Wednesday, March 19, 2025
HomeCyber Security NewsCaldera: A New Security Tool to Emulate Attacks in Critical Infrastructure

Caldera: A New Security Tool to Emulate Attacks in Critical Infrastructure

Published on

SIEM as a Service

Follow Us on Google News

MITRE has CISA (America’s cyber defense agency) unveiled a collection of plugins designed to extend the capabilities of Caldera into the Operational Technology (OT) environment. 

MITRE Caldera is a cyber security platform designed to easily automate adversary emulation, assist manual red teams, and automate incident response.

These plugins promise to bolster the defense mechanisms and testing capabilities within critical infrastructure systems.

Contained within the “caldera-ot” repository, these plugins serve as essential tools for securing OT environments. 

They are available as Git submodules, making them easily accessible to security professionals and researchers.

Installation Made Simple

To install the full suite of Caldera for OT plugins, users can employ the following command:

git clone https://github.com/mitre/caldera-ot.git --recursive

Alternatively, individuals can set up specific plugins individually, tailoring their OT security approach to their precise needs. 

Currently, three key plugins are available:

  • BACnet Catering to Building Automation and Control Networks (BACnet) protocol.
  • DNP Addressing the Distributed Network Protocol 3 (DNP3).
  • Modbus Supporting the Modbus protocol.

These plugins are poised to bring a new level of sophistication and customization to OT security strategies.

Unifying and Exposing Open-Source OT Protocol Libraries

MITRE’s Caldera for OT plugins serves to unify and expose open-source OT protocol libraries, offering them as protocol-specific plugins. 

Each plugin provides comprehensive documentation, including high-level README.md files, source code-specific README.md files under /src, and Caldera Field Manual documentation under /docs.

Enhanced Security and Training

The motivation behind these plugins lies in enabling adversary emulation within the OT environment. 

This empowers organizations to bolster their security defenses and prepare for potential threats effectively. 

Moreover, it supports traditional Caldera use cases, such as operator training and comprehensive testing of security measures.

MITRE’s initiative represents a significant step forward in the ongoing effort to safeguard critical infrastructure systems and bolster security within the OT realm. 

For those seeking more detailed information, MITRE has also provided a presentation on “Emulating Adversary Actions in the Operational Environment with Caldera (TM) for OT.”

Stay tuned for further updates as the security community explores the potential of these Caldera for OT plugins in fortifying critical infrastructure against emerging threats.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace...

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old...

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware....

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology's DiskStation Manager (DSM) has been disclosed, allowing remote attackers...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace...

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old...

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware....