Friday , July 12 2024

OT/IoT Malware Surges Tenfold in First Half of 2023

According to Nozomi Networks, cyber threats related to malware in operational technology (OT) and Internet of Things (IoT) environments have increased tenfold in the first six months of 2023 compared to the previous six months.

The latest Nozomi Networks Labs OT & IoT Security Report was compiled by the security vendor using a combination of ICS vulnerabilities, data collected from IoT honeypots, and attack statistics gathered from OT environments.

CVE-2024-5910
Critical Vulnerability Threatens Palo Alto Networks’ Expedition

Palo Alto Networks has issued a critical security advisory outlining numerous vulnerabilities across its product lines, such as PAN-OS, Cortex...
Read More
CVE-2024-5910  Critical Vulnerability Threatens Palo Alto Networks’ Expedition

Vulnerabilities in GitLab Allows Attackers to Execute Unauthorized Pipelines

GitLab has issued a warning about a serious vulnerability in its GitLab Community and Enterprise editions. This vulnerability allows attackers...
Read More
Vulnerabilities in GitLab Allows Attackers to Execute Unauthorized Pipelines

Adobe Issues Critical Security Patches for Various Products

Adobe released security updates to fix several vulnerabilities in their software. These vulnerabilities could be used by cyber attackers to...
Read More
Adobe Issues Critical Security Patches for Various Products

CISA Warns Hacker Use OS Command Injection Vulnerabilities to Compromise Systems

OS command injection vulnerabilities are a preventable type of weakness in software. Manufacturers can eliminate them by taking a secure...
Read More
CISA Warns Hacker Use OS Command Injection Vulnerabilities to Compromise Systems

Pakistan allows spy agency to intercept phone messages, calls

The Pakistan Ministry of Information Technology and Telecommunication has given permission to the Inter-Services Intelligence (ISI) to intercept citizens’ phone...
Read More
Pakistan allows spy agency to intercept phone messages, calls

Citrix Issues Critical Security Advisory for NetScaler

Citrix has warned users about severe vulnerabilities in their widely-used NetScaler products. These vulnerabilities, known as CVE-2024-6235 and CVE-2024-6236, could...
Read More
Citrix Issues Critical Security Advisory for NetScaler

(CVE-2024-38080, CVE-2024-38112)
Microsoft July Patch Tuesday fixes 142 flaws, 4 zero-days

Microsoft's July 2024 Patch Tuesday includes security updates for 142 flaws, including two zero-days that are actively exploited and two...
Read More
(CVE-2024-38080, CVE-2024-38112)  Microsoft July Patch Tuesday fixes 142 flaws, 4 zero-days

EXCLUSIVE
Analysis of 3 Ransomware Threats Active Right Now

Three emerging threats will be discussed below, along with how sandbox analysis can be utilized to detect them proactively. Lockbit...
Read More
EXCLUSIVE  Analysis of 3 Ransomware Threats Active Right Now

AVAST RELEASED DECRYPTOR FOR DONEX RANSOMWARE

Avast researchers found a security flaw in the DoNex ransomware and its previous versions, which allowed them to create a...
Read More
AVAST RELEASED DECRYPTOR FOR DONEX RANSOMWARE

Critical Security Advisory for Apache CloudStack

The Apache Software Foundation has warned about two serious security issues (CVE-2024-38346 and CVE-2024-39864) in Apache CloudStack, a popular open-source...
Read More
Critical Security Advisory for Apache CloudStack

“Specific to malware, denial-of-service (DoS) activity remains one of the most prevalent attacks against OT systems,” the vendor explained in a blog post announcing the report.

ALSO READ:

“Mysterious team Bangladesh”, Group IB-report-hacktivists

The category most commonly utilized by attackers to obtain control over compromised machines is the remote access trojan (RAT). Without a doubt, in the realm of IoT network domains, the most dangerous threat is the Distributed Denial of Service (DDoS) attacks. This year, malicious IoT botnets continue to represent a substantial danger. Threat actors are persistently targeting interconnected IoT devices, exploiting default credentials in their relentless pursuit of gaining access.

The report states that Trojans, “dual use” malware, and ransomware were frequently detected in both OT and IoT environments. Phishing was identified as a common method used to steal information, gain initial access, and distribute malware. New variants of the 2016 Mirai botnet were also uncovered.

There was a 22% decrease in alerts compared to the last six months. However, poor authentication and neglecting password hygiene are still the most significant threats during this period. Moreover, there was a notable increase of 15% in network anomalies and attacks. Additionally, access control and authorization threats showed a significant surge of 128%.

According to Nozomi Networks, the sectors most severely affected were manufacturing, energy, healthcare, water, and wastewater, as well as the public sector.

According to the report, water treatment plants encountered a significant volume of generic network scans, while oil and gas establishments endured OT protocol packet injection attacks.

During a span of six months, a staggering 643 vulnerabilities related to OT/IoT were brought to light, highlighting the persistent security risks that exist in this domain. Moreover, Nozomi’s honeypots were adept at uncovering an alarming average of 813 distinct attacks on a daily basis.

Check Also

open source software

CISA Plans to Measure Trust in Open-Source Software

The United States cyber defense agency is creating a new framework to answer a critical …

Leave a Reply

Your email address will not be published. Required fields are marked *