The Dragos 2026 OT/ICS Cybersecurity Year in Review report has identified a critical evolution in the threat landscape for industrial organizations. Adversaries are no longer content with reconnaissance and data theft; their focus has shifted to understanding and manipulating physical processes to cause tangible, real-world disruption. This strategic change elevates the risk to critical infrastructure sectors like energy, manufacturing, and transportation. The report introduces three new industrial-focused threat groups, including SYLVANITE, which acts as an initial access broker for other actors. Despite the rise of these specialized APTs, the report underscores that ransomware remains a pervasive and immediate danger, with a dramatic increase in campaigns targeting industrial environments in the past year.
The core finding of the report is the strategic shift in adversary objectives from espionage to disruption. Attackers are investing time to learn the specific operational technology (OT) and industrial control systems (ICS) of their targets. This knowledge allows them to move beyond disrupting IT networks and directly impact physical processes, potentially causing equipment damage, production halts, or unsafe conditions.
Dragos has identified three new threat groups, highlighting the increasing specialization in this domain.
The report emphasizes that while nation-state disruptors are a high-impact threat, ransomware is the most frequent and immediate threat to industrial operations. Key statistics from 2025 include:
The shift to disruptive attacks requires attackers to progress further along the Purdue Model, moving from the enterprise network (IT) down into the control network (OT). The TTPs are evolving:
T0829 - Network Connection Enumeration).T0831 - Manipulation of Control or T0814 - Denial of Service to halt physical processes.The potential impact of these evolving threats is catastrophic:
Defending against these threats requires a shift from IT-centric security to an OT-aware approach.
M0930 - Network Segmentation.Creating a strong, defensible boundary between IT and OT networks is the single most effective control for preventing IT-based threats from impacting industrial processes.
Hardening OT endpoints like HMIs and Engineering Workstations to restrict what applications and scripts can run can prevent malware execution.
Enforcing strong access controls and least privilege within the OT environment limits an attacker's ability to move laterally and access critical control systems.
In response to the threats outlined by Dragos, industrial organizations must prioritize robust network segmentation, specifically Broadcast Domain Isolation between IT and OT environments. This is not just a firewall rule; it's an architectural principle. A properly implemented industrial demilitarized zone (iDMZ) should be the only path for data to flow between the enterprise (IT) and control (OT) networks. All traffic must be terminated and inspected in the iDMZ. There should be no direct routes or 'firewall holes.' This isolation prevents ransomware that infects the IT network from spreading to the OT network and stops attackers from easily pivoting from a compromised email account to a critical PLC. This directly counters the primary method attackers use to bridge the IT/OT divide and is the foundation of any credible OT security strategy.
To detect the kind of specialized, disruptive activity described in the Dragos report, generic IT security tools are insufficient. Industrial organizations must deploy OT-native Network Traffic Analysis solutions. These tools provide deep packet inspection (DPI) of industrial protocols (e.g., Modbus, DNP3, S7). This allows for the creation of a high-fidelity baseline of all normal OT network communications. The system can then alert on any deviation, such as: a new device appearing on the network, an engineering workstation communicating with a PLC it has never talked to before, or a PLC receiving a 'program stop' command from an unauthorized source. This technique is essential for detecting adversaries as they perform reconnaissance and attempt to manipulate control systems, providing an early warning before physical disruption occurs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats