A report from Cyble Research & Intelligence Labs (CRIL) has highlighted a significant and dangerous trend: cyberattacks targeting Industrial Control Systems (ICS) and Operational Technology (OT) environments nearly doubled in 2025. The convergence of IT and OT has expanded the attack surface, attracting both financially motivated ransomware groups and politically motivated hacktivists. The report warns that attackers in 2026 are predicted to increase their focus on directly targeting internet-exposed SCADA and Human-Machine Interface (HMI) systems. This poses a direct threat to the stability of critical infrastructure and the security of large-scale public events like the 2026 Winter Olympics, where disruption of vendor systems could be used for extortion.
The primary threat to industrial environments is the breakdown of the traditional air gap between IT and OT networks. As industrial processes become more connected for remote monitoring and efficiency, they also become more exposed to threats from the internet. Attackers who gain a foothold in a corporate IT network can now more easily pivot into the OT network, where they can potentially manipulate or disrupt physical processes.
Cyble's report identified several key trends:
This trend is particularly concerning for events like the Winter Olympics, which rely on a complex ecosystem of third-party vendors for everything from ticketing to facility management. A successful attack on one of these vendors could disrupt the event and be used to extort the vendor or the event organizers.
Attacks on ICS/OT environments often follow this pattern:
Initial Access: Attackers typically gain initial access through the less-secure IT network via phishing (T1566 - Phishing) or by scanning the internet for exposed OT devices like HMIs with default passwords (T1190 - Exploit Public-Facing Application).
Discovery & Lateral Movement: Once in the IT network, attackers search for connections to the OT network. They move laterally from IT to OT, often exploiting trust relationships and a lack of segmentation (T1021 - Remote Services). Inside the OT network, they use industrial protocols like Modbus or DNP3 to discover and identify critical controllers (T0829 - Network Sniffing).
Impact: The ultimate goal is to impact the physical process. This can be achieved by sending malicious commands to Programmable Logic Controllers (PLCs) (T0831 - Manipulation of Control) or by deploying ransomware on HMIs and engineering workstations, rendering them inoperable (T1486 - Data Encrypted for Impact).
| Tactic | Technique ID | Technique Name |
|---|---|---|
| Initial Access | T0886 |
Remote Services |
| Discovery | T0846 |
Network Sniffing |
| Lateral Movement | T0867 |
Exploitation of Remote Services |
| Command and Control | T0884 |
Connection Proxy |
| Inhibit Response Function | T0814 |
Denial of Service |
| Impair Process Control | T0831 |
Manipulation of Control |
Cyberattacks on ICS/OT environments can have devastating real-world consequences:
Detecting threats in OT networks requires specialized monitoring:
| Type | Value | Description |
|---|---|---|
| network_traffic_pattern | IT-to-OT traffic |
Any unauthorized or unexpected traffic crossing the boundary from the IT network to the OT network. |
| protocol | Modbus, DNP3, S7 |
Monitor industrial protocol traffic for unauthorized commands, such as writing to PLC registers from an unknown source. |
| log_source | HMI/SCADA logs |
Look for logins from new or unauthorized user accounts, or changes to control logic. |
| port | 5900 |
Monitor for unexpected VNC traffic (port 5900), which could indicate an attacker attempting a remote takeover of an HMI. |
Securing ICS environments requires a combination of traditional IT security practices and OT-specific controls.
Network Segmentation (M0930): The most critical defense is robust Network Segmentation. The OT network must be strictly isolated from the IT network and the internet. A properly configured DMZ should be used to mediate any required communication between the two environments.
Remove Exposed Assets: Do not expose HMIs, PLCs, or other OT devices directly to the internet. Use secure remote access solutions, such as a VPN with MFA, for any required external access.
Vulnerability Management (M0941): While patching can be challenging in OT environments, a risk-based vulnerability management program is essential. Identify and prioritize patching for critical vulnerabilities, especially on any systems that bridge the IT/OT divide.
User Account Management (M0942): Apply the principle of least privilege. Do not use shared or default passwords on OT devices. Ensure engineers and operators have only the access they need to perform their roles.
Forescout report reveals 84% surge in OT protocol attacks, with 71% of exploited vulnerabilities not in CISA KEV catalog, complicating defense.
The most fundamental and effective defense for OT environments is robust Network Isolation. The OT network, which controls physical processes, must be strictly separated from the corporate IT network. This is achieved by implementing a DMZ (Demilitarized Zone) architecture with firewalls at the boundary. All traffic between IT and OT must pass through this DMZ and be subject to strict inspection and access control. Direct connections from the internet to any OT device should be strictly forbidden. This segmentation ensures that a compromise on the IT network does not automatically grant an attacker access to the sensitive OT environment, containing the threat and preventing physical disruption.
To detect threats that have bypassed perimeter defenses, organizations need deep visibility into the OT network itself. This is achieved by deploying a passive OT network monitoring solution that performs Network Traffic Analysis. These tools understand industrial protocols (e.g., Modbus, DNP3, S7) and can baseline normal communication patterns. They can then alert on anomalous or malicious activity, such as: an unauthorized workstation attempting to program a PLC, a device communicating with a known-malicious IP, or the use of function codes that could shut down a process. This provides early warning of an intrusion and allows operators to respond before a physical impact occurs.
Platform Hardening is critical for reducing the attack surface of OT devices. This involves several key actions. First, change all default passwords on HMIs, PLCs, and network devices. Second, disable any unused ports and services on these devices. Third, remove or secure any internet-exposed HMIs or SCADA systems immediately. Access to these systems should only be possible via a secure, MFA-protected VPN that terminates in the IT network, with further controlled access into the OT environment. Hardening these devices makes it significantly more difficult for attackers to gain their initial foothold or move laterally within the OT network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats