SECURITY REPORT

OT/IoT Cybersecurity Trends and Insights

2025 1H Review | July 2025
Read the full report

Twice a year the Nozomi Networks Labs teams assesses the OT/IoT threat landscape, leveraging a vast network of globally distributed honeypots, wireless monitoring sensors, inbound telemetry, partnerships, threat intelligence and other resources. Except for IoT botnet activity captured by our honeypots, all data in this report derives from anonymized telemetry from participating Nozomi Networks customers.

Here are highlights from our latest report, covering the first half of 2025.

Read the full report for deeper insights into:

Regional and industry risk exposure
Threats to industrial wireless networks
OT/ICS vulnerability trends
Persistent IoT botnet threats 
Recommendations for defense in depth

Important! If you’re a Nozomi Networks customer, you are covered for the vulnerabilities and threats in this report. Asset intelligence and threat intelligence about them is baked into our platform by the Labs team.

Wireless Networks Remain Wide Open to Attack

Industries increasingly rely on wireless technologies for critical operations, yet the vast majority of Wi-Fi Protected Access 2 (WPA2, the current wireless gold standard) networks are missing basic MFP protection, a critical feature that defends against manipulation of control frames.

Top Newly Discovered Vulnerabilities

Top 10 2025 Vulnerabilities Affecting Customer Environments

CVE ID
CVSS Score
CWE
CVE-2025-5419
8.8
CWE-125 <Out-of-bounds Read>
CVE-2025-5066
6.5
CWE-451 <User Interface (UI) Misrepresentation of Critical Information>
CVE-2025-5958
8.8
CWE-416 <Use After Free>
CVE-2025-5959
8.8
CWE-843 <Access of Resource Using Incompatible Type ('Type Confusion')>
CVE-2025-5063
8.8
CWE-416 <Use After Free>
CVE-2025-5283
5.4
CWE-416 <Use After Free>
CVE-2025-5068
8.8
CWE-416 <Use After Free>
CVE-2025-5064
5.4
CWE-200 <Exposure of Sensitive Information to an Unauthorized Actor>
CVE-2025-5280
8.8
CWE-787 <Out-of-bounds Write>
CVE-2025-5067
5.4
CWE-290 <Authentication Bypass by Spoofing>

Among the top ICS vulnerabilities published during this period that were found in customer environments, six out of 10 have a CVSS risk score of 8.8 (high), representing a significant threat.

Other vulnerabilities have a lower risk score, but many of them either don’t require authentication or let attackers bypass it, making them much easier to exploit.

Transportation and Manufacturing Are the Most Targeted Sectors

Transportation rose from #4 six months ago to #1 during this period, displacing Manufacturing as the most targeted sector among our customers.

Top 5 Most Targeted Sectors
1
Transportation
2
Manufacturing
3
Business Services
4
Minerals & Mining
5
Energy, Utilities & Waste

Denial-of-Service Is the Most Common Global Attack Technique

Top 10 Most Common MITRE ATT&CK® Techniques Associated with Raised Alerts

Technique ID
Technique Name
Tactics
Percentage
T1498
Network Denial of Service
Impact
17.6%
T0814
Denial of Service
Inhibit Response Function
17.4%
T1557
Adversary-in-the-Middle
Credential Access; Collection
16.0%
T0846
Remote System Discovery
Discovery
11.4%
T0841
Network Service Scanning
Discovery
11.4%
T1110
Brute Force
Credential Access
7.36%
T0812
Default Credentials
Lateral Movement
5.27%
T0859
Valid Accounts
Persistence; Lateral Movement
5.27%
T1565
Data Manipulation
Impact
4.11%
T1071
Application Layer Protocol
Command and Control
1.33%

Based on alerts gathered from anonymized telemetry, various Denial of Service (DoS) attacks comprised over a third of techniques detected in customer environments.

The Dynamic IoT Botnet Landscape

During this period, the U.S. overtook China as the location of the greatest number of compromised devices originating attacks. This is the first time that China hasn’t been #1 since we began monitoring botnet activity in 2022. Brute-forcing default SSH and Telnet credentials that grant high privileges is still the top technique cybercriminals use to gain access to IoT devices, a stark reminder to immediately change default credentials and enforce strong credential management

Tracking daily botnet attack volume, we see that activity peaked on January 17, 2025, similar in volume to the peak we observed in customer environments in September 2024. Both spikes appear to be related to Mirai variant attacks.

Attack Surface Locations
Unique Daily Attack IPs

Recommendations for Defense in Depth

Here are specific actions defenders can take to remove OT/IoT blind spots, maximize limited resources, increase operational resilience and reduce business risk.

Implement a risk reduction strategy that starts with a complete OT, IoT and IT asset inventory and leverages asset and threat intelligence for risk scoring and prioritization.
Prioritize anomaly detection and response to catch new threats that signature-based methods cannot.
Enhance vulnerability management with key metrics that factor asset criticality and exposure into risk scores.
Adopt regional and industry-specific threat intelligence to understand the unique risks you face.
Fortify defenses against botnet attacks with traffic analysis and anomaly detection tools, endpoint security and network segmentation.
Strengthen wireless network security with regular audits and continuous monitoring to identify vulnerabilities and mitigate common threats.

Download the Complete OT & IoT Security Report