WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Rockwell Study Reveals Significant Increase in Attacks on Critical Infrastructure OT/ICS Systems
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Rockwell Study Reveals Significant Increase in Attacks on Critical Infrastructure OT/ICS Systems

Author: Alec Davison

Created: Tuesday, September 26, 2023 - 19:17

Categories: OT-ICS Security, Research, Security Preparedness

A recently published study by Rockwell Automation, “Anatomy of 100+ Cybersecurity Incidents in Industrial Operations,” revealed OT/ICS security incidents have increased significant over the past few years and a large majority of the attacks were perpetrated by state-affiliated threat actors, among other notable findings.

Rockwell’s report found OT/ICS cybersecurity incidents in the last three years have already exceeded the total number reported between 1991-2000, with attackers intensely focused on the energy sector (39% of all reported attacks). Of the reported incidents, around 60% were conducted by state-affiliated threat actors, with internal personnel unintentionally facilitating these attacks in roughly 33% of cases. Also, 40 percent of these cyberattacks resulted in unauthorized access or data exposure to the targeted organization. Survey data found that over 80% of the attacks started with an IT system compromise. The report attributed this to “increasing interconnectivity; most OT networks communicate with the outside world via an IT network. [With] attackers increasingly leverage internet-facing systems such as human-machine interfaces (HMIs) and engineering workstation applications.” In addition, SCADA (supervisory control and data acquisition) systems were targeted 53% of the time and PLCs (programmable logic controllers) were targeted in 22% of the cases.

Phishing continued to be the most popular attack technique (34%), underscoring the need for basic cyber hygiene and phishing awareness training. Also, attackers utilized lateral tool transfers, exploitation of remote services, and standard application layer protocols to manipulate an operator’s view, and in many instances, to take control over specific OT processes. The report provides recommended mitigations to help secure your OT/ICS environment, including segmenting IT and OT assets, securing remote access, implementing multifactor authentication; and monitoring for threats 24/7. Read more at Industrial Cyber.

Related Resources

(TLP:CLEAR) CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – April 23, 2026

Apr 23, 2026 in Cybersecurity, Federal & State Resources, OT-ICS Security
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 23, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Securin Cyber Threat Intelligence Report: Water & Wastewater Systems

Apr 16, 2026 in Cybersecurity, OT-ICS Security, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar