The Waterfall Threat Report 2026 has identified a significant, dual-faced trend in the industrial cybersecurity landscape. On one hand, the number of publicly reported cyberattacks on heavy industry and critical infrastructure that resulted in physical consequences (e.g., operational shutdowns) saw a 25% decrease in 2025. This drop is largely attributed to a temporary slowdown in ransomware activity. However, this seemingly positive development is overshadowed by a more alarming trend: a 100% increase in attacks from nation-states and hacktivists targeting these same critical sectors. The report warns that the ransomware lull is not permanent and calls for a shift in defensive thinking towards engineering-based solutions over purely software-based protections.
The report analyzes publicly available data on cyberattacks targeting industrial control systems (ICS) and operational technology (OT) environments. While Ransomware has been the dominant driver of incidents with physical consequences from 2019-2024, its activity leveled off in 2025. In its place, politically motivated attacks from nation-state actors and hacktivists have surged, indicating a shift in adversary focus towards disruption and espionage against critical national infrastructure.
The shift from financially motivated ransomware to politically motivated nation-state attacks has significant implications for Critical Infrastructure. While ransomware aims to extort money, nation-state campaigns can have more strategic goals, including:
The doubling of such attacks represents a direct threat to national security, public safety, and economic stability.
Detecting sophisticated nation-state actors in OT environments is exceptionally challenging. It requires a defense-in-depth approach:
Network Traffic Analysis (D3-NTA).The report advocates for a fundamental shift in how industrial operations are secured, moving beyond a sole reliance on software.
M1030 - Network Segmentation). This prevents attackers who compromise the IT network from pivoting into the industrial control environment.M1047 - Audit).Critical for separating IT networks from sensitive OT environments to prevent lateral movement from a less secure to a more secure zone.
Training employees to recognize phishing attempts and social engineering is crucial for preventing initial access.
Deploying and maintaining antimalware solutions on applicable systems within the industrial environment can detect and block known threats.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats