Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026

Significant Rise in Ransomware Attacks Targeting Industrial Operations

February 17, 2026
Facebook X (Twitter) Instagram
Tuesday, February 17
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Significant Rise in Ransomware Attacks Targeting Industrial Operations
Cyber Security

Significant Rise in Ransomware Attacks Targeting Industrial Operations

Team-CWDBy Team-CWDFebruary 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


There has been a sharp rise in the number of ransomware groups targeting industrial organizations as cybercriminals continue to exploit vulnerabilities in operational technology (OT) and industrial control systems (ICS), researchers at Dragos have warned.

A total of 119 ransomware groups targeting industrial organizations were tracked during 2025 according to the Dragos Annual OT Cybersecurity Year in Review for 2026, published on February 17. That figure represents a 49% increase from the 80 which were tracked in 2024.

According to Dragos, 2025 saw 3300 industrial organizations around the world hit by ransomware, compared with 1693 in 2024. The most targeted sector was manufacturing, followed by transportation.  

Oil and gas, electricity and communications were also among the most targeted critical and industrial systems.

Legitimate Login Credentials Abused

The most common cause of network compromise during observed attacks was via remote-access portals and virtualization services, including VPN portals, firewall interfaces or vendor tunnels. Attackers often leveraged legitimate login credentials of a real user to avoid detection.

“Identity abuse allowed adversaries to move rapidly and quietly through enterprise environments,” said Dragos.

These credentials were stolen via phishing attacks, successful execution of infostealer malware or bought on the dark web via initial access brokers. Cybercriminals then exploited this access to cross IT and OT boundaries and gain entry to industrial and operational systems.

The report details how one ransomware affiliate used compromised VPN access to reach an OT-adjacent ESXi hypervisor and deploy ransomware on SCADA supporting virtual machines.

Although no devices directly controlling industrial equipment were touched, the loss of the virtualization layer removed operator visibility and control. This resulted in operational delays until the systems were rebuilt.

Ransomware groups were also able to maintain stealthy persistence on industrial networks. Industry-wide, the average dwell time – time in the network without being spotted or disrupted before a ransomware attack is triggered – for ransomware in OT environments was 42 days

“Ransomware groups are causing more operational disruption and multi-day outages that require OT-specific recovery,” said Robert M. Lee, CEO and co-founder of Dragos. 

“Establishing comprehensive OT visibility now is critical. If organizations cannot monitor their systems today, they’ll find that future adoption of technologies like AI, battery storage, and distributed energy resources creates exponentially greater blind spots,” he added.

The report also detailed three new threat groups with Dragos identified during the last year.

These were Sylvanite, an initial access broker, observed targeting US electric and water utilities, Azurite, a group focused on long-term access to OT systems which targeted organizations around the world and Pyroxene, a group which engages in supply chain compromise attacks via social engineering to gain access to industrial IT and OT networks.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleInfostealer Targets OpenClaw to Loot Victim’s Digital Life
Next Article China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
Team-CWD
  • Website

Related Posts

Cyber Security

New Mobile Spyware ZeroDayRAT Targets Android and iOS

February 10, 2026
Cyber Security

NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting CNI

February 10, 2026
Cyber Security

Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How chatbots can help spread scams

October 14, 2025

Can password managers get hacked? Here’s what to know

November 14, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.