B. Bencsath and F. Duqu, Gauss: Followers of Stuxnet, presented at the RSA Conference Europe, 2012.

J. Berger, A dam, small and unsung, is caught up in an Iranian hacking case, The New York Times, 2016.

S. Chan, Cyberattacks strike Saudi Arabia, harming aviation agency, The New York Times, 2016.

A. Cherepanov, WIN32/INDUSTROYER: A New Threat for Industrial Control Systems, p.2017

J. Cox, Department of Defense warns contractors about Iran-linked malware, Motherboard, 2016.

M. Crawford, Utility hack led to security overhaul, Computerworld, February, vol.16, 2006.

C. Dragos, Analysis of the threat to electric grid operations, p.2017

T. Dragos and . Malware, Analysis of safety system targeted malware, p.2017

, Backoff: New Point of Sale Malware, 2014.

, Joint Analysis Report (JAR-16-20296A): GRIZZLY STEPPE -Russian Malicious Cyber Activity, 2016.

, Federal Office for Information Security, The State of IT Security in Germany, 2014.

C. Foreign and . Office, National Cyber Security Centre and Lord Ahmad of Wimbledon, Foreign Office minister condemns Russia for NotPetya attacks, 2018.

J. Fruhlinger, Petya ransomware and NotPetya malware: What you need to know now, CSO, 2017.

B. Gourley, Most violent cyber attack noted to date: 2008 pipeline explosion caused by remote hacking, CTOvision.com, 2014.

. Hazardex, Russian hackers now thought to have caused 2008 Turkish oil pipeline explosion, 2014.

, Turkish oil pipeline explosion may have been Stuxnet precursor, 2008.

S. Hong, Wireless: From Marconi's Black-Box to the Audion, 2001.

G. Hughes, The cyberspace invaders, The Age, 2003.

, Gas pipeline cyber intrusion campaign, ICS-CERT Monthly Monitor, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), p.1, 2012.

, Gas pipeline cyber intrusion campaign -Update, ICS-CERT Monthly Monitor, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2012.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Advisory, 2014.

, Advisory (ICSA-100-238-01B), Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2014.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Advisory, 2014.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Best Practices for Continuity of Operations (Handling Destructive Malware), 2015.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies, 2016.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2016.

, Alert (ICS-ALERT-17-181-01C), Petya Malware Variant (Update C), Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2017.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2017.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2017.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2017.

, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2017.

, Malware Analysis, MAR-17-352-01 HatManSafety System Targeted Malware (Update A), Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2018.

P. Ivanova, Kremlin rejects U.S. accusation that Russia is behind cyber attack, Reuters, 2018.

K. and J. Higgins, Energetic" Bear under the microscope, Dark Reading, 2014.

B. Johnson, D. Caban, M. Krotofil, D. Scali, N. Brubaker et al., Attackers deploy new ICS attack framework "TRITON" and cause operational disruption to critical infrastructure, Threat Research Blog, 2017.

, Resource 207: Kaspersky Lab research proves that Stuxnet and Flame developers are connected, Press Release, Woburn, Massachusetts, 2012.

, Kaspersky Lab discovers "Gauss" -A new complex cyber-threat designed to monitor online banking accounts, 2012.

G. Keizer, Is Stuxnet the "best" malware ever? Computerworld, 2010.

B. Krebs, Target hackers broke in via HVAC company, 2014.

R. Langner, To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve, The Langner Group, 2013.

R. Lee, Closing the case on the reported, SANS Industrial Control Systems Security Blog, SANS Institute, 2008.

R. Lee, M. Assante, and T. Conway, German Steel Mill Cyber Attack, ICS Defense Use Case (DUC), 2014.

R. Lee, M. Assante, and T. Conway, Analysis of the Cyber Attack on the Ukrainian Power Grid, Electricity Information Sharing and Analysis Center (E-ISAC), 2016.

L. Martin, The cyber kill chain, 2018.

V. Lynch, Cost of 2013 Target data breach nears °300 million, Hashed Out, 2017.

N. Maskelyne, Electrical syntony and wireless telegraphy, The Electrician, vol.51, pp.357-360, 1903.

. Mcafee, Global Energy Cyberattacks: Night Dragon, Version 1.4, White Paper, 2011.

A. Mclean, Australia also points finger at Russia for NotPetya, ZDNet, 2018.

, MSS Global Threat Response, Emerging threat: Dragonfly/Energetic Bear -APT Group, Symantec Official Blog, Symantec, Mountain View, California, 2014.

, Fiscal year 2017 ICS assessment summary, ICS-CERT Monitor, pp.3-5, 2017.

, National Cybersecurity and Communications Integration Center (NCCIC) and Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), 2017 ICS-CERT Annual Vulnerability Coordination Report, 2017.

J. O'leary, J. Kimble, K. Vanderlee, and N. Fraser, Insights into Iranian cyber espionage: APT33 targets aerospace and energy sectors and has ties to destructive malware, Threat Research Blog, 2017.

A. Ozment and G. Touhill, DHS works with critical infrastructure owners and operators to raise awareness of cyber threats, Public Statement, 2016.

N. Perlroth, cyberattack on Saudi firm, 2012.

P. Polityuk, Ukraine to probe suspected Russian cyber attack on grid, Reuters, 2015.

S. Prokupecz, T. Kopan, and S. Moghe, Former official: Iranians hacked into New York dam, CNN, 2015.

J. Robertson and J. Riley, Mysterious '08 Turkey pipeline blast opened new cyberwar, Bloomberg, 2014.

, Dragonfly: Western energy sector targeted by sophisticated attack group, Security Response Attack Investigation Team, 2017.

J. Slay and M. Miller, Lessons learned from the Maroochy Water breach, pp.73-82, 2007.

T. Smith, Hacker jailed for revenge sewage attacks, The Register, 2001.

S. Security-response and W. Duqu, The Precursor to the Next Stuxnet, Version 1.4, Symantec, 2011.

S. Security-response, The Shamoon attacks, Symantec Official Blog, 2012.

S. Security-response, Shamoon: Multi-staged destructive attacks limited to specific targets, Symantec Official Blog, 2017.

S. Security-response, New malware threatens industrial safety systems, Threat Intelligence Blog, 2017.

H. Tanriverdi, Die Tatwaffe fehlt (The murder weapon is missing), Sueddeutsche Zeitung, 2015.

K. Tass and . Slams, Russophobic" allegations that pin NotPetya cyber attack on Russia, 2018.

. The-white-house, Statement from the Press Secretary, 2018.

D. Turner, Prepared Testimony and Statement for the Record of Dean Turner, Director, Global Intelligence Network, Symantec Security Response, Symantec Corporation, Hearing on Securing Critical Infrastructure in the Age of Stuxnet, Committee on Homeland Security and Governmental Affairs, 2010.

, Alert (TA17-163A), 2017.

, Advanced Persistent Threat Targeting Energy and Other Critical Infrastructure Sectors, 2018.

A. Fathi, United States District Court, 2016.

. Verizon, Data Breach Digest: Scenarios from the Field, 2016.

D. Volz and S. Young, White House blames Russia for "reckless" NotPetya cyber attack, Reuters, 2018.

S. Ward, ModPoS: Highly-sophisticated, stealthy malware targeting U.S. PoS systems with high likelihood of broader campaigns, Threat Research Blog, 2015.

D. Yadron and P. Ziobro, Before Target, they hacked the heating guy, The Wall Street Journal, 2014.

K. Zetter, How digital detectives deciphered Stuxnet, the most menacing malware in history, Wired, 2011.

K. Zetter, Qatari gas company hit with virus in wave of attacks on energy companies, Wired, 2012.

K. Zetter, The malware that duped Target has been found, Wired, 2014.

K. Zetter, An unprecedented look at Stuxnet, the world's first digital weapon, Wired, 2014.

K. Zetter, Attackers stole certificate from Foxconn to hack Kaspersky with Duqu 2.0, Wired, 2015.

K. Zetter, Everything we know about Ukraine's power plant hack, Wired, 2016.

K. Zetter, Inside the cunning, unprecedented hack of Ukraine's power grid, Wired, 2016.

N. Zinets, Ukraine hit by 6,500 hack attacks, sees Russian "cyberwar, 2016.