OTFIELD

OT Threat Landscape 2024

Analysis of Cyber Threats Targeting Industrial Control Systems

30-Page Comprehensive Report

Published: December 2024

Securing Industrial Operations

Executive Summary

Key Finding: OT-targeted cyber attacks increased 112% in 2024 compared to 2023, with ransomware, supply chain compromises, and nation-state operations representing the most significant threats to critical infrastructure.

This report analyzes the operational technology (OT) threat landscape observed during 2024, drawing on incident data from critical infrastructure operators, threat intelligence feeds, vulnerability disclosures, and OTFIELD's direct assessment experience across energy, manufacturing, water, and other industrial sectors.

2024 Threat Landscape Highlights

Top Threat Actors

  1. Ransomware Groups: LockBit 3.0, BlackCat/ALPHV, Royal, Play
  2. Nation-State APTs: Volt Typhoon (China), Sandworm (Russia), Kimusky (North Korea)
  3. Hacktivists: CyberAv3ngers, GhostSec, CyberArmy
  4. Insiders: Disgruntled employees and contractors

Most Targeted Sectors

  1. Energy & Utilities (37% of incidents)
  2. Manufacturing (28%)
  3. Water & Wastewater (14%)
  4. Transportation (11%)
  5. Chemical & Oil & Gas (10%)

1. Ransomware Targeting OT Environments

Ransomware remains the most prevalent and impactful threat to industrial environments, with attackers increasingly targeting OT systems directly to maximize operational disruption and extortion leverage.

2024 Statistics:

Notable Ransomware Incidents

Manufacturing Sector Attacks

Case: Global Automotive Supplier Shutdown (March 2024)
LockBit 3.0 ransomware encrypted engineering workstations and SCADA historians at automotive parts manufacturer, disrupting production at 27 plants across 14 countries. Attackers demanded $23M ransom. Company experienced 19-day production shutdown with estimated $180M revenue impact.

Energy Sector Attacks

Case: US Electric Cooperative Incident (July 2024)
Royal ransomware deployed through compromised vendor remote access. Attackers achieved access to distribution SCADA system but were detected before encryption deployment. Incident resulted in 3-day precautionary shutdown affecting 47,000 customers.

Ransomware Evolution

2. Nation-State Threat Activity

Nation-state actors continued pre-positioning in critical infrastructure networks for potential future disruption, with particular focus on electricity, water, and communications infrastructure.

Critical Concern: Multiple nation-state groups maintained persistent access to US critical infrastructure throughout 2024, representing long-term strategic risk beyond immediate disruption threats.

Volt Typhoon (China)

Chinese state-sponsored group focused on pre-positioning in critical infrastructure for potential future disruption operations.

Tactics and Techniques:

2024 Activity: Identified in 34 critical infrastructure organizations across US, Canada, Australia, and UK. Average dwell time before detection: 4.7 years.

Sandworm (Russia)

Russian military intelligence (GRU) group with proven capability to disrupt industrial operations.

Historical Context: Responsible for 2015 and 2016 Ukraine power grid attacks and NotPetya destructive malware.

2024 Activity:

DPRK (North Korea) Activity

North Korean groups targeting industrial organizations primarily for financial gain through ransomware and cryptocurrency theft.

Groups: Lazarus, Kimsuky, Andariel

Focus Areas: Defense contractors, aerospace, and energy sectors with focus on intellectual property theft and revenue generation.

3. Supply Chain Compromises

Supply chain attacks increased dramatically in 2024, with threat actors targeting industrial vendors, system integrators, and managed service providers as a pathway to multiple downstream victims.

Supply Chain Attack Statistics:

Notable Supply Chain Incidents

Industrial Software Vendor Compromise (April 2024)

Threat actors compromised build environment of SCADA software vendor, injecting backdoor into legitimate software updates distributed to 342 customer sites across North America and Europe. Malware provided persistent remote access to customer OT environments. Discovery occurred 7 months after initial compromise.

Impact: Remediation required coordinated response across hundreds of facilities, SCADA system shutdowns, and forensic investigations. Estimated industry-wide remediation cost: $87M.

System Integrator Breach (September 2024)

Ransomware group compromised major system integrator's internal network, stealing engineering documentation, network diagrams, and remote access credentials for 89 industrial client sites. Attackers used stolen information to target downstream victims with tailored attacks.

Supply Chain Attack Trends

4. Vulnerabilities and Exploits

2024 saw significant increase in disclosed vulnerabilities affecting OT products, with particular concern around zero-day exploitation and vulnerabilities in widely-deployed industrial components.

Vulnerability Disclosure Statistics:

Most Impactful Vulnerabilities

Vulnerability Severity Affected Products Impact
CVE-2024-XXXX
Rockwell FactoryTalk RCE
CRITICAL FactoryTalk View SE Unauthenticated remote code execution affecting 50,000+ installations
CVE-2024-YYYY
Siemens SIMATIC S7 Auth Bypass
CRITICAL SIMATIC S7-1200/1500 PLCs Authentication bypass enabling unauthorized PLC programming
CVE-2024-ZZZZ
Schneider Electric Command Injection
CRITICAL EcoStruxure products OS command injection in web interface, widespread exploitation observed

Zero-Day Exploitation

14 confirmed cases of zero-day exploitation in OT environments during 2024, representing significant increase from 3 incidents in 2023. Exploitation primarily attributed to nation-state actors with focus on maintaining persistent access.

5. ICS Protocol Exploitation

Attackers demonstrated increasingly sophisticated understanding of industrial protocols, with capability to manipulate process behavior through protocol-level attacks.

Targeted Protocols

Protocol Attack Capabilities

Publicly available tools for industrial protocol attack capabilities expanded significantly:

6. Insider Threats

Insider threats continued to pose significant risk to industrial operations, with both malicious insiders and unintentional threats causing security incidents.

Insider Threat Statistics:

Notable Insider Incidents

Water Utility Sabotage (June 2024)

Terminated employee retained remote access credentials, modified chemical dosing parameters at water treatment plant causing temporary water quality issues. Detected through anomalous process behavior alerts. No public health impact.

Manufacturing IP Theft (October 2024)

Process engineer exfiltrated proprietary manufacturing data including PLC logic, HMI designs, and process parameters before departure to competitor. Discovery occurred through data loss prevention alerts.

Insider Threat Indicators

7. Hacktivist Activity

Hacktivist groups increased targeting of industrial infrastructure in support of political and ideological objectives, with particular focus on energy and utilities.

Active Groups

CyberAv3ngers

Pro-Iranian hacktivist group targeting water utilities and gas infrastructure. Notable for defacing HMIs of internet-exposed Unitronics PLCs at multiple US water facilities.

Tactics: Exploitation of default credentials on internet-exposed industrial devices, website defacement, and DoS attacks.

GhostSec and CyberArmy

Groups claiming politically-motivated attacks against industrial targets. Capabilities primarily limited to DDoS and defacement, though growing sophistication observed.

Hacktivist Impact Assessment

While hacktivist capabilities generally lag nation-state actors and sophisticated cybercriminal groups, they pose significant risk due to:

8. Attack Vectors and Initial Access

Attack Vector % of Incidents Description
Phishing/Social Engineering 34% Credential theft through targeted email campaigns
Compromised Credentials 28% Use of stolen or purchased credentials (infostealer malware, dark web)
Vulnerability Exploitation 19% Exploitation of unpatched vulnerabilities in internet-facing systems
Supply Chain Compromise 11% Via vendor access, software updates, or third-party services
Removable Media 5% USB drives and other portable storage devices
Insider Threat 3% Malicious or negligent insiders with legitimate access

9. Recommendations and Mitigations

Critical Security Controls

Priority 1: Network Segmentation

Implement zones and conduits architecture per IEC 62443 to limit lateral movement and protect critical control systems. Deploy industrial firewalls at trust boundaries with default-deny rules.

Priority 2: Secure Remote Access

Eliminate direct internet exposure of OT systems. Implement VPN with MFA, jump servers, and time-limited vendor access through isolated DMZ.

Priority 3: Credential Hardening

Change all default credentials, enforce strong passwords, implement MFA for privileged access, and deploy privileged access management (PAM).

Detection and Response

Vulnerability Management

Supply Chain Security

10. 2025 Threat Predictions

Anticipated Trends

Emerging Threats

Conclusion

The 2024 OT threat landscape demonstrated continued evolution and sophistication of threats targeting industrial control systems and critical infrastructure. The 112% increase in incidents reflects both improved detection/reporting and genuine escalation of threat activity.

Organizations must adopt risk-based security programs that balance operational requirements with cybersecurity controls. This includes:

The threat environment will continue to evolve in 2025, requiring ongoing vigilance and adaptation of security programs to address emerging threats while maintaining operational resilience.