Trending...
- Maryland: Invasive Plant Advisory Committee (IPAC) Meeting Notice - 110
- Maryland: Preliminary Testing Confirms Highly Pathogenic Avian Influenza in Third Anne Arundel County Backyard Flock in 2025 - 102
- Georgia Misses the Mark Again on Sports Betting, While Offshore Sites Cash In
HANOVER, Md.--(BUSINESS WIRE)--Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today released its sixth annual Dragos OT Cybersecurity Year in Review report, the most comprehensive report on cyber threats facing industrial organizations. The report named the emergence of three new threat groups, including VOLTZITE linked to Volt Typhoon, and found that ransomware continued to be the most reported cyber threat among industrial organizations with a nearly 50% increase in reported incidents. 2023 also saw the first time a hacktivist group achieved Stage 2 of the ICS Cyber Kill Chain.
"OT cyber threats reached a tipping point in 2023," said Robert M. Lee, co-founder and CEO of Dragos. "Industrial and critical infrastructure has been moving away from highly customized facilities to ones that—for good economic and productivity reasons—share the same industrial devices, technologies, and facility designs across sites and sectors. Unfortunately, adversaries are now leveraging these homogenous infrastructures to scale attacks. They also target weaknesses in environments that pushed digital transformation without adequate cybersecurity measures. These factors contributed to an environment in 2023 in which organizations were challenged with a range of threats, including increasingly sophisticated state actors, hacktivists praying on pervasive security weaknesses, and a growing barrage of ransomware attacks."
"There were positive developments for OT cybersecurity too," continued Lee. "We saw vendors, governments, and the community collaborate to enable a unified, risk-based response to threats, as was the case with the ControlLogix vulnerabilities disclosed by Rockwell Automation. We observed that more devices and protocols are incorporating authentication. And we at Dragos experienced triple the number of organizations conducting tabletop exercises, including a 350% increase at the board and executive level, to test and strengthen their OT security strategies."
Details of the 2023 Year in Review:
YIR Report and Resources:
More on Marylandian
The 2023 Dragos OT Cybersecurity Year in Review is an annual overview and analysis of OT-focused global threat activities, vulnerabilities, and industry insights and trends. The full report, and the accompanying executive summary document, can be downloaded here: https://www.dragos.com/year-in-review
About Dragos, Inc.
Dragos has a global mission to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos's industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available.
Our solutions protect organizations across a range of industries, including electric, oil & gas, manufacturing, building automation systems, chemical, government, water, food & beverage, mining, transportation, and pharmaceutical. Dragos is privately held and headquartered in the Washington, D.C. area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East.
More on Marylandian
Contacts
Kesselring Communications for Dragos
Leslie Kesselring
503-358-1012
Leslie@kesscomm.com
"OT cyber threats reached a tipping point in 2023," said Robert M. Lee, co-founder and CEO of Dragos. "Industrial and critical infrastructure has been moving away from highly customized facilities to ones that—for good economic and productivity reasons—share the same industrial devices, technologies, and facility designs across sites and sectors. Unfortunately, adversaries are now leveraging these homogenous infrastructures to scale attacks. They also target weaknesses in environments that pushed digital transformation without adequate cybersecurity measures. These factors contributed to an environment in 2023 in which organizations were challenged with a range of threats, including increasingly sophisticated state actors, hacktivists praying on pervasive security weaknesses, and a growing barrage of ransomware attacks."
"There were positive developments for OT cybersecurity too," continued Lee. "We saw vendors, governments, and the community collaborate to enable a unified, risk-based response to threats, as was the case with the ControlLogix vulnerabilities disclosed by Rockwell Automation. We observed that more devices and protocols are incorporating authentication. And we at Dragos experienced triple the number of organizations conducting tabletop exercises, including a 350% increase at the board and executive level, to test and strengthen their OT security strategies."
Details of the 2023 Year in Review:
- Dragos identified three new OT Threat Groups—VOLTZITE, GANANITE, and LAURIONITE. With these additions, Dragos analysts now track 21 Threat Groups worldwide that have been observed as being engaged in OT operations in 2023.
- VOLTZITE targets electric power generation, transmission and distribution and has been observed targeting research, technology, defense industrial bases, satellite services, telecommunications, and educational organizations. The group overlaps with Volt Typhoon, a group that the U.S. government has publicly linked to the People's Republic of China. The group's threat activities include living off the land (LOTL) techniques, prolonged surveillance, and data gathering aligned with Volt Typhoon's assessed objectives of reconnaissance and gaining geopolitical advantage in the Asia-Pacific region. They have traditionally targeted U.S.-based facilities, but also have been seen targeting organizations in Africa and Southeast Asia. (For more on VOLTZITE, see Dragos's February 20 Intel Brief.)
- GANANITE targets critical infrastructure and government entities in the Commonwealth of Independent States and Central Asian nations. The group leverages publicly available proof of concept (POC) exploits for internet-exposed endpoints and focuses on espionage and data theft.
- LAURIONITE targets and exploits Oracle E-Business Suite iSupplier web services and assets across aviation, automotive, and manufacturing industries. The group utilizes a combination of open-source offensive security tooling and public proof of concepts to aid in their exploitation of common vulnerabilities.
- Geopolitical conflicts drove threat activity with regional and global kinetic events overlapping with OT cybersecurity threats. The Ukraine-Russia conflict prompted more mature threat groups, such as ELECTRUM, to increase activity, while tensions between China and Taiwan contributed to increased targeted cyber espionage attacks against industrial organizations in the Asia-Pacific region and the United States.
- Hacktivists for the first time achieved Stage 2 of the ICS Cyber Kill Chain, when CyberAv3ngers attacked programmable logic controllers (PLCs) used by water utilities across North America and Europe with an anti-Israel message. While hacktivist groups typically conduct distributed denial of service (DDoS) attacks with minimal impact, this attack demonstrated the ability to disrupt OT systems by using unsophisticated methods with weak security controls. Other active hacktivist groups included CyberArmyofRussia_Reborn, NoName057(16), Anonymous Sudan, and Team Insane Pakistan.
- Ransomware remains the number one attack in the industrial sector increasing 50% from 2022. Lockbit caused 25% of total industrial ransomware attacks, with ALPHV and BlackBasta accounting for 9% each. Manufacturing continues to be the primary target of ransomware and accounted for 71% of all ransomware attacks. The majority of ransomware attacks impacted organizations in North America with 44% of incidents, followed by Europe at 32%. Dragos tracked 50 ransomware variants in 2023, a 28% increase over last year.
- The number of vulnerabilities that require authentication to exploit is rising, pointing to a positive trend for OT defenders. In 2023, 34% of CVEs required some authentication compared to 25% of CVEs in 2020. On the other hand, of the 2010 vulnerabilities impacting industrial environments disclosed last year, 14% contained erroneous information for prioritizing risks in ICS/OT.
- Front Line Perspectives: Based on data gathered from annual customer service engagements conducted by Dragos's cybersecurity experts in the field across the range of industrial sectors, the top challenges industrial organizations need to address are:
- Lack of Sufficient Security Controls: 28% of service engagements involved issues with improper network segmentation or improperly configured firewalls.
- Improper Network Segmentation: Approximately 70% of OT-related incidents originated from within the IT environment.
- Lack of Separate IT & OT User Management: 17% of organizations had a shared domain architecture between their IT and OT systems, the most common method of lateral movement and privilege escalation.
- External Connections to the ICS Environment: Dragos observed four threat groups exploiting public-facing devices and external services and issued findings related to externally facing networks such as the internet in 20% of engagement reports.
YIR Report and Resources:
More on Marylandian
- CCHR: Involuntary Commitment Is Eugenics Repackaged as "Mental Health Care"
- Q2 2025 Industry Impact Report Underscores Semiconductor Expansion, Talent Development and Sustainability Milestones
- 84 Ethiopian Churches Change Signboards to Shincheonji Church of Jesus
- BTXSGG Outlines Four-Pillar Framework to Enhance Digital Asset Security and Compliance
- NJTRX Positions for Next-Generation Asset Trading with U.S. Regulatory Framework
The 2023 Dragos OT Cybersecurity Year in Review is an annual overview and analysis of OT-focused global threat activities, vulnerabilities, and industry insights and trends. The full report, and the accompanying executive summary document, can be downloaded here: https://www.dragos.com/year-in-review
About Dragos, Inc.
Dragos has a global mission to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos's industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available.
Our solutions protect organizations across a range of industries, including electric, oil & gas, manufacturing, building automation systems, chemical, government, water, food & beverage, mining, transportation, and pharmaceutical. Dragos is privately held and headquartered in the Washington, D.C. area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East.
More on Marylandian
- Poncho Tha Popstar: The West's Next King
- Physician-Turned-Patient Launches Advocacy Campaign to Spotlight Disability Insurance Barriers
- Thorn Ridge® Creates a World of Legends & Lore
- Twice the Laughs: Comedy Star Don Barnhart Rotates Residency at Both Delirious Comedy Club Locations in Las Vegas
- Your Body Isn't Broken—It's Out of Balance: The New Book Revealing the Blueprint to Restore Hormone Balance, Sleep, Gut & Metabolic Health
Contacts
Kesselring Communications for Dragos
Leslie Kesselring
503-358-1012
Leslie@kesscomm.com
Filed Under: Business
0 Comments
Latest on Marylandian
- dpInk Ltd. Liability Company Offers Strategic Edge for Federal Contractors Amid Fiscal Year Close
- Breaking: 50+ runners from 20+ states relay custom 9/11 flag 485 miles from Shanksville through DC to Ground Zero for memorial remembrance run
- SecureMaine 2025 is this October 8th in Portland, Maine
- John Thomas calls for unity and prayer after tragic loss
- From Page to Premiere: The Golden State Signature Series: A DonnaInk Publications Signature Showcase
- Where the Miami Dolphins Stand After Week 1
- Which NFL Teams Can Rebound from Week 1? OddsTrader Breaks Down the Biggest Questions
- 123Invent Inventor Develops Weed Trimmer for Zero-Turn Mowers (RKH-919)
- Apellix Deploys Breakthrough Spray-Painting Drones into Live Service Limited Beta Program Open for Advanced Contractors
- Maryland: Preliminary Testing Confirms Highly Pathogenic Avian Influenza in Third Anne Arundel County Backyard Flock in 2025
- DivX Unveils New Educational Blog Series to Simplify MKV to MP4 Video Conversion
- Baltimore Gets Its Own Namesake Sandwich as The Tillery Launches the B.A.L.T.I.M.O.R.E.
- CCHR: For Prevention, Families Deserve Truth From NIH Study on Psychiatric Drugs
- Rock Band Black Halo Releases Debut Single, "Upon Deaf Ears"
- Sheets.Market Brings Professional Financial Model Templates to Entrepreneurs and Startups
- Webinar Announcement: Investing in the European Defense Sector—How the New Era of Uncertainty Is Redefining Investment Strategies
- AEVIGRA (AEIA) Analysis Reveals $350 Billion Counterfeit Market Driving Luxury Sector Toward Blockchain Authentication
- RUNA Brings Celtic Spirit and American Roots to New Spire Stages
- Her Magic Mushroom Memoir Launches as a Binge-Worthy Novel-to-Podcast Experience
- Century Fasteners de Mexico Hires Saúl Pedraza Gómez as Regional Sales Manager in Mexico