This talk will focus on Mitsubishi ICS ecosystem’s communication protocol and show how researchers successfully uncovered flaws in its identity authentication function and can take over any asset within the entire series of Mitsubishi PLCs, revealing that such an attack can cause physical damage in critical sectors. Presenters will share workable detection and mitigation strategies for those protocols.