Connect with us

Hi, what are you looking for?

Technology

Cyber Threats Target Industrial Systems, Exposing Vulnerabilities

A recent report by Trellix reveals that cybercriminals are increasingly exploiting information technology (IT) vulnerabilities to infiltrate operational technology (OT) systems that support critical industrial processes. Covering the period from April to September 2025, the Operational Technology Threat Report outlines a troubling trend involving state-sponsored groups, criminal organizations, and hybrid operators blending espionage and extortion with cyber operations linked to geopolitical conflicts.

The manufacturing sector suffered the most, accounting for 41.5% of the detections, while transportation and shipping were responsible for 27.6%. Other sectors, including utilities, energy, and aerospace and defense, made up the remainder of the reported activity. These findings underscore the high stakes involved in these industries, given their reliance on integrated systems and the severe impact of operational disruptions.

Most detected attacks targeted IT infrastructure within organizations focused on OT. Attackers commonly used entry points such as mail systems, perimeter gateways, and endpoints. Rather than attempting direct assaults on fortified controllers, they targeted exposed business systems connected to Level 3 and Level 4 environments.

One particularly concerning group, Sandworm, was responsible for nearly one-third of observed OT-related intrusions in recent years. Their activities during the reporting period primarily targeted Ukrainian energy and telecommunications networks. Sandworm employed the malicious software Industroyer2 to manipulate substation operations and deployed wipers to hinder recovery efforts. This strategic use of destructive tools highlights a deliberate intent to align cyberattacks with physical conflict.

Another advanced threat, TEMP.Veles, also known as XENOTIME, poses significant risks to safety instrumented systems. The group’s previous attempts to alter safety logic in their operations, particularly with the TRITON malware, emphasize their evolving tactics. Recent reconnaissance efforts targeting energy and chemical organizations suggest an ongoing strategy to maintain access for future operations of strategic value.

In addition, Iranian groups APT33 and APT34 have shifted focus from espionage to more destructive activities. Their operations, which target aviation, petrochemical, and government networks, rely on credential theft, exploitation of web-facing infrastructure, and wiper deployment. This evolution indicates a move towards coercive tactics that blend theft with disruption.

Criminal organizations are also demonstrating a growing understanding of industrial dependencies. The Qilin group has executed 63 confirmed attacks against industrial entities since mid-2024, particularly focusing on energy distribution and water utilities. Their use of both Windows and Linux payloads allows for broader infiltration across mixed environments. Several incidents have involved the encryption of shared engineering resources and historian systems, causing operational delays despite controllers remaining untouched.

The convergence of financial motives and OT-aware methods is evident in these trends. Ransomware operators have recognized that operational disruptions increase their leverage. Consequently, they are adapting their payloads to target systems positioned between IT and OT. The report highlights that attackers often exploit weak segmentation, with PowerShell activity making up the largest share of detections, followed closely by Cobalt Strike.

Findings suggest that adversaries rarely require ICS-specific exploits at the onset of an attack. Instead, they often rely on stolen credentials, remote access tools, and administrative shares to navigate towards engineering assets. Once within the appropriate network segment, they can switch to industrial protocols such as Modbus, DNP3, and IEC 61850, allowing malicious commands to mingle with legitimate traffic. This complicates detection efforts for defenders who may not conduct continuous inspections of process-level communications.

The vulnerability data emphasizes the critical need for robust boundaries between enterprise and industrial systems. Ongoing exploitation of devices such as Cisco ASA and FTD has been reported, including attacks that modify device firmware. Additionally, critical flaws in SAP NetWeaver and other manufacturing operations software have created direct entry points into factory workflows. Recent disclosures affecting Rockwell ControlLogix and GuardLogix platforms raise concerns due to their potential for remote code execution or forcing controllers into a non-operational state, posing immediate availability and safety risks.

Patching within OT networks typically takes over 180 days, as updates necessitate scheduled downtime. Consequently, vulnerable services often remain unpatched long after fixes are available. John Fokker, Vice President of Threat Intelligence Strategy at Trellix, emphasizes the importance of regular training sessions for employees. He states, “Coaching employees about emerging threats, phishing attempts, and safe handling of sensitive information can significantly reduce risks. Furthermore, involving employees in security best practices and readiness testing fosters a culture of resilience across the entire organization.”

As cyber threats increasingly target industrial systems, the need for enhanced security measures and employee awareness is more critical than ever. The insights from Trellix’s report serve as a wake-up call for organizations to prioritize their defenses against these evolving threats.

You May Also Like

Top Stories

UPDATE: Authorities have charged 27-year-old Steven Tyler Whitehead with murder following a tragic shooting that critically injured Kimber Mills, a senior cheerleader at Cleveland...

Sports

The UFC event in Abu Dhabi on July 26, 2025, featured a record-breaking performance from Steven Nguyen, who achieved an unprecedented feat by knocking...

Entertainment

**Kat Izzo Defends Relationship with Dale Moss Amid Controversy** Kat Izzo, a contestant from the reality series *Bachelor in Paradise*, publicly affirmed her relationship...

Entertainment

The upcoming Netflix series, Bon Appétit, Your Majesty, is making headlines due to a significant casting change just ten days before filming commenced. Originally...

Top Stories

UPDATE: Sydney Sweeney’s Baskin-Robbins advertisement is making waves online as backlash intensifies over her recent American Eagle campaign. Just days after critics condemned the...

Lifestyle

Shares of **Amerant Bancorp** (NYSE:AMTB) received an upgrade from Wall Street Zen on March 10, 2024, transitioning from a hold rating to a buy...

Politics

King Charles has reportedly outlined specific conditions that Prince Harry must meet to facilitate a potential reunion with the royal family. Following a discreet...

Top Stories

UPDATE: Chicago Cubs designated hitter Kyle Tucker may have just played his last game for the team as free agency approaches. Following the Cubs’...

Top Stories

BREAKING: The historic Durango-La Plata Aquatic Center, a cornerstone of community recreation since its opening in August 1958, is facing imminent demolition as part...

Entertainment

Erin Bates Paine, known for her role on the reality show Bringing Up Bates, was admitted to the Intensive Care Unit (ICU) following complications...

Top Stories

URGENT UPDATE: Affordable motorcycle helmets under ₹1000 are now available for safety-conscious riders across India. With road safety becoming a pressing issue, these helmets...

Business

An off-Strip casino in Las Vegas has unveiled Nevada’s latest sportsbook, Boomer’s Sports Book, as part of a substantial renovation. The new facility opened...

Copyright © All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site.