WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home H2OSecCon 2026 OT/ICS Security – What Threats are Impacting ICS Endpoints?
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

OT/ICS Security – What Threats are Impacting ICS Endpoints?

Author: Jennifer Walker

Created: Thursday, July 1, 2021 - 18:14

Categories: Cybersecurity

Based on its extensive visibility into OT environments, TrendMicro recently released a report highlighting the threats to ICS endpoints. The 2020 Report: ICS Endpoints as Starting Points for Threats shares the status of global industrial systems in terms of security against both known and new threats that hound ICS endpoints. TrendMicro looked at the data from ICS endpoints that are part of the IT/OT network, specifically industrial automation suites and Engineering Workstations. This report does not include ICS endpoints from air-gapped systems or those without an internet connection. According to TrendMicro, the ICS endpoints in this research are found at various levels of the IT/OT network architecture, except the process and control level. All the identified ICS endpoints were running Windows operating systems. The results reveal ransomware, coinminers, and legacy malware (think 2008’s Conficker) are the big impacts to ICS endpoints. Legacy threats are due partly (if not largely) to the use of USB’s for transferring files. For more on threats to OT systems from USBs, see the WaterISAC Resource Center post Say it isn’t so…USB’s are Still a Threat to OT Systems for highlights from Honeywell’s USB Threat Report 2020. Trend also provides a one-page primer of its report that might be good to share with leadership. For more findings and recommendations on how to combat these threats, access the report at TrendMicro.

Related Resources

Members Only

(TLP:AMBER) DHS Office of Intelligence and Analysis Reports (May 21, 2026)

May 21, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

(TLP:CLEAR) Weekly Vulnerabilities to Prioritize – May 21, 2026

May 21, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:GREEN) PEAR Ransomware Claims U.S. Drinking Water Utility as Victim

May 21, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar