"ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware"

New research suggests that the motive of financial and political gain, partially fueled by the ongoing conflict in Ukraine, has prompted threat actors to target Industrial Control Systems (ICS) with more disruptive cyberattacks, thereby diversifying the threat landscape for critical infrastructure. According to Nozomi Networks' "OT/IoT Security Report: A Deep Look Into the ICS Threat Landscape" for the second half of 2022, this trend is expected to continue throughout 2023, with attackers arming themselves with new tactics and malware, requiring ICS operators to improve their security strategies in order to protect their networks. The report identified top trends in the ICS threat landscape based on a compilation of information from various sources such as open-source media, CISA ICS-CERT advisories, and Nozomi Networks telemetry, as well as on Internet of Things (IoT) honeypots used by Nozomi researchers to gain a deeper understanding of how adversaries target OT and IoT, furthering the knowledge of malicious botnets that attempt to access these systems. Researchers saw a considerable increase in attacks that caused disruption to a range of businesses over the last six months, with transportation and healthcare being among the top new sectors. This article continues to discuss key findings from Nozomi Networks' analysis of the top ICS cyberattack trends.

Dark Reading reports "ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware"

Submitted by Anonymous on