WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships ICS/OT Ransomware Awareness – Dragos’s Most Recent Industrial Ransomware Analysis Highlights Rising Threat to Industrial Systems
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

ICS/OT Ransomware Awareness – Dragos’s Most Recent Industrial Ransomware Analysis Highlights Rising Threat to Industrial Systems

Author: Alec Davison

Created: Tuesday, April 25, 2023 - 17:04

Categories: Cybersecurity, OT-ICS Security

Ransomware attacks continued to be a significant threat to industrial organizations and infrastructure with threat actors employing old and novel tactics to compromise victims, according to Dragos’ most recent first quarter of 2023 Industrial Ransomware Analysis report.

Twenty of the 61 ransomware groups that Dragos tracks caused significant damage to industrial organizations through the use of continually evolving tactics. During the quarter, two new and significant trends were observed – the use of zero-day vulnerabilities and the exploitation of recently discovered vulnerabilities. Dragos observed a total of 214 ransomware incidents in the first quarter of 2023, a 13 percent increase from the previous quarter, which included twice the number of incidents observed last quarter for North America. Notably, the Clop ransomware group claimed to have used the GoAnywhere zero-day vulnerability (CVE-2023-0669) to impact 130 organizations in February 2023. Additionally, Lockbit 3.0 was responsible for 36 percent of the total ransomware attacks, nearly double the incidents in the last quarter.  

Dragos assesses with high confidence that “ransomware will continue to disrupt industrial operations, whether through the integration of operational technology (OT) kill processes into ransomware strains, flattened networks allowing ransomware to spread into OT environments, or precautionary shutdowns of production by operators to prevent ransomware from spreading to industrial control systems.” Access the full report at Dragos.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar