WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Report: Palo Alto Survey Reports 76% Detected Malicious Cyber Activity in the OT Environment
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Report: Palo Alto Survey Reports 76% Detected Malicious Cyber Activity in the OT Environment

Author: Jennifer Walker

Created: Thursday, March 21, 2024 - 16:29

Categories: OT-ICS Security, Security Preparedness

A recent report based on a survey commissioned by Palo Alto Networks in December highlights that 76% of industrial organizations experienced suspicious or malicious cyber activity in the OT environment.

Notables from the report:

  • Frequency of attacks. While in most cases organizations see attack attempts on a weekly, monthly or quarterly basis, 8% are targeted every couple of days, 4% daily, and 2% multiple times a day.
  • Attack impacts. From the 76% who reported direct attacks against OT, 24% said they were forced to shut down OT operations due to a successful attack in the past year, either because of actual disruption or as a preemptive measure.
  • Most feared attack types against OT: Malware, ransomware, insider, phishing, APT, and DoS.
  • The token AI questions. Three-quarters of respondents believe AI-enabled attacks on OT infrastructure are a critical issue today, but roughly the same percentage also believes security solutions enabled by AI will be critical for detecting and blocking attacks.
    • Roughly half of respondents are convinced that AI will help hackers more than security teams, and 47% believe the use of AI will reduce the number of security professionals needed by their company.
  • Primary entry point into OT. IT systems are unsurprisingly the most common entry point, but 28% reported seeing attacks that originated in their OT environment.
    • It is worth noting that 7 out of 10 industrial OT attacks originate in Informational Technology (IT) environments, signaling an urgent need for OT and IT departments and technologies to start working more closely together.
  • OT-IT collaboration of teams. On the other hand, only 43% of respondents said the relationship between IT and OT is coordinated or constructive. In 39% of cases there is friction and in 18% of organizations the two sides rarely connect over cybersecurity issues.

Analyst (Jennifer Lyn Walker) Comment: While the overall findings are nonetheless interesting, the report does not discuss the sophistication or complexity of said OT attacks. For more context on OT-impacting attacks, members may wish to check out The Hacker News for a recent post from Orange Cyberdefense on Making Sense of Operational Technology Attacks: The Past, Present, and Future

As a side note, the “76%” doesn’t seem to correspond to what we see being broadly reported. However, while the sample size in the Palo Alto report is only approximately 2000 respondents from across 16 countries in the Americas, Europe and the APAC region, it does seem to represent a willingness of organizations to respond to surveys (including WaterISAC’s Quarterly Incident Survey’s), but perhaps not proactively report – likely due to various reasons.

Finally, while ICS industry cybersecurity experts contend that IT and OT technologies have largely been converged for years, as emphasized in this report, the teams…still, not so much.

For more interesting survey details, including OT cybersecurity investments, access the report at Palo Alto.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Individual Charged in Water System Tampering Incident

May 7, 2026 in Cybersecurity, OT-ICS Security, Security Preparedness

(TLP:CLEAR) AI-Assisted Water Utility Intrusion Underscores Growing OT Exposure Risk

May 7, 2026 in Contamination, OT-ICS Security, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar