Assaults towards industrial management methods and operations know-how methods are rising, as adversaries discover weaknesses in IT networks that permits them to maneuver into OT networks, in accordance with a latest report from SANS.
The State of ICS/OT Cybersecurity 2024 report from SANS relies on responses from cybersecurity professionals in numerous vital infrastructure sectors. There have been extra non-ransomware incidents (74.4%) reported than ransomware (11.7%) over the previous yr, in accordance with the SANS report.
Different preliminary assault vectors concerned in OT/ICS incidents embrace compromising OT and industrial management methods by used of exterior distant companies (23.7%) or internet-accessible gadgets (23.7%); compromising worker workstations (20.3%) and detachable media (20.3%); and a provide chain compromise (20.3%). It is price noting that 18.6% respondents mentioned attackers tried spear phishing with an e mail attachment for the preliminary compromise.
One out of 5, of 19%, of respondents reported a number of safety incidents over the previous yr.
Whereas solely 12% of respondents reported being the targets of ransomware assaults prior to now 12 months, the influence on the ICS/OT atmosphere stays “doubtlessly catastrophic,” SANS mentioned within the report. Of the organizations who reported a ransomware incident, 38% mentioned solely IT community methods had been impacted and 28.6% mentioned OT and ICS networks had been affected. Simply 21% mentioned each networks had been impacted. Greater than a 3rd, or 38.1%, mentioned reliabiiy and security was compromised throughout these assaults.
“Though the general development [ransomware] appears to have decreased, the impacts are nonetheless doubtlessly catastrophic, and needs to be thought-about for all ICS/OT- particular incident response applications,” SANS mentioned.