Research published by Cyble Research & Intelligence Labs (CRIL) on January 20, 2026, paints a concerning picture of the evolving threat landscape. The report reveals a significant trend where both politically motivated hacktivists and profit-driven cybercriminals are expanding their focus to include attacks on critical infrastructure and artificial intelligence systems. This convergence creates unprecedented challenges for defenders, as attackers are now blending traditional OT exploitation with sophisticated, AI-enhanced attack methods to increase their speed, scale, and complexity.
The research identifies several key trends:
The report highlights a blend of old and new TTPs:
T0886 - Remote Services) or using default credentials (T0816 - Default Credentials) to gain access.T1027.006 - Reversible Encryption).T1566 - Phishing).The convergence of these threats creates a perfect storm. Attacks on ICS/OT can lead to physical disruption, environmental damage, and threats to public safety. The weaponization of AI accelerates the entire attack lifecycle, from reconnaissance to impact, overwhelming traditional security teams. An AI-powered attacker can conduct more sophisticated and personalized attacks at a scale that was previously impossible. This forces organizations to defend against faster, more adaptive, and harder-to-detect threats across both their digital and physical operations.
This is a trend report and does not contain specific IOCs.
D3-NTA): Enhance network monitoring to detect the sophisticated, adaptive C2 traffic that may be generated by AI-powered malware.The most critical defense for OT environments. Strictly isolate ICS/OT networks from corporate IT networks and the internet.
Regularly scan and patch vulnerabilities in ICS/OT components, especially any that have network exposure.
Update security awareness training to include threats specific to AI, such as deepfake social engineering.
For organizations with ICS/OT environments, the primary countermeasure is strict network isolation. Implement a defensible architecture based on the Purdue Model, using firewalls and ideally a data diode to create a strong boundary between the IT and OT networks. All internet access from the OT network should be blocked by default. Any required data transfer between IT and OT should be done via a secure, monitored DMZ. This prevents attackers who compromise the IT network from pivoting to disrupt physical processes, directly mitigating the threat of attacks on HMI and SCADA systems.
To defend against the emerging threat of AI exploitation, organizations must treat all inputs to their AI models as untrusted. Implement robust input sanitization and filtering for any prompts sent to internal or external LLMs. This should include stripping out control characters, filtering for known prompt injection keywords (e.g., 'ignore previous instructions'), and enforcing strict length and format limits. This acts as an application-layer firewall for your AI, preventing attackers from manipulating its behavior through malicious inputs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats