New research from Cyble Research & Intelligence Labs (CRIL) highlights a concerning trend: the convergence of attacks against both industrial and information technology frontiers. The report, published January 20, 2026, shows that threat actors are simultaneously expanding their focus to include both Operational Technology (OT) environments and enterprise Artificial Intelligence (AI) systems. Adversaries are exploiting internet-exposed Human-Machine Interfaces (HMI) and SCADA systems to target Industrial Control Systems (ICS), while also developing new techniques like prompt injection and data poisoning to compromise and weaponize corporate AI workflows. This creates a complex, dual-front threat landscape. Ransomware remains the top overall threat, with groups like Cl0p and Lockbit continuing to evolve, sometimes forgoing encryption entirely in favor of pure data-theft extortion.
The Cyble report outlines a 'polycrisis' where multiple threat vectors are intersecting and amplifying one another.
1. Attacks on ICS/OT Environments: Threat actors, including hacktivists and criminals, are systematically scanning the internet for exposed ICS/OT devices. They are targeting HMIs and SCADA system interfaces that have been inadvertently or insecurely connected to the internet. By exploiting these interfaces, attackers can potentially manipulate industrial processes, causing physical disruption, equipment damage, or shutdowns in critical infrastructure sectors like manufacturing, energy, and water treatment.
2. Weaponization of AI Systems: As enterprises rapidly adopt AI and Large Language Models (LLMs), attackers are developing novel methods to turn these systems into attack vectors:
3. Evolution of Ransomware and Phishing: Ransomware remains the most impactful threat. The report notes a trend where some ransomware affiliates are working with multiple Ransomware-as-a-Service (RaaS) groups (e.g., Cactus, Qilin, INC Ransom, Play) simultaneously to maximize pressure on victims. Furthermore, some attacks are shifting to an extortion-only model, where the primary goal is data theft for blackmail, without the deployment of an encryptor. This is fueled by a highly industrialized Phishing-as-a-Service (PhaaS) ecosystem that provides attackers with turnkey kits for gaining initial access.
T0831 - Manipulation of Control.T1592 - Gather Victim Host Information.T1491 - Defacement, but applied to a model's logic.T0886 - Remote Services: Accessing exposed HMI/SCADA interfaces.T0817 - Default Credentials: A primary method for gaining access to ICS devices.T0831 - Manipulation of Control: The ultimate goal of many ICS attacks, altering the physical process.T0829 - Loss of View: Tampering with an HMI to show normal operations while a malicious action is occurring.| Type | Value | Description |
|---|---|---|
| Network Traffic Pattern | Inbound connections to ICS ports (e.g., 502, 2404, 47808) | Any inbound traffic from the public internet to standard ICS/SCADA protocol ports is highly suspicious and indicates an exposed device. |
| Log Source | HMI/SCADA application logs | Logins to an HMI from an external IP address, or changes to control setpoints made outside of scheduled maintenance windows. |
| Other | AI Model Output Monitoring | Monitoring AI model outputs for unexpected, nonsensical, or malicious responses that could indicate a prompt injection attack. |
| Log Source | Phishing Gateway Logs | A high volume of emails blocked containing links to known PhaaS domains or using common phishing kit templates. |
D3-NTA - Network Traffic Analysis.New report identifies 'tool chain escalation' as the top AI agent attack, surpassing prompt injection. This sophisticated technique exploits AI logic for privilege escalation.
Ensure that ICS/OT networks are properly air-gapped or segmented from IT networks and the internet.
Use firewalls and unidirectional gateways to strictly control all traffic between IT and OT networks.
For AI systems, implement input sanitization and output encoding to prevent prompt injection attacks.
Train employees to recognize and report sophisticated phishing emails delivered by PhaaS platforms.
The most fundamental defense against the ICS/OT threats described by Cyble is robust Network Isolation. Industrial control system networks should never be directly accessible from the public internet. This means implementing a strict segmentation architecture, often based on the Purdue Model. A firewall or, preferably, a unidirectional gateway should be placed between the corporate IT network and the OT network to ensure that data can flow out of the OT environment (for monitoring) but no traffic can flow in. Remote access must be disabled by default and only permitted through a secure, audited, and MFA-protected jump host. Proactively using tools like Shodan to scan for your own public IP space can help identify and eliminate any accidentally exposed HMI or SCADA interfaces before attackers find them.
To defend against the weaponization of enterprise AI, Application Configuration Hardening is crucial. When deploying applications that use LLMs, developers must treat user input as untrusted. This involves implementing strict input sanitization and parameterization to prevent prompt injection attacks. For example, user-provided input should be clearly demarcated from the system's own instructions so the model cannot be tricked into obeying malicious commands. Furthermore, the AI application should be run with least privilege, with no direct access to backend systems, APIs, or databases. Instead, it should have to call well-defined, secure functions. This hardening prevents an attacker from using a compromised AI to pivot and attack the broader enterprise network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats