Attacks towards operational expertise (OT) networks are on the rise, fueled by geopolitical tensions and conflicts, as OT security quick turns into a mainstream concern.
Two new risk teams emerged in 2024, becoming a member of seven different lively attackers of OT methods, and two new malware households concentrating on industrial management methods (ICS) have been added to the attackers’ arsenals as effectively, in keeping with researchers from Dragos.
“A hanging pattern in 2024 was the continued reducing of the barrier to entry for adversaries concentrating on OT/ICS,” researchers from the commercial security agency wrote of their annual report. “Adversaries that may have as soon as been unaware of or ignored OT/ICS fully now view it as an efficient assault vector to realize disruption and a focus.”
Along with ICS-specific malware threats, industrial organizations, particularly these within the manufacturing sector, are additionally coping with a pointy rise in ransomware assaults. The variety of ransomware assaults concentrating on OT/ICS asset house owners elevated 87% in 2024 and the variety of teams going after such targets rose by 60%.
New Iranian group positive aspects ICS-targeting functionality
Dragos tracks 23 risk teams which have focused OT networks with the intention of gathering data or manipulating industrial management methods. Every group’s capabilities are damaged down into the 2 phases of the ICS Cyber Kill Chain.
Dragos noticed exercise from 9 of these 23 teams final yr, two of which have been new and one in all which had ICS Cyber Kill Chain stage 2 capabilities. Tracked below the alias BAUXITE, the group has overlaps with CyberAv3ngers, a hacktivist persona that the US authorities beforehand attributed to a unit inside Iran’s Islamic Revolutionary Guard Corps (IRGC).
Between November 2023 and January 2024, BAUXITE compromised Israeli-made Unitronics Unistream and Imaginative and prescient collection programmable logic controllers (PLCs) that have been uncovered to the web. These PLCs belonged to greater than 100 organizations, together with water and wastewater administration and vitality corporations.
“The adversary is able to downloading logic to those controllers, inflicting a denial of service (DoS) equal to execute an ICS assault,” the Dragos researchers wrote.
All through 2024, the group additionally focused Sophos firewalls and performed port scanning on a number of OT/ICS property, together with Siemens S7 units, CIMON Automation units, units working OPC Unified Structure (OPC/UA) server, Omron Manufacturing facility Interface Community Service (FINS), and units working CODESYS. These protocols are additionally focused by Pipedream or Incontroller, a chunk of ICS malware found in 2022 and attributed to a gaggle dubbed CHERNOVITE.
In late 2024, BAUXITE additionally managed to compromise greater than 400 international OT/ICS units and firewalls, deploying a custom-embedded Linux backdoor known as IOControl on them.
New Russian group targeted on Ukraine
The second new group to launch assault campaigns towards industrial organizations final yr, dubbed GRAPHITE, has overlaps with APT28 actions. Also called Fancy Bear or Pawn Storm, APT28 is believed to be a unit inside Russia’s Normal Employees Foremost Intelligence Directorate (GRU).
GRAPHITE launched fixed phishing campaigns towards hydroelectric, vitality, and authorities entities in Jap Europe and the Center East. The group exploits identified vulnerabilities to deploy malware that steals credentials, and whereas it has not but displayed ICS Cyber Kill Stage 2 capabilities, different teams tied to the Russian authorities and GRU have that functionality, for instance ELECTRUM, often known as Sandworm.
New ICS malware used within the Ukraine battle
Russian teams have launched a number of confirmed OT/ICS assaults towards Ukrainian organizations lately, even earlier than the battle began, leading to energy blackouts and downtimes.
One such assault occurred in January 2024 and concerned a chunk of malware known as FrostyGoop. The assault led to heating outages for greater than 600 residence buildings within the Ukrainian metropolis of Lviv in the midst of winter throughout freezing temperatures.
FrostyGoop focused ENCO controllers over the Modbus protocol, however the Dragos researchers stated its capabilities will not be restricted to ENCO units and will additionally work together with PLCs, DCS, sensors, actuators, and subject units.
Ukraine-affiliated teams responded with their very own assaults. In April 2024, a hacktivist group dubbed BlackJack breached Moskollektor, a Moscow municipal group in command of the communication system for fuel, water, and sewage networks. The group claimed it disrupted communications to hundreds of business sensors.
Researchers established {that a} new piece of malware known as Fuxnet was used, making it the eighth identified ICS-specific malware household ever found. The malware overwhelms sensors by sending a flood of Meter-Bus requests. Meter-Bus is a protocol for studying knowledge from water, fuel, and electrical energy meters. As well as, Fuxnet additionally has a Linux wiper element that wipes the file system of sensor gateways.
“The assault on Moskollektor underscores the normalization of assaults on industrial units by teams pushed by geopolitical conflicts,” the researchers wrote. “Fuxnet was extremely tailor-made to Moskollektor and is unlikely for use towards one other industrial atmosphere with out important modifications to the codebase.”
1 / 4 of vulnerabilities have been exploitable at community perimeter
Final yr Dragos reviewed 606 public vulnerability advisories for ICS units and utilized its personal patch prioritization framework that splits vulnerabilities into the classes: now, subsequent, and by no means. Six p.c of the issues fell into the patch-now class, being distant exploitable with no authentication and have been both actively exploited or had proof-of-concept exploits. One other 63% have been put into the patch-next class as they may very well be mitigated with community hygiene and segmentation.
Total, 22% of vulnerabilities have been each exploitable over the community and positioned in community perimeter units, that means they may extra simply be focused by attackers over the web. This was a rise from 16% in 2023.
Patching ICS units isn’t all the time simple or quick as a result of these units usually deal with important processes, in order that they require scheduled shutdown and upkeep home windows. As such, mitigation is usually most popular to patching in lots of instances. Sadly, 57% of advisories that supplied patches provided no various mitigation and 18% of advisories provided no patch or mitigation in any respect.
“Adversaries will not be simply testing OT networks — they’re actively embedding themselves inside important infrastructure, positioning for long-term entry, operational disruption, and potential large-scale penalties,” the researchers wrote. “The time for reactive security is over. Defenders should transfer towards steady monitoring, proactive risk looking, and incident response capabilities tailor-made for OT environments.”



