Read Time:1 Minute, 42 Second

The leading OT, ICS and IoT security company has released their latest findings on 2022 cybersecurity risks.

Hacktivism is an act of denial of service attack (DOS). This cyber risk causes a system to shut down, preventing user access. However, according to the report from Nozomi Networks, hacktivists are changing to destructive malware from data theft and DDOS.

They gained traction in the second half of 2022, and their main goal is to disturb critical infrastructure to push the hacktivist’s political intentions for the Russia-Ukraine war. 

“Over the past six months, cyberattacks have increased significantly, causing major disruption to industries ranging from transportation to healthcare,” says Roya Gordon, OT/IoT Security Research Evangelist, Nozomi Networks.

Major public infrastructures like railways have been subject to attack. 

“As cyber threats evolve and intensify, it is important for organisations to understand how threat actors are targeting OT/IoT and the actions required to defend critical assets from threat actors.”

The report also found that trojans are the most common malware in networks of IT enterprises, while Remote Access Tools (RATs) are used in targeting IoT devices. Additionally, Malicious IoT botnet activity is already at its peak, yet it further increases in the 3rd quarter of 2022.

More than 5,000 unique attacks were recorded from July to December of 2022. The IP addresses of the attackers originate primarily in countries like the U.S., South Korea, China, and Taiwan.

Manufacturing and the energy sector continue to be the most at risk, with water/wastewater, healthcare, and transportation systems following.

In the final half of 2022:

Compared to the year’s first half, CISA disclosed 218 Common Vulnerabilities and Exposures (CVEs), a 61% decrease.

Seventy vendors were affected, an increase of 16% from the prior reporting period.

Additionally, affected goods increased by 6% from the first half of 2022.

Nozomi Networks’ OT/IoT Security Report: A Deep Look into the ICS Threat Landscape helps security professionals to detect, reevaluate risk models, and pose solutions to gain a more secure infrastructure.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post Kaspersky Has Been Named Leader of the Spark Matrix Managed Security Services (MSS)
Next post Internet Blackouts: A New Way to Cut Freedom of Speech in the Digital Realm