WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Telemetry Identifies Commodity Malware Infections Increase at Industrial Organizations
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Telemetry Identifies Commodity Malware Infections Increase at Industrial Organizations

Author: Jennifer Walker

Created: Tuesday, April 21, 2020 - 15:07

Categories: Cybersecurity, General Security and Resilience

Advanced ICS-specific malware is limited to just a few samples such as TRISIS/TRITON, Stuxnet, CRASHOVERRIDE/Industroyer, and BlackEnergy2; however, countless reports and observations demonstrate commodity malware has been increasingly impacting industrial operations. ICS cybersecurity firm Dragos has identified an increase in malware infections at industrial companies globally throughout 2019 and the beginning of 2020. Notably, the LockerGoga, Emotet, and Ryuk infections of 2019 support this trend with their potential to create operational disruption. While ransomware and potentially disruptive malware are not new threats, Dragos suggests these threats will continue to propagate through networks in ways never seen before, including leveraging different spreading mechanisms for propagation. With the ability for general-purpose malware to have an impact on industrial operations, it is important to limit malware propagation and traversal between IT and OT networks. To mitigate the risk of IT-based malware impacting ICS operations, members are encouraged to implement robust network segmentation, strong chokepoints, and traffic monitoring for ICS anomaly detection. For more discussion and resources on those mitigations steps and several others, review WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities. Read the post at Dragos

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar