What is Session Hijacking?

Session Hijacking is an attack technique in which an attacker takes over the control of an active user or device session. The attacker impersonates the victim, often without the victim noticing.

In OT networks, session hijacking can lead to unauthorised control of systems, modification of parameters, or manipulation of SCADA visualisations.


🧠 How does Session Hijacking work?

  1. A legitimate session is established (e.g. via HMI, remote access, or engineering tool)
  2. The attacker intercepts or guesses the session ID, tokens, or connection attributes
  3. Traffic control or command takeover follows (for example via Man-In-The-Middle)
  4. The attacker can then act as the original user without needing to re-authenticate

🎯 Examples in the OT context

Scenario Consequence
Web-based HMI via browser Attacker takes over the session ID and sends commands
Remote desktop or VPN connection The connection is hijacked and taken over
Engineering tool such as TIA Portal active Attacker pushes projects or code without permission
Historian or visualisation portal Incorrect data is viewed or modified via the hijacked session

🔓 Why is it possible?

  • Use of unencrypted protocols such as HTTP, VNC, Telnet
  • Sessions without expiry or active monitoring
  • Lack of multi-factor authentication (MFA)
  • Static or predictable session IDs
  • Unmonitored behaviour during a session (e.g. IP change or re-authentication)

🔐 Protective measures

Measure Description
TLS encryption Session tokens are not readable to eavesdroppers
MFA on HMIs/web portals Renders session takeover useless without additional verification
IP binding or user fingerprinting Tying the session ID to a source IP or device characteristics
Session timeout Automatically terminating inactive sessions
Zero Trust Architecture Continuously verify behaviour and access, not just at login
SIEM or anomaly detection Recognise unusual behaviour during an active session

🔧 Monitoring and detection

Detection method Description
SIEM log analysis Multiple sessions from different IPs with the same account
Session replay patterns Repeated commands or suspicious timestamps
Sudden privilege escalation A user unexpectedly gains more privileges during a session
IDS detects session takeover attempts For example, via cookie or header manipulation

📌 In summary

Session Hijacking is a silent but impactful attack that allows a malicious actor to gain full control over an existing system — without brute force or new logins.

Especially in OT, where long-running sessions are often left unattended, protection through encryption, authentication, and behavioural evaluation is crucial.