{"id":69097,"date":"2025-06-23T17:21:14","date_gmt":"2025-06-23T15:21:14","guid":{"rendered":"https:\/\/fhi.nl\/?page_id=69097"},"modified":"2025-09-25T13:25:06","modified_gmt":"2025-09-25T11:25:06","slug":"unpacking-frostygoop-ot-malware-dissection-detection","status":"publish","type":"page","link":"https:\/\/fhi.nl\/en\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/","title":{"rendered":"OT security in practice: detecting and responding to real threats"},"content":{"rendered":"<header id=\"header\" class=\"header header--low header--branch\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h6 class=\"header__subtitle\">Lex Crielaars \u2013 mnemonic<\/h6>\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tOT security in practice: detecting and responding to real threats\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__description\">\n\t\t\t\t\t\t\t<p>October 8 \u2013 1931 Congress Center &#039;s Hertogenbosch<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<div class=\"image-text bg--offwhite\">\n\t<div class=\"container\">\n\t\t<div class=\"image-text__wrapper image-text__wrapper--reverse\">\n\t\t\t<div class=\"image-text-image image-text-image--default\">\n\t\t\t\t\t\t\t\t\t<svg width=\"551\" height=\"326\" viewbox=\"0 0 551 326\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M539.801 241.758a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-5.29 5.287 5.29 5.29 0 0 1-5.29-5.287Zm-38.199-.002a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.969 4.965 4.968 4.968 0 0 1-9.937 0Zm-38.204.001a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.199.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.183-.004a4.004 4.004 0 0 1 8.009 0 4.005 4.005 0 0 1-8.009 0Zm-38.2.006a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.191-.002a3.361 3.361 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.211.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm-38.199-.002a2.397 2.397 0 1 1 4.793.001 2.397 2.397 0 0 1-4.793-.001Zm-38.192-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm-38.203-.001a1.754 1.754 0 1 1 3.509.003 1.754 1.754 0 0 1-3.509-.003Zm-38.191.001a1.433 1.433 0 1 1 2.865.002 1.433 1.433 0 0 1-2.865-.002Zm458.375 39.376a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-5.29 5.287 5.29 5.29 0 0 1-5.29-5.287Zm-38.199.001a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.969 4.965 4.968 4.968 0 0 1-9.937 0Zm-38.204-.002a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.199.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.183-.002a4.004 4.004 0 0 1 8.009 0 4.005 4.005 0 0 1-8.009 0Zm-38.2.001a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.191.001a3.361 3.361 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.211.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm-38.199-.002a2.397 2.397 0 1 1 4.793.001 2.397 2.397 0 0 1-4.793-.001Zm-38.192-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm-38.203-.001a1.754 1.754 0 1 1 3.509.003 1.754 1.754 0 0 1-3.509-.003Zm-38.191.001a1.433 1.433 0 1 1 2.865.002 1.433 1.433 0 0 1-2.865-.002Zm458.375 39.392a5.29 5.29 0 0 1 5.29-5.287 5.29 5.29 0 0 1 5.29 5.287 5.29 5.29 0 0 1-5.29 5.287 5.29 5.29 0 0 1-5.29-5.287Zm-38.199-.002a4.969 4.969 0 0 1 9.937 0 4.968 4.968 0 0 1-4.969 4.965 4.968 4.968 0 0 1-4.968-4.965Zm-38.204.001a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.199.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.183-.004a4.004 4.004 0 0 1 8.009 0 4.004 4.004 0 0 1-4.005 4.001 4.003 4.003 0 0 1-4.004-4.001Zm-38.2.003a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.191 0a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.211.001a2.719 2.719 0 0 1 5.437 0 2.718 2.718 0 0 1-5.437 0Zm-38.199-.002a2.397 2.397 0 1 1 4.794.002 2.397 2.397 0 0 1-4.794-.002Zm-38.192-.001c0-1.146.93-2.074 2.076-2.074a2.075 2.075 0 1 1-2.076 2.074Zm-38.203 0a1.754 1.754 0 0 1 3.509 0 1.754 1.754 0 0 1-3.509 0Zm-38.191.001a1.433 1.433 0 1 1 2.865.002 1.433 1.433 0 0 1-2.865-.002ZM462.227 5.287a5.29 5.29 0 0 1 10.58 0 5.29 5.29 0 0 1-10.58 0Zm-38.196-.002a4.969 4.969 0 0 1 9.938 0 4.969 4.969 0 0 1-9.938 0Zm-38.207 0a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.207.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.172-.002a4.005 4.005 0 0 1 8.009 0 4.005 4.005 0 0 1-8.009 0Zm-38.203.006a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.187-.004a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.215.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm-38.207-.002a2.397 2.397 0 1 1 4.794.002 2.397 2.397 0 0 1-4.794-.002Zm-38.184-.001a2.076 2.076 0 1 1 4.152.002 2.076 2.076 0 0 1-4.152-.002Zm-38.203 0a1.754 1.754 0 1 1 3.509.002 1.754 1.754 0 0 1-3.509-.002Zm-38.191.001a1.433 1.433 0 1 1 2.865.001 1.433 1.433 0 0 1-2.865-.001Zm458.375 39.378a5.29 5.29 0 0 1 10.58 0 5.29 5.29 0 0 1-10.58 0Zm-38.196-.001a4.969 4.969 0 0 1 9.938 0 4.969 4.969 0 0 1-9.938 0Zm-38.207 0a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.207.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.172-.002a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm-38.203.004a3.683 3.683 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm-38.187-.002a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.215.001a2.718 2.718 0 0 1 5.437 0 2.718 2.718 0 0 1-5.437 0Zm-38.207-.002a2.397 2.397 0 1 1 4.794.002 2.397 2.397 0 0 1-4.794-.002Zm-38.184-.001a2.076 2.076 0 1 1 4.152.002 2.076 2.076 0 0 1-4.152-.002Zm-38.203 0a1.754 1.754 0 1 1 3.509.002 1.754 1.754 0 0 1-3.509-.002Zm-38.191.001a1.433 1.433 0 1 1 2.865.001 1.433 1.433 0 0 1-2.865-.001ZM0 202.38a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-10.58 0Zm38.848.001a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.97 4.965 4.968 4.968 0 0 1-9.938 0Zm38.828-.002a4.647 4.647 0 0 1 4.647-4.644 4.647 4.647 0 0 1 4.647 4.644 4.647 4.647 0 0 1-4.647 4.644 4.647 4.647 0 0 1-4.647-4.644Zm38.836.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.002a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm38.856.001a3.683 3.683 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm38.832.001a3.361 3.361 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.396 2.396 0 0 1-2.397 2.395 2.397 2.397 0 0 1-2.398-2.395Zm38.832-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm38.832 0a1.754 1.754 0 1 1 3.509.001 1.754 1.754 0 0 1-3.509-.001Zm38.848-.002a1.433 1.433 0 1 1 2.867.003 1.433 1.433 0 0 1-2.867-.003ZM0 162.993a5.29 5.29 0 0 1 10.58 0 5.29 5.29 0 0 1-5.29 5.286A5.29 5.29 0 0 1 0 162.993Zm38.848-.002a4.968 4.968 0 0 1 9.937 0 4.968 4.968 0 0 1-4.969 4.965 4.968 4.968 0 0 1-4.968-4.965Zm38.828.001a4.647 4.647 0 0 1 9.294 0 4.647 4.647 0 0 1-9.294 0Zm38.836 0a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.004a4.004 4.004 0 0 1 4.005-4.001 4.003 4.003 0 0 1 4.004 4.001 4.004 4.004 0 0 1-8.009 0Zm38.856.003a3.682 3.682 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm38.832.001a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.397 2.397 0 0 1-4.795 0Zm38.832-.001a2.076 2.076 0 0 1 4.152 0c0 1.146-.93 2.074-2.076 2.074a2.075 2.075 0 0 1-2.076-2.074Zm38.832 0a1.754 1.754 0 0 1 3.509 0 1.754 1.754 0 0 1-3.509 0Zm38.848-.001a1.433 1.433 0 1 1 2.865.001 1.433 1.433 0 0 1-2.865-.001ZM0 123.424a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-10.58 0Zm38.848-.002a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.97 4.965 4.968 4.968 0 0 1-9.938 0Zm38.828.001a4.647 4.647 0 0 1 4.647-4.644 4.647 4.647 0 0 1 4.647 4.644 4.647 4.647 0 0 1-4.647 4.644 4.647 4.647 0 0 1-4.647-4.644Zm38.836.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.004a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm38.856.003a3.683 3.683 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm38.832.001a3.362 3.362 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.396 2.396 0 0 1-2.397 2.395 2.397 2.397 0 0 1-2.398-2.395Zm38.832-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm38.832-.001a1.754 1.754 0 1 1 3.509.003 1.754 1.754 0 0 1-3.509-.003Zm38.848-.001a1.433 1.433 0 1 1 2.867.003 1.433 1.433 0 0 1-2.867-.003ZM0 84.037a5.29 5.29 0 0 1 5.29-5.287 5.29 5.29 0 0 1 5.29 5.287 5.29 5.29 0 0 1-5.29 5.286A5.29 5.29 0 0 1 0 84.037Zm38.848 0a4.968 4.968 0 0 1 9.937 0 4.968 4.968 0 0 1-4.969 4.966 4.968 4.968 0 0 1-4.968-4.966Zm38.828-.002a4.647 4.647 0 0 1 9.294 0 4.647 4.647 0 0 1-9.294 0Zm38.836.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.001a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm38.856 0a3.682 3.682 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm38.832.001a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.397 2.397 0 0 1-4.795 0Zm38.832-.001a2.076 2.076 0 1 1 4.151.002 2.076 2.076 0 0 1-4.151-.002Zm38.832 0a1.754 1.754 0 1 1 3.509.002 1.754 1.754 0 0 1-3.509-.002Zm38.848-.001a1.433 1.433 0 1 1 2.866.001 1.433 1.433 0 0 1-2.866-.001Z\" fill=\"#2A5CEE\"\/><\/svg>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"image-text-content\">\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='image-text-content__title'>11:30 \u2013 11:55 am<\/h2><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"image-text-content__text\"><p>When 600 apartment buildings in Ukraine lost heating during a harsh winter, the cause wasn&#039;t missiles \u2013 it was OT malware.<\/p>\n<p>Cybersecurity in OT is not just about protecting data; it is about ensuring resilience, withstanding disruption, and maintaining essential operations under adverse conditions. In OT environments, priorities shift from confidentiality to availability, safety, and the robustness of physical processes. With the digitalization of industry and an increasingly volatile geopolitical climate, the risks of espionage and disruptive attacks have grown significantly.<\/p>\n<p>In this session, we will explore how a specific OT malware case was identified, how its behavior was analyzed, and what insights were gained from dissecting it. Most importantly, we will demonstrate how you can strengthen detection strategies to stay at least one step ahead of threat actors seeking to disrupt your operations.<\/p>\n<p><em>Speaker: Lex Crielaars \u2013 IT\/OT Cybersecurity Advisor, mnemonic<\/em><\/p>\n<p><img decoding=\"async\" class=\"size-medium wp-image-73186 alignnone\" style=\"font-size: 16px; letter-spacing: -0.32px;\" src=\"https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-300x200.jpg\" alt=\"Lex Crielaars\" width=\"300\" height=\"200\" srcset=\"https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-300x200.jpg 300w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-1024x683.jpg 1024w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-768x512.jpg 768w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-1536x1024.jpg 1536w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-18x12.jpg 18w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-1620x1080.jpg 1620w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-576x384.jpg 576w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-425x283.jpg 425w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-960x640.jpg 960w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-200x133.jpg 200w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6-1280x853.jpg 1280w, https:\/\/fhi.nl\/app\/uploads\/2025\/09\/201217-Mnemonic-AS\u00a9Verkijk-6.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><a class=\"button button--secondary\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/programma\/\">Back to the program overview<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":62,"featured_media":0,"parent":22797,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"branches":[12],"events":[352],"secretariat":[],"categories":[],"themes_tax":[],"class_list":["post-69097","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OT security in practice: detecting and responding to real threats - FHI, federatie van technologiebranches<\/title>\n<meta name=\"description\" content=\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.Het Industrial Cybersecurity Event brengt experts en professionals uit verschillende sectoren samen om kennis te delen en te leren over de meest recente innovaties en ontwikkelingen op het gebied van industri\u00eble beveiliging. Met een uitgebreid programma van seminars, workshops en paneldiscussies biedt dit evenement diepgaande inzichten en praktische oplossingen voor de uitdagingen van vandaag en morgen.Met meer dan 200 exposanten is het Industrial Cybersecurity Event d\u00e9 plek om geavanceerde beveiligingstechnologie\u00ebn en -diensten te verkennen. Bezoekers krijgen de kans om direct in contact te komen met toonaangevende bedrijven en experts en om nieuwe partnerschappen en zakelijke kansen te ontdekken.Ontdek hoe je jouw organisatie kunt beschermen tegen de groeiende dreigingen en blijf voorop lopen in een snel veranderend digitaal landschap. Beveilig je toekomst \u2013 Bezoek het Industrial Cybersecurity Event!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OT security in practice: detecting and responding to real threats - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:description\" content=\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.Het Industrial Cybersecurity Event brengt experts en professionals uit verschillende sectoren samen om kennis te delen en te leren over de meest recente innovaties en ontwikkelingen op het gebied van industri\u00eble beveiliging. Met een uitgebreid programma van seminars, workshops en paneldiscussies biedt dit evenement diepgaande inzichten en praktische oplossingen voor de uitdagingen van vandaag en morgen.Met meer dan 200 exposanten is het Industrial Cybersecurity Event d\u00e9 plek om geavanceerde beveiligingstechnologie\u00ebn en -diensten te verkennen. Bezoekers krijgen de kans om direct in contact te komen met toonaangevende bedrijven en experts en om nieuwe partnerschappen en zakelijke kansen te ontdekken.Ontdek hoe je jouw organisatie kunt beschermen tegen de groeiende dreigingen en blijf voorop lopen in een snel veranderend digitaal landschap. Beveilig je toekomst \u2013 Bezoek het Industrial Cybersecurity Event!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T11:25:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/\",\"url\":\"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/\",\"name\":\"OT security in practice: detecting and responding to real threats - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"datePublished\":\"2025-06-23T15:21:14+00:00\",\"dateModified\":\"2025-09-25T11:25:06+00:00\",\"description\":\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.Het Industrial Cybersecurity Event brengt experts en professionals uit verschillende sectoren samen om kennis te delen en te leren over de meest recente innovaties en ontwikkelingen op het gebied van industri\u00eble beveiliging. Met een uitgebreid programma van seminars, workshops en paneldiscussies biedt dit evenement diepgaande inzichten en praktische oplossingen voor de uitdagingen van vandaag en morgen.Met meer dan 200 exposanten is het Industrial Cybersecurity Event d\u00e9 plek om geavanceerde beveiligingstechnologie\u00ebn en -diensten te verkennen. Bezoekers krijgen de kans om direct in contact te komen met toonaangevende bedrijven en experts en om nieuwe partnerschappen en zakelijke kansen te ontdekken.Ontdek hoe je jouw organisatie kunt beschermen tegen de groeiende dreigingen en blijf voorop lopen in een snel veranderend digitaal landschap. Beveilig je toekomst \u2013 Bezoek het Industrial Cybersecurity Event!\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Cyber Security\",\"item\":\"https:\/\/fhi.nl\/industrialcybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OT security in practice: detecting and responding to real threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OT security in practice: detecting and responding to real threats - FHI, federation of technology industries","description":"Enter the world of cybersecurity at the Industrial Cybersecurity Event, organized by FHI. This event highlights the most pressing cybersecurity issues in industry. Discover whether your company is sufficiently cybersecure and identify challenges in the crucial collaboration between IT and OT departments. Learn how to capitalize on digital innovations while maintaining control over information security, and discover how to apply regulations, including implementing relevant standards. The Industrial Cybersecurity Event brings together experts and professionals from various sectors to share knowledge and learn about the latest innovations and developments in industrial security. With a comprehensive program of seminars, workshops, and panel discussions, this event offers in-depth insights and practical solutions for the challenges of today and tomorrow. With more than 200 exhibitors, the Industrial Cybersecurity Event is the place to explore cutting-edge security technologies and services. Visitors will have the opportunity to connect directly with leading companies and experts and discover new partnerships and business opportunities. Discover how to protect your organization against growing threats and stay ahead in a rapidly changing digital landscape. Secure your future \u2013 Visit the Industrial Cybersecurity Event!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/","og_locale":"en_GB","og_type":"article","og_title":"OT security in practice: detecting and responding to real threats - FHI, federatie van technologiebranches","og_description":"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.Het Industrial Cybersecurity Event brengt experts en professionals uit verschillende sectoren samen om kennis te delen en te leren over de meest recente innovaties en ontwikkelingen op het gebied van industri\u00eble beveiliging. Met een uitgebreid programma van seminars, workshops en paneldiscussies biedt dit evenement diepgaande inzichten en praktische oplossingen voor de uitdagingen van vandaag en morgen.Met meer dan 200 exposanten is het Industrial Cybersecurity Event d\u00e9 plek om geavanceerde beveiligingstechnologie\u00ebn en -diensten te verkennen. Bezoekers krijgen de kans om direct in contact te komen met toonaangevende bedrijven en experts en om nieuwe partnerschappen en zakelijke kansen te ontdekken.Ontdek hoe je jouw organisatie kunt beschermen tegen de groeiende dreigingen en blijf voorop lopen in een snel veranderend digitaal landschap. Beveilig je toekomst \u2013 Bezoek het Industrial Cybersecurity Event!","og_url":"https:\/\/fhi.nl\/en\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2025-09-25T11:25:06+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/","url":"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/","name":"OT security in practice: detecting and responding to real threats - FHI, federation of technology industries","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"datePublished":"2025-06-23T15:21:14+00:00","dateModified":"2025-09-25T11:25:06+00:00","description":"Enter the world of cybersecurity at the Industrial Cybersecurity Event, organized by FHI. This event highlights the most pressing cybersecurity issues in industry. Discover whether your company is sufficiently cybersecure and identify challenges in the crucial collaboration between IT and OT departments. Learn how to capitalize on digital innovations while maintaining control over information security, and discover how to apply regulations, including implementing relevant standards. The Industrial Cybersecurity Event brings together experts and professionals from various sectors to share knowledge and learn about the latest innovations and developments in industrial security. With a comprehensive program of seminars, workshops, and panel discussions, this event offers in-depth insights and practical solutions for the challenges of today and tomorrow. With more than 200 exhibitors, the Industrial Cybersecurity Event is the place to explore cutting-edge security technologies and services. Visitors will have the opportunity to connect directly with leading companies and experts and discover new partnerships and business opportunities. Discover how to protect your organization against growing threats and stay ahead in a rapidly changing digital landscape. Secure your future \u2013 Visit the Industrial Cybersecurity Event!","breadcrumb":{"@id":"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Industrial Cyber Security","item":"https:\/\/fhi.nl\/industrialcybersecurity\/"},{"@type":"ListItem","position":3,"name":"OT security in practice: detecting and responding to real threats"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/69097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/comments?post=69097"}],"version-history":[{"count":7,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/69097\/revisions"}],"predecessor-version":[{"id":73435,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/69097\/revisions\/73435"}],"up":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/22797"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=69097"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=69097"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=69097"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=69097"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=69097"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=69097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}