module data <a href=\"https:\/\/cache.industry.siemens.com\/dl\/files\/228\/109972228\/att_1289416\/v1\/s7400_automation_system_en-US_en-US.pdf\">here<\/a> (PDF)<\/li>\n<\/ul>\n<h2>Identifying properties of the Siemens embedded device<\/h2>\n<p>What I consider as an embedded device is the STEP7 Workstation and the Siemens S7 series PLCs.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP7-S7-PLC.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2882\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP7-S7-PLC.jpg\" alt=\"\" width=\"987\" height=\"590\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP7-S7-PLC.jpg 987w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP7-S7-PLC-300x179.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP7-S7-PLC-768x459.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/STEP7-S7-PLC-696x416.jpg 696w\" sizes=\"auto, (max-width: 987px) 100vw, 987px\" \/><\/a><\/p>\n<p><strong>Device Property #1<\/strong><\/p>\n<p>Siemens S7-300 PLC does not include a traditional operating system (OS) or kernel in the same sense as a general-purpose computer. Instead, it operates using firmware that is specifically designed for real-time control tasks. This firmware is tightly integrated with the hardware of the PLC and is optimized for deterministic and reliable operation in industrial environments.<\/p>\n<p><strong>So, in the EMB3D\u2122 Device Properties tool \/ System Software, <\/strong><strong>I checked <a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-23\">PID-23 &#8211; Device includes OS\/kernel<\/a><\/strong><\/p>\n<p><strong>Device Property #2<\/strong><\/p>\n<p>Applications and softwares are present and running on Siemens PLCs.\u00a0These softwares are used for programming and configuring the PLC to perform specific control tasks. In the case of Siemens PLCs, the programming software is typically part of the Totally Integrated Automation (TIA) Portal suite, which includes tools like STEP 7 for programming.<\/p>\n<p>Programmers use this application-level software to create control logic using programming languages such as ladder logic, function block diagram (FBD), or structured text. Once the control program is developed, it is downloaded to the PLC, where it runs directly on the PLC&#8217;s firmware.<\/p>\n<p>This application-level software allows users to define the behavior of the PLC, specify how inputs should be processed, define control logic, and configure outputs to interact with the physical environment. It also provides tools for debugging, monitoring, and maintaining the PLC program during operation.<\/p>\n<p><strong>So, in the EMB3D\u2122 Device Properties tool \/ Application Software<\/strong><strong>, I checked <a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-31\">PID-31 &#8211; Application-level software is present and running on the device<\/a><\/strong><\/p>\n<p><strong>Device Property #3<\/strong><\/p>\n<p>Siemens PLCs, including the S7-300 series, have the ability to deploy custom programs created using engineering software or integrated development environments (IDEs). Siemens provides programming software such as STEP 7 (part of the TIA Portal suite) for developing custom control logic programs.<\/p>\n<p><strong>So, in the EMB3D\u2122 Device Properties tool \/ Application Software, I checked <a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-321\">PID-321 &#8211; Device includes ability to deploy custom programs from engineering software or IDE<\/a><\/strong><\/p>\n<p><strong>Device Property #4<\/strong><\/p>\n<p>Siemens PLCs do include system function blocks, which are pre-defined blocks of logic that perform specific tasks within the PLC&#8217;s firmware. These function blocks are provided by Siemens as part of the PLC&#8217;s programming environment and are used for various system-level tasks, such as reading system information, manipulating data blocks, managing communication protocols, and performing other administrative functions.<\/p>\n<p><strong>So, in the EMB3D\u2122 Device Properties tool \/ Application Software, I checked <a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-3231\">PID-3231 &#8211; Device includes ability to run custom\/external programs as native binary without a confined\/restricted environment<\/a><\/strong><\/p>\n<h2>Siemens PLCs Properties to Threats Mapping<\/h2>\n<p>The following table is mapping the Device Properties to a list of Threats the Siemens S7 series PLCs may be exposed to because it incorporates those properties and features.<\/p>\n<table style=\"border-collapse: collapse; width: 100%; height: 780px;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 100%; text-align: center; height: 26px;\" colspan=\"4\"><strong>System Software<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Device Properties<\/strong><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Threats<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 25%; height: 156px;\" rowspan=\"2\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-23\">PID-23<\/a><\/td>\n<td style=\"width: 25%; height: 156px;\" rowspan=\"2\">Device includes OS\/kernel<\/td>\n<td style=\"width: 25%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-218.html\">TID-218<\/a><\/td>\n<td style=\"width: 25%; height: 78px;\">Operating System Susceptible to Rootkit<\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 25%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-202.html\">TID-202<\/a><\/td>\n<td style=\"width: 25%; height: 78px;\">Exploitable System Network Stack Component<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; text-align: center; height: 26px;\" colspan=\"4\"><strong>Application Software<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 25%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Device Properties<\/strong><\/td>\n<td style=\"width: 25%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Threats<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 25%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-31\">PID-31<\/a><\/td>\n<td style=\"width: 25%; height: 104px;\">Application-level software is present and running on the device<\/td>\n<td style=\"width: 25%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-301.html\">TID-301<\/a><\/td>\n<td style=\"width: 25%; height: 104px;\">Applications Binaries Modified<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 25%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-32\">PID-32<\/a><\/td>\n<td style=\"width: 25%; height: 104px;\">Device includes the ability to deploy custom or external programs<\/td>\n<td style=\"width: 25%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-302.html\">TID-302<\/a><\/td>\n<td style=\"width: 25%; height: 104px;\">Install Untrusted Application<\/td>\n<\/tr>\n<tr style=\"height: 130px;\">\n<td style=\"width: 25%; height: 130px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-321\">PID-321<\/a><\/td>\n<td style=\"width: 25%; height: 130px;\">Device includes ability to deploy custom programs from engineering software or IDE<\/td>\n<td style=\"width: 25%; height: 130px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-303.html\">TID-303<\/a><\/td>\n<td style=\"width: 25%; height: 130px;\">Excessive Trust in Offboard Management\/IDE Software<\/td>\n<\/tr>\n<tr style=\"height: 182px;\">\n<td style=\"width: 25%; height: 182px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-3231\">PID-3231<\/a><\/td>\n<td style=\"width: 25%; height: 182px;\">Device includes ability to run custom\/external programs as native binary without a confined\/restricted environment<\/td>\n<td style=\"width: 25%; height: 182px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-305.html\">TID-305<\/a><\/td>\n<td style=\"width: 25%; height: 182px;\">Program Executes Dangerous System Calls<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Threat Heat Map for Siemens PLCs<\/h2>\n<p>The following tables represent a list of threats that pose a viable risk to the Siemens S7 series PLC.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2938\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs-1024x424.jpg\" alt=\"\" width=\"696\" height=\"288\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs-1024x424.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs-300x124.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs-768x318.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs-696x288.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs-1068x442.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Threat-Heat-Map-for-Siemens-PLCs.jpg 1089w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"text-align: center; width: 100%;\" colspan=\"3\"><strong>SIEMENS S7-300 \/ S7-400 PLCs Heat Map<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; text-align: center;\"><strong>System Software<\/strong><\/td>\n<td style=\"width: 50%; text-align: center;\" colspan=\"2\"><strong>Application Software<\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; text-align: center;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-218.html\">TID-218<\/a><\/td>\n<td style=\"width: 25%; text-align: center;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-301.html\">TID-301<\/a><\/td>\n<td style=\"width: 25%; text-align: center;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-303.html\">TID-303<\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; text-align: center;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-202.html\">TID-202<\/a><\/td>\n<td style=\"width: 25%; text-align: center;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-302.html\">TID-302<\/a><\/td>\n<td style=\"width: 25%; text-align: center;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-305.html\">TID-305<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Threats exploited by the Stuxnet worm<\/h2>\n<p>It&#8217;s confirmed that the following threats have been exploited by the Stuxnet worm. &#8220;It means that the threat modeling we have done is accurate.&#8221;<\/p>\n<table style=\"border-collapse: collapse; width: 100%; height: 780px;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 100%; text-align: center; height: 26px;\" colspan=\"4\"><strong>System Software<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Device Properties<\/strong><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Threats<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 25%; height: 156px;\" rowspan=\"2\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-23\">PID-23<\/a><\/td>\n<td style=\"width: 25%; height: 156px;\" rowspan=\"2\">Device includes OS\/kernel<\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-218.html\">TID-218<\/a><\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 78px;\">Operating System Susceptible to Rootkit<\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 25%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-202.html\">TID-202<\/a><\/td>\n<td style=\"width: 25%; height: 78px;\">Exploitable System Network Stack Component<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; text-align: center; height: 26px;\" colspan=\"4\"><strong>Application Software<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 25%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Device Properties<\/strong><\/td>\n<td style=\"width: 25%; text-align: center; height: 26px;\" colspan=\"2\"><strong>Threats<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 25%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-31\">PID-31<\/a><\/td>\n<td style=\"width: 25%; height: 104px;\">Application-level software is present and running on the device<\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-301.html\">TID-301<\/a><\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 104px;\">Applications Binaries Modified<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 25%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-32\">PID-32<\/a><\/td>\n<td style=\"width: 25%; height: 104px;\">Device includes the ability to deploy custom or external programs<\/td>\n<td style=\"width: 25%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-302.html\">TID-302<\/a><\/td>\n<td style=\"width: 25%; height: 104px;\">Install Untrusted Application<\/td>\n<\/tr>\n<tr style=\"height: 130px;\">\n<td style=\"width: 25%; height: 130px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-321\">PID-321<\/a><\/td>\n<td style=\"width: 25%; height: 130px;\">Device includes ability to deploy custom programs from engineering software or IDE<\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 130px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-303.html\">TID-303<\/a><\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 130px;\">Excessive Trust in Offboard Management\/IDE Software<\/td>\n<\/tr>\n<tr style=\"height: 182px;\">\n<td style=\"width: 25%; height: 182px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-3231\">PID-3231<\/a><\/td>\n<td style=\"width: 25%; height: 182px;\">Device includes ability to run custom\/external programs as native binary without a confined\/restricted environment<\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 182px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-305.html\">TID-305<\/a><\/td>\n<td style=\"width: 25%; background-color: #eb0e42; height: 182px;\">Program Executes Dangerous System Calls<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Associated mitigations<\/h2>\n<p>The following table represents a list of associated mitigations to the threats that pose a viable risk to the Siemens S7 series PLC.<\/p>\n<table width=\"1884\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"5\" width=\"1884\"><b>System Software<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" colspan=\"2\" rowspan=\"2\" width=\"496\"><b>Threats<\/b><\/td>\n<td style=\"text-align: center;\" colspan=\"3\" width=\"1388\"><b>Associated mitigations<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"505\"><b>Foundational<\/b><\/td>\n<td style=\"text-align: center;\" width=\"442\"><b>Intermediate<\/b><\/td>\n<td style=\"text-align: center;\" width=\"442\"><b>Leading<\/b><\/td>\n<\/tr>\n<tr>\n<td width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-218.html\">TID-218<\/a><\/b><\/td>\n<td width=\"379\">Operating System Susceptible to Rootkit<\/td>\n<td width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-001.html\">MID-001<\/a><\/b><b>\u00a0&#8211; <\/b>Software Only Bootloader Authentication<\/td>\n<td width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-002.html\">MID-002<\/a><\/b><b>\u00a0<\/b>&#8211; Hardware-backed Bootloader Authentication<br \/>\n<b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a><\/b>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/td>\n<td width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-003.html\">MID-003<\/a><\/b>\u00a0&#8211; Periodic\/Continuous Integrity Measurement and Remote Attestation<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" colspan=\"5\" width=\"1884\"><b>Application Software<\/b><\/td>\n<\/tr>\n<tr>\n<td width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-301.html\">TID-301<\/a><\/b><\/td>\n<td width=\"379\">Applications Binaries Modified<\/td>\n<td width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-001.html\">MID-001<\/a><\/b>\u00a0&#8211; Software Only Bootloader Authentication<\/td>\n<td width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-002.html\">MID-002<\/a><\/b>\u00a0&#8211; Hardware-backed Bootloader Authentication<br \/>\n<b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a><\/b>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/td>\n<td width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-003.html\">MID-003<\/a><\/b>\u00a0&#8211; Periodic\/Continuous Integrity Measurement and Remote Attestation<\/td>\n<\/tr>\n<tr>\n<td width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-303.html\">TID-303<\/a><\/b><\/td>\n<td width=\"379\">Excessive Trust in Offboard Management\/IDE Software<\/td>\n<td width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-041.html\">MID-041<\/a><\/b>\u00a0&#8211; Cryptographically Signed Vendor-supplied Programs<br \/>\n<b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-042.html\">MID-042<\/a><\/b>\u00a0&#8211; Device Checks Consistency Between Binary\/Running Code and Textual Code<\/td>\n<td width=\"442\"><\/td>\n<td width=\"442\"><\/td>\n<\/tr>\n<tr>\n<td width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-305.html\">TID-305<\/a><\/b><\/td>\n<td width=\"379\">Program Executes Dangerous System Calls<\/td>\n<td width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-012.html\">MID-012<\/a><\/b>\u00a0&#8211; OS-based Access Control Mechanisms<\/td>\n<td width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-014.html\">MID-014<\/a><\/b>\u00a0&#8211; Sandboxing<br \/>\n<b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-015.html\">MID-015<\/a><\/b>\u00a0&#8211; Containerization<\/td>\n<td width=\"442\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Associated mitigations with IEC 62443 4-2 Mappings<\/h2>\n<table style=\"width: 100%;\" width=\"1884\">\n<tbody>\n<tr>\n<td style=\"width: 97.9885%; vertical-align: middle;\" colspan=\"5\" width=\"1884\">\n<p style=\"text-align: center;\"><b>System Software<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 30.1725%; text-align: center;\" colspan=\"2\" rowspan=\"2\" width=\"496\"><b>Threats<\/b><\/td>\n<td style=\"width: 67.816%; text-align: center;\" colspan=\"3\" width=\"1388\"><b>Associated mitigations<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 22.2701%; text-align: center;\" width=\"505\"><b>Foundational<\/b><\/td>\n<td style=\"width: 20.8333%; text-align: center;\" width=\"442\"><b>Intermediate<\/b><\/td>\n<td style=\"width: 24.7126%; text-align: center;\" width=\"442\"><b>Leading<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.18966%;\" width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-218.html\">TID-218<\/a><\/b><\/td>\n<td style=\"width: 21.9828%;\" width=\"379\">Operating System Susceptible to Rootkit<\/td>\n<td style=\"width: 22.2701%;\" width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-001.html\">MID-001<\/a><\/b>\u00a0&#8211; Software Only Bootloader Authentication<\/p>\n<p><span style=\"color: #ff0000;\">\u2022EDR \/ HDR \/ NDR 3.14 &#8211; Integrity of the boot process<\/span><\/td>\n<td style=\"width: 20.8333%;\" width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-002.html\">MID-002<\/a><\/b>\u00a0&#8211; Hardware-backed Bootloader Authentication<\/p>\n<p><span style=\"color: #ff0000;\">\u2022EDR \/ HDR\/ NDR 3.14 &#8211; Integrity of the boot process<\/span><\/p>\n<p><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a><\/b>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 3.4 \u2013 Software and information integrity<\/span><\/td>\n<td style=\"width: 24.7126%;\" width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-003.html\">MID-003<\/a><\/b>\u00a0&#8211; Periodic\/Continuous Integrity Measurement and Remote Attestation<\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 3.4 \u2013 Software and information integrity<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 97.9885%;\" colspan=\"5\" width=\"1884\">\n<p style=\"text-align: center;\"><b>Application Software<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.18966%;\" width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-301.html\">TID-301<\/a><\/b><\/td>\n<td style=\"width: 21.9828%;\" width=\"379\">Applications Binaries Modified<\/td>\n<td style=\"width: 22.2701%;\" width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-001.html\">MID-001<\/a><\/b>\u00a0&#8211; Software Only Bootloader Authentication<\/p>\n<p><span style=\"color: #ff0000;\">\u2022EDR \/ HDR \/ NDR 3.14 &#8211; Integrity of the boot process<\/span><\/td>\n<td style=\"width: 20.8333%;\" width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-002.html\">MID-002<\/a><\/b><b>\u00a0<\/b>&#8211; Hardware-backed Bootloader Authentication<\/p>\n<p><span style=\"color: #ff0000;\">\u2022EDR \/ HDR\/ NDR 3.14 &#8211; Integrity of the boot process)<\/span><\/p>\n<p><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a><\/b>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 3.4 \u2013 Software and information integrity<\/span><\/td>\n<td style=\"width: 24.7126%;\" width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-003.html\">MID-003<\/a><\/b>\u00a0&#8211; Periodic\/Continuous Integrity Measurement and Remote Attestation<\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 3.4 \u2013 Software and information integrity<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.18966%;\" width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-303.html\">TID-303<\/a><\/b><\/td>\n<td style=\"width: 21.9828%;\" width=\"379\">Excessive Trust in Offboard Management\/IDE Software<\/td>\n<td style=\"width: 22.2701%;\" width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-041.html\">MID-041<\/a><\/b>\u00a0&#8211; Cryptographically Signed Vendor-supplied Programs<\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 3.4 \u2013 Software and information integrity<\/span><\/p>\n<p><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-042.html\">MID-042<\/a><\/b>\u00a0&#8211; Device Checks Consistency Between Binary\/Running Code and Textual Code<\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 3.4 \u2013 Software and information integrity<\/span><\/td>\n<td style=\"width: 20.8333%;\" width=\"442\"><\/td>\n<td style=\"width: 24.7126%;\" width=\"442\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.18966%;\" width=\"117\"><b><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-305.html\">TID-305<\/a><\/b><\/td>\n<td style=\"width: 21.9828%;\" width=\"379\">Program Executes Dangerous System Calls<\/td>\n<td style=\"width: 22.2701%;\" width=\"505\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-012.html\">MID-012<\/a><\/b>\u00a0&#8211; OS-based Access Control Mechanisms<\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 2.1 &#8211; Authorization Enforcement<\/span><\/td>\n<td style=\"width: 20.8333%;\" width=\"442\"><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-014.html\">MID-014<\/a><\/b>\u00a0&#8211; Sandboxing<\/p>\n<p><span style=\"color: #ff0000;\">\u2022SAR \/ EDR \/ HDR \/ NDR 3.2 \u2013 Protection from malicious code<\/span><\/p>\n<p><b><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-015.html\">MID-015<\/a><\/b><b>\u00a0<\/b>&#8211; Containerization<\/p>\n<p><span style=\"color: #ff0000;\">\u2022SAR \/ EDR \/ HDR \/ NDR 3.2 \u2013 Protection from malicious code<\/span><\/p>\n<p><span style=\"color: #ff0000;\">\u2022CR 3.4 \u2013 Software and information integrity<\/span><\/td>\n<td style=\"width: 24.7126%;\" width=\"442\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Modeling an attack on an Industrial Control Systems (ICS)<\/h2>\n<p>To model an attack on an Industrial Control Systems (ICS), it&#8217;s recommanded to use an offensive model.<\/p>\n<p>There are two offensive models dedicated to Industrial Control Systems (ICS):<\/p>\n<ul>\n<li>The MITRE ATT&amp;CK for ICS matrix<\/li>\n<li>The ICS Cyber Kill Chain<\/li>\n<\/ul>\n<p>To know more how to model an attack on an Industrial Control Systems (ICS) but also about the MITRE ATT&amp;CK for ICS matrix and the ICS Cyber Kill Chain, go to out entire and complete article on this subject <a href=\"https:\/\/www.spacesecurity.info\/how-to-attack-industrial-control-systems-ics\/\">here<\/a>.<\/p>\n<h2>Mapping of Stuxnet attack on the MITRE ATT&amp;CK for ICS matrix<\/h2>\n<p>Below is the <em>mapping of Stuxnet attack on the ATT&amp;CK for ICS matrix (<a href=\"https:\/\/airbus-cyber-security.com\/mitre-attck-for-ics-everything-you-need-to-know\/\">Than\u2019ks to Airbus Cybersecurity<\/a>). \u00ab Mapping Stuxnet to the ATT&amp;CK for ICS matrix, as shown in figure 3, quickly shows how complex this attack was. Business risk owners can now identify which techniques to focus on if they need to minimise the risk from strikes like Stuxnet. \u00bb<\/em><\/p>\n<figure id=\"attachment_1521\" aria-describedby=\"caption-attachment-1521\" style=\"width: 1024px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1521 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1.png\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1-300x156.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1-768x399.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1-696x362.png 696w\" alt=\"\" width=\"1024\" height=\"532\" \/><\/a><figcaption id=\"caption-attachment-1521\" class=\"wp-caption-text\">Mapping of Stuxnet on the ATT&amp;CK for ICS matrix (Source: https:\/\/airbus-cyber-security.com\/mitre-attck-for-ics-everything-you-need-to-know\/)<\/figcaption><\/figure>\n<h2>ICS Cyber Kill Chain applied to STUXNET<\/h2>\n<p>The figure below is the ICS Cyber Kill Chain applied to STUXNET.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2944\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-1024x447.jpg\" alt=\"\" width=\"696\" height=\"304\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-1024x447.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-300x131.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-768x335.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-696x304.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-1068x466.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet.jpg 1173w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In this article, I will show how I used the MITRE EMB3D\u2122 Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by the Stuxnet worm to sabotage the Iran&#8217;s nuclear centrifuges. About the\u00a0MITRE EMB3D\u2122 Threat Model EMB3D\u2122 is a Cybersecurity Threat Model release by MITRE in May 2024 and dedicated for Embedded [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2887,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,22],"tags":[],"class_list":{"0":"post-2889","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-hacking-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"Introduction In this article, I will show how I used the MITRE EMB3D\u2122 Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by the Stuxnet worm to sabotage the Iran&#8217;s nuclear centrifuges. About the\u00a0MITRE EMB3D\u2122 Threat Model EMB3D\u2122 is a Cybersecurity Threat Model release by MITRE in May 2024 and dedicated for Embedded [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T14:48:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-28T08:27:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2107\" \/>\n\t<meta property=\"og:image:height\" content=\"755\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm\",\"datePublished\":\"2024-05-14T14:48:58+00:00\",\"dateModified\":\"2024-10-28T08:27:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/\"},\"wordCount\":1973,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg\",\"articleSection\":[\"Cyber\",\"Hacking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/\",\"name\":\"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg\",\"datePublished\":\"2024-05-14T14:48:58+00:00\",\"dateModified\":\"2024-10-28T08:27:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg\",\"width\":2107,\"height\":755},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/","og_locale":"en_US","og_type":"article","og_title":"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm - Space &amp; Cybersecurity Info","og_description":"Introduction In this article, I will show how I used the MITRE EMB3D\u2122 Threat Model to identify vulnerabilities in SIEMENS PLCs that were exploited by the Stuxnet worm to sabotage the Iran&#8217;s nuclear centrifuges. About the\u00a0MITRE EMB3D\u2122 Threat Model EMB3D\u2122 is a Cybersecurity Threat Model release by MITRE in May 2024 and dedicated for Embedded [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2024-05-14T14:48:58+00:00","article_modified_time":"2024-10-28T08:27:59+00:00","og_image":[{"width":2107,"height":755,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm","datePublished":"2024-05-14T14:48:58+00:00","dateModified":"2024-10-28T08:27:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/"},"wordCount":1973,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg","articleSection":["Cyber","Hacking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/","url":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/","name":"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg","datePublished":"2024-05-14T14:48:58+00:00","dateModified":"2024-10-28T08:27:59+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-Threat-Heat-Map-for-Siemens-S7-PLCs.jpg","width":2107,"height":755},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"How I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2889"}],"version-history":[{"count":7,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2889\/revisions"}],"predecessor-version":[{"id":2964,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2889\/revisions\/2964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2887"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}