nexus_samir.jpg
Industrial
Cyber Resilience
Operational Resilience
Operational Technology
Risk Management

Nexus Podcast: MITRE on Caldera for OT Adversary Emulation

Michael Mimoso
/
Apr 29, 2026

Subscribe and listen to the Nexus podcast on your favorite platform.

Samir Boussarhane, senior cybersecurity engineer at MITRE, joins the Nexus Podcast to discuss new simulator plug-ins added to Caldera for OT. Caldera for OT is an open-source adversary emulation platform that automates security assessments for operational technology (OT) systems. 

Samir provides context on a new simulator called the Aloha Water Treatment plant, which emulates a water utility and serves as a training platform for students, engineers, and IT security teams alike. Caldera for OT now also supports protocols such as BACnet, Modbus, and includes an HVAC simulator.

Access the Aloha Water Treatment simulator.  

Medium article on the Aloha Water Treatment simulator.

Episode Transcript with Samir Boussarhane

00:01.85

Michael Mimoso

all right, welcome back to the Nexus podcast. Samir Boussarhane of MITRE is my guest. And we're going to talk about Caldera for OT. Caldera for OT is an open source adversary emulation platform designed to test security defenses in OT environments. There have been some recent updates for the platform, and that's what we're going to spend some time talking about. um Before we jump into the episode, though, I hope you've been enjoying the great guests we've had on.

00:29.78

Michael Mimoso

Since the start of the year, um the best way to keep up with the show is really just to subscribe naturally. And we are on every major platform, whether it's Apple, Spotify, Audible, Amazon, you name it.

00:40.98

Michael Mimoso

ah Pretty easy to find out there. So if you have not subscribed yet, please do. It really helps out the show. um So let's get started. Bring in Samir. are you doing, man? Good to see you.

00:51.86

Samir Boussarhane

Doing good and happy to be here.

00:53.66

Michael Mimoso

Thank you. Yeah. Thanks for for taking the time. I appreciate it. um Before we jump in, kind of maybe introduce yourself a little bit to the listeners and maybe talk about your role with the within MITRE and Caldera for OT specifically.

01:07.06

Samir Boussarhane

Sure. I'm Sam Booster-Hahn. I've been with MITRE for about three or four years, supporting the CADERRA team and lot of OT research that we're developing. ah Some part of my role is for the simulators we're talking about today, lead development for that.

01:24.22

Samir Boussarhane

We have the Aloha water treatment simulator. That's a water treatment plant supporting Modbus and BACnet. And then more recently, we had a HVAC simulator for BACnet building automation controls that came out and involved with leading research at the University of Hawaii to develop those.

01:42.16

Michael Mimoso

It's pretty cool stuff. I mean, these there's been a lot of talk. I know I was at the S4 conference and I know that there were a lot of discussion discussions about these attack emulation platforms and how they're really gaining some prominence among some of the OT folks. So pretty yeah pretty timely research and and projects on your end. I'm sure you're hearing the same kind of feedback.

02:05.20

Samir Boussarhane

Yeah, and especially with the recent Sysa directory targeting OT devices feels very timely.

02:12.09

Michael Mimoso

Yeah, for sure. um Before we get into kind of the new simulator and and some of those updates, maybe you could cover just exactly for some listeners that might not be familiar, explain exactly what Caldera for OT is, who uses it, how they use it.

02:27.48

Michael Mimoso

Just take me in from a high level what what it's all about.

02:30.87

Samir Boussarhane

Sure, so Caldera for OT is a plugin and extension for Caldera. Caldera is like an open source adversary relation platform that MITRE helps develop. With that, anyone can download this off the GitHub and you set up your server, you have agents and you can deploy attacks, the payloads, the adversary abilities, the TTPs, map to attack are all there, available open source, and you can customize, you can add your own abilities, open source, and we'd love to see if we're getting anybody to contribute and commit back to MITRE.

03:00.09

Samir Boussarhane

The OT and plugin has for like, when you're looking at Caldera for Caldera in general, it's more IT based OT. We're extending that to have your protocol specific payloads, your adversary and relation capabilities.

03:11.96

Samir Boussarhane

So there's plugins right now for BACnet, Modbus, DMP3, Profinet. And all of those are very, very specific as opposed to IT t where we have a lot more coverage.

03:22.52

Samir Boussarhane

So we're trying to make it as easy as possible. If you want to run adversary capabilities for defenders, red teamers, purple teamers, you can just download these payloads, execute them against your OT infrastructure.

03:33.84

Samir Boussarhane

If you don't have OT infrastructure, we're trying to make these simulators so you can still test your detections and learn adversary like tradecraft and OT space.

03:42.55

Michael Mimoso

And so what are the inputs, so to speak, or ah or the threat intel sources? Are you guys specifically sticking to MITRE ATT&CK for ICS, for example, or um ah what are some of the other input sources?

03:55.64

Samir Boussarhane

Right. So for the OT space, ah the Intel doesn't always necessarily get to a specific like, hey, adversary X ran this TTP or this protocol function.

04:06.90

Samir Boussarhane

So we try to have as much coverage as we can within the protocol and then map to attack for ICS as far as the impact. So for like an OT process, we want be able to read and write to affect the process.

04:17.53

Samir Boussarhane

We can map that to attack and make sure for our abilities that you're able to modify memory on the OT device. And then from there, you can say, all right, if I was an adversary, I'd want change this to turn on this valve.

04:30.11

Samir Boussarhane

That's more of the like, thread informed based on how you can impact, not necessarily like a one for one command line that here's what the adversary ran. Just make sure we have the ability to perform data manipulations or read the vice configurations within the protocol.

04:46.02

Michael Mimoso

And what's a typical, or who is a typical user for for this platform?

04:53.59

Samir Boussarhane

Really anyone. So one great application with Caldera that I've been doing University Hawaii is education and training. I didn't personally learn any OT when I was in undergrad or graduate school, and it's not necessarily covered in all curriculums.

05:08.67

Samir Boussarhane

So being able to put those in payloads, put them in a pretty package, put them in Python scripts that just download. have students able to click a button, see their adversary emulation happen, see the outputs.

05:20.68

Samir Boussarhane

It's great for training and exercise. Like if you're trying to do a large scale exercise and automate this, Kether is great tool for that.

05:30.04

Michael Mimoso

So it's not necessarily for a production environment. This is kind of an educational tool or just a, um just kind of a training mechanism, right?

05:40.99

Samir Boussarhane

The payloads and abilities are modular, so you can take them out in your production environment. It's not necessarily best suited for that, but it's like a server and agent architecture, so you could deploy it wherever you want.

05:54.38

Samir Boussarhane

Very, very useful tool for training and new users of the OT tools.

06:00.00

Michael Mimoso

Yeah. Have you heard of any unique use cases that maybe you guys hadn't considered or?

06:08.99

Samir Boussarhane

I have not yet, but simulator's new, and if anyone has any unique use cases, happy to learn about them.

06:14.01

Michael Mimoso

Yeah. And is this the only platform, ah one of these attack emulation platforms that's specific for OT that you're aware of or are there others?

06:26.53

Samir Boussarhane

As far as free and open source, this is the only one I'm currently aware of. I know there are other out there that aren't necessarily those.

06:35.35

Michael Mimoso

And what what are the kind of the drivers, the need for this, for such a platform? Is it, um you know, like I know there's always a concern about getting your hands on actual PLCs to do testing. You don't want to touch your production environment.

06:51.99

Michael Mimoso

um Does that alleviate that concern? What are some of the drivers for this?

06:56.57

Samir Boussarhane

Right, that was the main driver with the simulators that we developed. We were going out to exercise and show our new OT capabilities where we had plugins like, all right, here's some updates to Modbus plugins so you can run this against your Modbus PLCs, updates to BACnet plugins so you can and run these against your BACnet PLCs.

07:14.65

Samir Boussarhane

As we started doing more workshops, we realized that not necessarily everyone had PLCs and those can be very expensive.

07:15.95

Michael Mimoso

Thank you.

07:20.62

Samir Boussarhane

If you ever go on eBay, you can see them go from hundreds of dollars to thousands of dollars very quickly. So we wanted to make those simulators to where now we can lower the barrier of entry and into OT security and have free open source Python scripts that will behave as a realistic simulator in like PLC.

07:39.34

Samir Boussarhane

It's not going to get into those vendor specific functions that PLCs would have, depending on the vendor, but general reading and writing and memory operations will get to be able to cover that.

07:50.57

Samir Boussarhane

And we're able to see that go across networks so we can build better detections.

07:55.48

Michael Mimoso

So as the users running this, what are what are they seeing? I guess what are the outputs that they would expect to see? Are they seeing and like a simulated environment and values changing or what's the what's the output that they see?

08:08.75

Samir Boussarhane

Yeah, so for Aloha Water Treatment Plant and HVACSIM, there's Python scripts you run and they're just servers. So with the servers, there is like a graphical interface where you can change the values.

08:19.55

Samir Boussarhane

So for Aloha, you can change the inflow rate, the outflow rate, and then in the visualization, you see how the process is affected. ah You can use those as an endpoint for any adversary like tool you have that's OT-specific.

08:31.62

Samir Boussarhane

So I could take my category for OT. I could take a custom-made Modbus client and perform writes against that. And then I will see on the process how that changes.

08:41.96

Michael Mimoso

Mm-hmm.

08:42.94

Samir Boussarhane

So really so like serving as an endpoint to where now I can see just using OT-specific functions, protocol, communication, how my processes changed. And then if you have like Wireshark in the background or whatever you want to use for network traffic analysis, we can see how these different protocol commands are sent across network, how responses are done, how discovery functions are working.

09:08.66

Samir Boussarhane

Instead of just having adversary emulation platform send out these commands and their responses, now we can see like more realistic behaviors.

09:17.14

Michael Mimoso

And can users feed like their own samples of their own traffic to the the platform or is it kind of generic?

09:27.35

Samir Boussarhane

Yeah, so when we say traffic, um we're not actually like recording traffic. It's more of a the server sends its endpoint it'll take any responses. So you could just throw with random responses at it and see how that breaks it.

09:41.88

Samir Boussarhane

But it's just like giving realistic responses back to it based on protocol specification. So any user could take any like client they want and just attack it and test. But we're not in Caldera itself inputting traffic. It's more of a the simulators that respond to anything it gets.

09:58.14

Michael Mimoso

Got it. Okay. right. So let's talk about the Aloha water treatment plant. um Basically, what was kind of the the driver for this one? It mimics a ah water storage tank, correct?

10:09.58

Samir Boussarhane

It's a water treatment plant where very simple. It has your intake for your water, goes through a filter and a center and then outtake. Then you can manipulate those two.

10:20.50

Samir Boussarhane

Then there's an auto mode that tries to keep it around two thirds full, manual mode where you can, wherever you set the inflow and outtake, it overhauls that for the physics. ah That was really just designed as a effort when University of Hawaii but were giving OT lectures and It's very easy to explain like, hey, here's how this works, or the PLC right in front of you.

10:41.46

Samir Boussarhane

But if you want to go home and learn more about OT security and you don't have one of those expensive PLCs, that was a big barrier that we were getting responses saying like, oh, this is really cool, but I don't have the hundreds of dollars spend on the PLC randomly.

10:53.77

Samir Boussarhane

So that's what we developed that for. And then students were able to learn at home and then see the nice like GUI visualization of how their different commands were affecting process.

11:07.92

Michael Mimoso

And so as it as it as it runs, as it works, what can it tell a defender? I mean, what does the platform tell users kind of like about different protocol activity, vulnerabilities, dependencies, et cetera?

11:25.12

Samir Boussarhane

Right. So on the platform itself, the visualization will warn you if you're getting to what the process defines as a like critical or warning system. So if the emergency stop activates, the HMI representation will flash a warning.

11:40.66

Samir Boussarhane

Or if you're about to overflow, it'll warn for that or underflow. As far as like network traffic, um it's not flagging it siit f suspicious traffic.

11:53.17

Samir Boussarhane

but One area that we'd like to look to like recommend users look into is have Wireshark open while you're doing this so you can recognize these like packets. So if we go to like the attack for ICS, we know that there are functions and protocols that we want to be more aware of for our defenders. like We want to know any impact process, reads and writes.

12:14.17

Samir Boussarhane

We want to make sure that we're able to see that across network. So go through the cutter for OT, look at how the abilities are mapped to attack for ICS, and you have your high priority abilities that you want to be able to defend against.

12:27.75

Samir Boussarhane

Look at that traffic, and then from there you can learn how you detect that going across network.

12:33.56

Michael Mimoso

Have you heard from folks in, you know, water utilities, wherever they may be, are they using it or is it strictly from students right now?

12:43.03

Samir Boussarhane

I have not. It's been mostly students and people trying to get into OT space right now.

12:49.37

Michael Mimoso

And what do you think are the the biggest benefits of of this kind of platform for, for a student, for example, or from anyone trying to get into OT? Like what does it help visualize or what does it help make clear? I guess.

13:02.37

Samir Boussarhane

Yeah, like ah at least my experience when i was starting to about OT, you felt like very complicated and hard to wrap your head around, especially you're familiar, like ladder logic or these specific protocols that are all can vary vastly.

13:15.70

Samir Boussarhane

Having all that open source, free and well-documented resources that MITRE is producing, I think is a great learning point. ah Like every ability that we have, we document like the inputs for the payload, the outputs for the payload, how this affects protocol, what the,

13:32.54

Samir Boussarhane

resources and like actual specification in the protocol would be. It's a great resource and well-documented way to get into OT. And then the visualization makes it very easy to just run some Python scripts and actually see, OK, so I'm doing these reads and writes against memory.

13:49.75

Samir Boussarhane

Here's how it would actually affect the realistic process.

13:55.19

Michael Mimoso

So you have different simulators ah with, i'm or I'm sorry, you have the same simulator, but with a Modbus and a BACnet plugin. Is that correct?

14:04.93

Samir Boussarhane

Right, so for Aloha, it's the same backend. We just wrote it in two different libraries, PyModbus open source Modbus library, back zero and open source Bacnet library.

14:15.64

Samir Boussarhane

Same process, but you can run it in these different versions to have it respond against those different protocols so you can do your testing. Then there's Bacnet sim, which is more recent, it's like a fan system that's in BACNAP.

14:29.17

Samir Boussarhane

And same thing where you have different process now, like going from water treatment plants to building automation control systems to where you can just run it on Python scripts, run your adversary behaviors against it and get realistic responses back.

14:43.10

Michael Mimoso

And are there different attack scenarios for each of these ah different plugins? I mean what kind of attack scenarios is are is it mimicking or simulating?

14:52.73

Samir Boussarhane

Right, so for we have medium blogs that we released with both of the simulators that go through different attacks scenarios and has graphics on way you should expect it as far as you like walk through it.

15:04.70

Samir Boussarhane

All these hack scenarios really are how can you impact the process? Can you stop the water flow? Can you stop the fans? And what you need to do to do that. So encourage anyone to go through the Medium articles, and we walk through the attack like vectors and what you need to do and what you expect to get out of it.

15:23.83

Michael Mimoso

Yeah, we can link to those in the in the show notes for sure. um Do you see this as useful, ah perhaps as a red teaming exercise or as part of an overall risk assessment, for example, and and why or why not?

15:39.16

Samir Boussarhane

yeah Absolutely. I think, as you mentioned earlier, people get very wary when it comes to testing any sort of red teaming in their productive environment. I think it serves as a very good starting point as a stand-in to where we know it's going to respond to the protocols for our system.

15:55.32

Samir Boussarhane

We know that we need to be able to detect these before they happen. Let's take that over here, build our little sandbox environment, and do our red teaming. and then ask whether are we'd be able to protect this in our actual infrastructure.

16:09.46

Samir Boussarhane

I think it's a good stand-in to try to avoid all those frictions that comes with trying to red team production.

16:15.22

Michael Mimoso

Yeah. um and And just a question about the inclusion of BACnet. Obviously, it's a building management system protocol, pretty well known and well, pretty popular. What what drove you towards including that as a plugin?

16:29.75

Michael Mimoso

um I know we're hearing about a lot of BMS being connected online. Is that kind of the main driver for that or something else?

16:38.52

Samir Boussarhane

That and a few years ago, the large target hack had happened through the building automation system. So we felt that was like a relevant protocol to make sure and we discussed.

16:48.59

Michael Mimoso

Mm-hmm.

16:48.62

Samir Boussarhane

BACnet also has a lot of interesting discovery capabilities that I think are good for new learners to learn. So for one is the whois command where through BACnet device, you run the whois message.

17:01.21

Samir Boussarhane

Any BACnet device on the network responds. So very easy to in the network, recon, figure out where your BACnet devices are. Then you can use the Caldera for OTability Epic Support, point it at those devices, and they'll give you back all their information, all their objects and memory.

17:17.56

Samir Boussarhane

So it's very easy to go as far as like an adversary emulation plan and storyline in BACnet. And it's one of the more beginner-friendly OT protocols, so want to make sure we include coverage for that.

17:30.12

Michael Mimoso

And how would you characterize the overall security of BACnet as a protocol?

17:37.91

Samir Boussarhane

um Difficult question since it really depends on the implementation. Some people have backnet that uses encryption and authentication. um I would say that's not as common as it should be.

17:54.14

Samir Boussarhane

But as far as protocol, it's very easy to learn more information and do your discovery against endpoints. Modbus, the other protocol that Aloha is written in, you kind of have to know more about the design of the system that you're reading against just because it doesn't give you as much information.

18:11.65

Samir Boussarhane

BACnet's great from an adversary standpoint, but difficult for defenders since you're able to give up so much information.

18:18.05

Michael Mimoso

Yeah. And I mean, Modbus isn't necessarily secure by default either. I mean, there are add-ons for security for for that protocol as well, right?

18:27.68

Samir Boussarhane

Right.

18:30.46

Michael Mimoso

and a you And again, in terms of, did this, the inclusion of the BACnet plugin here, did that set the stage for the HVAC Tell me about a little bit about that simulator.

18:44.32

Samir Boussarhane

Right, so with that, the Modbus and Bacnet plugins were pretty much our very much are most well-documented plugins. So we wanted to make sure to include for that.

18:56.29

Samir Boussarhane

And our workshops, GDUH, that's the two protocols we were really briefing on. And then water treatment's not necessarily a Bacnet-specific process. wanted to make something more realistic as far as like building automations.

19:08.38

Samir Boussarhane

And that simulator was actually developed by a student group at University of Hawaii at Manoa. So for their semester research project, they developed that simulator, tested it, and we were able to release it.

19:20.73

Samir Boussarhane

So the students did a great job with that. And we can show that everyone in that group actually had no background in OT at all. And semester, we were able to develop something new, test it, and have a really good product come out.

19:34.03

Michael Mimoso

And just for Caldera for OT in general, is there a best practice in terms of, you know, how often do I run this daily, quarterly, continuously? I mean, what, is there a recommendation or what do you find most useful?

19:52.15

Samir Boussarhane

yeah So as it stands right now, it's not necessarily a like run this every day to elicit like a detection. It's more of a here's how we can exercise. Here's how we can train. Here's how we can test easily.

20:06.54

Samir Boussarhane

um i wouldn't recommend running like reads and writes the introduction equipment every day or anything like that. But if you're wanting to sandbox detections and ping on how often you want to do that, I think it's a great tool for that.

20:12.61

Michael Mimoso

Right.

20:21.72

Michael Mimoso

And do you hear anything about something like this being used for um i t people that are kind of new to OT or now have to manage and and secure OT?

20:34.94

Michael Mimoso

um Have you heard anything anecdotally like that, that people on the IT t side are kind of ah you know, moving over to check out these kinds of platforms and see what they can do with them.

20:46.34

Samir Boussarhane

Yeah, we have plenty of stories like that where we have different organizations that exercise their IT t red teaming. And now with more recent news and CTI coming out about OT systems being a critical thing that we need to protect, defenders and attackers looking for those OT capabilities and happy to point them towards that for OT.

21:09.04

Samir Boussarhane

But definitely over the years, there's been more of a shift towards critical infrastructure and OTICS, SCADA, and wanting to protect that.

21:15.00

Michael Mimoso

and then

21:18.10

Michael Mimoso

And so I did want to, before we wrap up, talk a little bit about the, the attacks that have been, um connected and linked to Iran against the Rockwell PLCs.

21:30.42

Michael Mimoso

um How much do you see something like that elevating ah or prioritizing the security of these platforms? It's not often you see real world attacks targeting PLCs, for example, um and these vulnerabilities are pretty old. like Just ah curious as to your reaction when you heard that news.

21:52.13

Samir Boussarhane

Yeah, definitely interesting. um I'm not up to on the exact specifics, but I'm tracking that it was a certain model of Allen Bradley PLCs that had a vulnerability, and they were searching for that model.

22:02.97

Samir Boussarhane

Am I correct on that?

22:04.50

Michael Mimoso

Yes, correct. Yeah. I think it's pretty old vulnerability. I think it was 2021. um And it was pretty easy to access um the PLCs and and manipulate from there.

22:20.92

Samir Boussarhane

Yeah, and then ah kind alluded to earlier. So with the OT simulators and Calder for OT plugins, we're using the protocols that are common with the protocol specification, like Modbus to be a compliant Modbus device to support Modbus reads, Modbus writes.

22:38.10

Samir Boussarhane

A lot of those adversarial behaviors that like we're talking about with Iran and the microwave 50s, that's even outside of those functions. So it's very important to when we're trying to protect OT to think of what's already built in a native, but also like what an adversary could do through the vendor space. Because that's not nearly as well documented.

22:57.78

Samir Boussarhane

And we really want to be able to collect traffic that's going towards OT systems at all. And I know in IT t that we say, all right, if you want me to close the firewall, need to know everything because so much traffic goes through.

23:11.45

Samir Boussarhane

OT space, it really should be the opposite. So we have to be better as defenders to flag any c specific traffic in like a OT space to defend against it.

23:22.26

Samir Boussarhane

But as far as like, sorry, go ahead.

23:22.62

Michael Mimoso

And then they're... Go ahead. No, go ahead. Finish your thought, please.

23:26.68

Samir Boussarhane

Yeah, as far as like the Iran vulnerabilities, I think it's great to bring attention to the critical infrastructure may not be as well protected as we think and want to make sure that we're flagging these issues before anything bad could happen.

23:39.35

Michael Mimoso

Yeah. I mean, the whole vulnerability and exposure management question within OT is just... it it it doesn't seem like it's ever going to go away in terms of patching, in terms of, I mean, I don't think this particular vulnerability can be fixed without a major overhaul from the vendor regardless, but um there's there's long windows of exposures with some of these vulnerabilities, unfortunately.

24:00.95

Samir Boussarhane

Right.

24:03.10

Michael Mimoso

um All right, so as so we wrap up, um just what is next for Caldera for OT? And are you expecting more of these plugins or more protocol support? Tell me what's kind of on the drawing board.

24:16.44

Samir Boussarhane

Yeah, so with that ah University Hawaii capstone group that produced HVACSIM last semester, we're also sponsoring another team this year to do DMP3 for electric substation.

24:29.02

Samir Boussarhane

That development's underway and hoping to release that later this year. Let's see. More updates, continued updates, and like improving our documentation and our protocols.

24:41.31

Samir Boussarhane

Be able to announce more of that later in the year, but still trying to improve security posture and lower that barrier of entry.

24:46.95

Michael Mimoso

Yeah. It's very cool stuff. It must be fun to be on kind of the leading edge of this kind of development.

24:53.24

Samir Boussarhane

Yeah, definitely fun research to be part of.

24:55.54

Michael Mimoso

Yeah. All right, Samir. Thank you so much for joining the podcast. I really appreciate it.

25:00.28

Samir Boussarhane

thank you for having me.

25:01.53

Michael Mimoso

All right, man. Take care.

Industrial
Cyber Resilience
Operational Resilience
Operational Technology
Risk Management
Michael Mimoso
Editorial Director

Michael Mimoso is Director of Influencer Marketing at Claroty and Editorial Director of Nexus.

Stay in the know Get the Nexus Connect Newsletter
You might also like… Read more
Latest on Nexus Podcast