Hackers are increasingly targeting industrial systems with brute force, CISA warns

An abstract image of padlocks overlaying a digital background.
(Image credit: Shutterstock) (Image credit: Shutterstock)

Hackers are increasingly targeting internet-connected operational technology (OT) and industrial control system (ICS) endpoints, a stark warning from the US Cybersecurity and Infrastructure Security Agency (CISA) has said.

In its warning, the agency did not say who the hackers are, but hinted they might be Russian, claiming hackers are going after devices through “unsophisticated means” - mostly brute-force attacks, and are trying to log into the devices by using default credentials.

They seem to be successful, too, and in many instances, they are compromising devices in the Water and Wastewater Systems (WWS) Sector. This allows them to do real-life, physical harm, since these devices regulate water treatment processes, distribution, and pressure. By targeting endpoints in the WWS sector, they could disrupt the continuous, safe water supply for many people.

Attacks on the rise

To defend their devices, OT and ICS operators in critical infrastructure sectors should apply the recommendations listed in Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity article, CISA stressed. The agency also urged organizations to visit CISA’s Secure by Design web page and learn more about the secure-by-design principles and practices.

CISA is hardly the first agency to warn about OT systems being hit as hard as never before. In mid-June 2024, Fortinet gave a similar assessment, after surveying more than 550 OT pros around the world, having found almost three quarters (73%) of businesses faced OT attacks this year.

In 2023, this figure was 49%, suggesting a significant increase in mere 12 months.

It’s not just about the breadth of the attacks, either. The frequency has also significantly increased, as a third (31%) of respondents reported more than six intrusions in the past year. The year before, just 11% reported the same thing.

Fortinet suggests cybercriminals have been quick to adapt to current security measures, while organizations lagged behind.

Via BleepingComputer

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Avast cybersecurity
Hackers are hijacking government software to access sensitive servers
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
IoT’s botnet problem is up 500% – three things admins must do now
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Russia
Major Russian hacking group shifts focus to US and UK targets
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)