Threat-Led Defense commentary: Ensure OT assets use robust authentication procedures, and implement MFA wherever possible; establish an allowlist that permits only authorized device IP or MAC addresses; and enable control system security features that can separate and audit view and control functions.
Threat-Led Defense commentary: Monitor for control servers exposing only 22/TCP (SSH) and 80/TCP (HTTP), as DDoSia infrastructure typically has minimal public service exposure. Track and block known DDoSia control server IPs, which are often hosted on Virtual Private Servers at providers such as Azea (AEZA-AS), HostVDS (AS56971), and others. (Researchers shared a list of observed control servers on GitHub here.)