Switzerland's critical infrastructure is under persistent cyber threat, with the Swiss Federal Office for Cybersecurity (NCSC) receiving 325 mandatory reports of cyberattacks in the last twelve months. This averages to nearly one attack per day. The data comes from the first annual review since a new law mandated that operators of critical infrastructure report cyberattacks within 24 hours. The government's administrative sector was the most heavily targeted, accounting for approximately a quarter of all incidents. Other frequently targeted sectors include IT and telecommunications, banking, and insurance. The most common types of attacks reported were hacking, Distributed Denial of Service (DDoS), malware infections, and data leaks, painting a picture of a diverse and constant threat landscape facing the nation.
The report provides a statistical snapshot of the cyber threats facing Swiss critical infrastructure.
In addition to the mandatory reports, the NCSC also received nearly 65,000 voluntary reports of cyber incidents in 2025, primarily from private individuals. This indicates a high level of public awareness but also highlights the sheer volume of cyber threats at all levels of society.
The report categorizes attacks rather than detailing specific technical incidents. However, the prevalence of certain attack types allows for an analysis based on common TTPs associated with them.
T1190) to using valid accounts (T1078). The goal is typically to gain unauthorized access for espionage or further attacks.T1498 - Network Denial of Service. This is a common tactic used by hacktivists and state-sponsored actors to make a political statement or cause economic damage.T1566) or exploitation of vulnerabilities.T1486 - Data Encrypted for Impact.The persistent targeting of Swiss critical infrastructure has significant national security and economic implications.
This is a statistical report; no specific IOCs were provided.
Detection: For organizations operating critical infrastructure, a multi-layered detection strategy is essential.
Response: The mandatory reporting law is a key component of Switzerland's national cybersecurity response. It allows the NCSC to gain a clearer picture of the threat landscape, identify trends, and share relevant intelligence with other critical infrastructure operators.
The NCSC report underscores the need for robust, foundational security controls across all critical sectors.
Tactical (Immediate):
M1051 - Update Software.Strategic (Long-Term):
M1032 - Multi-factor Authentication) and network segmentation (M1030 - Network Segmentation).Regularly patch systems to mitigate vulnerabilities commonly used by attackers.
Implement MFA to protect against the use of stolen credentials.
Segment networks to limit the impact of a breach and prevent lateral movement.
Given that DDoS and hacking were top attack methods against Swiss critical infrastructure, implementing robust Inbound Traffic Filtering is a paramount defensive measure. This goes beyond simple firewall rules. Organizations should deploy a layered approach: at the network edge, use a cloud-based DDoS mitigation service to scrub volumetric attacks before they reach the organization's perimeter. Behind that, Web Application Firewalls (WAFs) should be configured to inspect traffic for common web exploits (SQLi, XSS) and to enforce geo-blocking rules if applicable. For non-web protocols, network firewalls should be configured with strict access control lists (ACLs) that deny all traffic by default and only permit connections on specific ports and protocols from known, trusted IP ranges. This D3FEND technique directly counters two of the most significant threats highlighted in the report.
The prevalence of 'hacking' and 'malware' in the Swiss report points to a foundational weakness that attackers consistently exploit: unpatched vulnerabilities. A systematic and aggressive Software Update program is one of the most effective defenses. Critical infrastructure operators must implement automated asset and vulnerability discovery to maintain a complete inventory of their software. A risk-based prioritization approach should be used, focusing first on patching internet-facing systems and critical vulnerabilities known to be exploited in the wild (e.g., those in CISA's KEV catalog). The goal should be to meet or exceed defined SLAs for patching, such as '48 hours for critical vulnerabilities.' This D3FEND technique is not just about applying patches; it's about building a mature vulnerability management program that reduces the attack surface available to threat actors.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats