Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Ransomware Attacks on Industrial Infrastructure Climb 87% Despite Security Improvements to ICS Environments

    Since the goal of ransomware is to initially disrupt operations, the targeting of industrial control systems has been an increasing focus for specific ransomware groups.

    Nearly every ransomware threat actor or gang treats their malicious activities as a business. And like most businesses, you focus on a target group of “customers”. In some cases, the threat actors have a particular proficiency in targeting industrial control systems (ISC) and operational technology (OT) environments. The tech used is specific to the industry, the process to be automated, etc., making it difficult for additional ransomware players to get into the game of targeting ICS/OT.

    According to cybersecurity firm Dragos, in their newly released 2022 ICS/OT Cybersecurity Year in Review report:

    • There are 35% more ransomware groups actively targeting ICS and OT environments
    • 72% of attacks focused on manufacturing companies
    • 40% of attacks targeted businesses in the United States, with 32% in Europe, and 18% in Asia

    While these attacks primarily focused on the manufacturing sector, many other sectors were targeted, as shown below:

    2-10-23 Image

    Source: Dragos

    Nearly every attack started by taking advantage of a vulnerability, it’s these kinds of attacks that result in outages of services and products impacting everyday businesses and consumers. And those material business interruptions give entrée to phishing scams that take advantage of an individual’s or business’ need as the means to create the necessary sense of urgency that causes victims to throw caution to the wind.

    Despite these specific attacks having little direct-relation to the value of Security Awareness Training, the aftermath of these attacks warrants a look at how other attackers will leverage the outages and attempt to trick your employees into participating in a well-crafted phishing scam.


    Get Your Ransomware Hostage Rescue Manual

    This 26-page manual is packed with actionable info that you need to prevent infections, and what to do when you are hit with ransomware. You also get a Ransomware Attack Response Checklist and Prevention Checklist. You will learn more about:

    1. What is Ransomware?
    2. Am I Infected?
    3. I’m Infected, Now What?
    4. Protecting Yourself in the Future
    5. Resources

    Don’t be taken hostage by ransomware. Download your rescue manual now! 

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-hostage-rescue-manual-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top