1. The attacker gathers information on the target organization. 2. A relevant control centre is targeted. 3. Information is gathered regarding the operators and staff of the control centre, a social-engineering campaign is launched against the staff of that control centre to gain an entry point into the corporate network. 4. An internal users’ credentials are stolen and used to gain access to a computer inside the corporate network; a staging area has been stablished. 5. The attacker carries out further information gathering to identify vulnerable systems. 6. A vulnerable computer is found and an exploit is launched against it to gain access. 7. A backdoor is installed in order to maintain access to that system. 8. If that system does not have access to the SCADA network (direct or remote) more systems keep being compromised. 9. Once a system with access to the SCADA network is found, this attack phase stops. 10. The attacker uses the compromised system to attack the SCADA systems. 11. The SCADA systems are “updated” with modified firmware that grants exclusive access to the attacker and restricts other remote accesses. 12. The SCADA assets are reconfigured to cause the whole system to fail. 13. The corporate local power supply and backup supply systems are compromised to disable them. 14. Finally, the SCADA system fails, the operations stop and the control centre is unable to act, as their corporate systems are disabled and erased. Furthermore, the local power and backup systems are compromised, stopping the operators from being aware of what is going on the operation facilities.