Detection of Rogue Master

Technique Detected:  Rogue Master | T0848

ID: DET0792
Domains: ICS
Analytics: AN1924
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1924

Consult asset management systems which may help with the detection of computer systems or network devices that should not exist on a network.
Monitor for network traffic originating from unknown/unexpected devices or addresses. Local network traffic metadata could be used to identify unexpected connections, including unknown/unexpected source MAC addresses connecting to ports associated with operational protocols. Also, network management protocols such as DHCP and ARP may be helpful in identifying unexpected devices.
Monitor for new master devices communicating with outstations, which may be visible in alarms within the ICS environment.
Monitor for unexpected ICS protocol functions from new and existing devices. Monitoring known devices requires ICS function level insight to determine if an unauthorized device is issuing commands (e.g., a historian).
Monitor for new master devices communicating with outstation assets, which may be visible in asset application logs.

Log Sources
Data Component Name Channel
Asset Inventory (DC0110) Asset None
Network Traffic Flow (DC0078) Network Traffic None
Device Alarm (DC0108) Operational Databases None
Network Traffic Content (DC0085) Network Traffic None
Application Log Content (DC0038) Application Log None