WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts VANADINITE – New ICS Threat Activity Group Potentially Linked to Use of Ransomware Against Industrial Organizations
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partnerships
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

VANADINITE – New ICS Threat Activity Group Potentially Linked to Use of Ransomware Against Industrial Organizations

Author: Jennifer Walker

Created: Thursday, March 18, 2021 - 17:38

Categories: Cybersecurity

In its recent ICS Cybersecurity 2020 Year in Review Report (shared in the Security & Resilience Update for February 25, 2021) Dragos revealed four new ICS threat activity groups, KAMACITE, VANADINITE, STIBNITE, and TALONITE, and has been featuring them in follow up blog posts, starting with KAMACITE – an activity group linked to BLACKENERGY and the Ukraine power events. Next up is VANADINITE, another threat activity group with a focus on electric utilities, along with oil and gas, manufacturing, telecommunications, and transportation with targets primarily in North America and Europe.

Thus far, VANADINITE has largely gained initial access into victim infrastructure by exploiting external-facing network and security devices using publicly available exploits. While most of VANADINITE’s operations has been limited to initial access and conducting information-gathering, Dragos has observed activity regarding ColdLock ransomware that they suspect may be attributable to VANADINITE. Dragos assesses that VANADINITE may continue to use ransomware in future operations targeting industrial entities. Additionally, Dragos assesses with high confidence that VANADINITE will continue to leverage exploiting recently disclosed vulnerabilities for initial access because of the success obtained using this method. Most importantly, asset owners and operators should treat vulnerabilities in external-facing network appliances as a serious issue, as multiple ICS-targeting adversaries successfully use this technique. For more details, including how to detect and mitigate VANADINITE network exploitation, visit Dragos.

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar