Software Supply Chain Threats and Persistent Ransomware Attacks Raise the Stakes for Enterprise Cybersecurity
SAN FRANCISCO, February 18, 2021 — A new report from Nozomi Networks Labs finds cyber threats to industrial and critical infrastructure have reached new heights as threat actors double down on high value targets. With industrial organizations ramping connectivity to accelerate digital transformation and remote work, threat actors are weaponizing the software supply chain and ransomware attacks are growing in number, sophistication and persistence.
“This report leaves no doubt that the time for action is now,” said Nozomi Networks Co-founder and CTO Moreno Carullo. “The recent Oldsmar, Florida, water system attack and the ongoing SolarWinds investigation are dramatic reminders that the critical infrastructure and other systems that we rely on are vulnerable and at constant risk of attack. Understanding the effectiveness of defenses against the emerging threat and vulnerability landscape is vital to success.”
Nozomi Networks’ latest “OT/IoT Security Report,” gives cybersecurity professionals an overview of the OT and IoT threats analyzed by Nozomi Networks Labs security research team. The report found:
- Ransomware activity continues to dominate the threat landscape, growing in sophistication and persistence. In addition to demanding financial payments, Ryuk, Netwalker, Egregor and other ransomware gangs are exfiltrating data and deeply compromising networks for future nefarious activities.
- Supply chain threats and vulnerabilities show no signs of slowing. The unprecedented SolarWinds attack not only infected thousands of organizations including U.S. Government agencies and critical infrastructure, but it also demonstrates the massive potential for attack via supply chain weaknesses.
- Threat actors are targeting healthcare. Nation states are using off-the-shelf red team tools to execute attacks and perform cyber espionage against facilities involved with COVID-19 research. Ransomware crews are targeting healthcare providers and hospitals, in some cases disrupting patient treatment.
- Analysis of 151 ICS-CERTs published in the last six months found memory corruption errors are the dominant vulnerability type for industrial devices.
“Urgency has never been higher. As industrial organizations race toward digital transformation, threat actors are taking advantage of greater OT connectivity to create attacks that aim to disrupt operations and threaten the safety, profitability and reputation of enterprises around the globe,” said Nozomi Networks CEO Edgard Capdevielle. “While threats may be on the rise, the technologies and practices to defeat them are available today. We encourage organization to act quickly to implement the recommendations in this report. It’s never been more important or more possible to take the necessary steps to detect and defend critical infrastructure and industrial operations.”
Nozomi Networks’ “OT/IoT Security Report” summarizes the biggest threats and risks to OT and IoT environments. The report provides information on 18 specific threats that IT and OT security teams should study as they model threat vectors and evaluate risks across operational technology systems. It includes 10 key recommendations and actionable insights to improve defenses against the current threat landscape.
- Read: OT/IoT Security Report: Supply Chain and Persistent Ransomware Attacks Reach New Heights
- Read the Blog Post: New Report: Top OT/IoT Security Threats and Vulnerabilities
- Sign Up for the Webinar: Insights on the Top OT/IoT Security Threats – How to Protect Your Operations
About Nozomi Networks
Nozomi Networks is the leader in OT and IoT security and visibility. We accelerate digital transformation by unifying cybersecurity visibility for the largest critical infrastructure, energy, manufacturing, mining, transportation, building automation and other OT sites around the world. Our innovation and research make it possible to tackle escalating cyber risks through exceptional network visibility, threat detection and operational insight. www.nozominetworks.com
Follow Nozomi Networks: BLOG | |