“…Many of these challenges generally come from typical vulnerabilities of the cyber domains (e.g., accessible critical ports and services, irregular access control, lacks of isolation measures or uncontrolled network sections, lacks of auditing and accountability, irregularity in the governance processes, incompatibilities) [4], and they need to be properly managed 24/7 through security controls as specified by standards (e.g., the NISTIR 8183 [5]) or specific cybersecurity frameworks (e.g., [6]). Clear examples (Stuxnet, TRISIS, Flame, Night Dragon, BlackEnergy or Ex-Petr, Duqu [7,8,9]) have already shown the weak nature of the current ICSs to detect furtiveness attacks [9]. This paper envisages how OT networks may be compromised through specific IT techniques based on covert channels.…”