WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships VANADINITE – New ICS Threat Activity Group Potentially Linked to Use of Ransomware Against Industrial Organizations
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

VANADINITE – New ICS Threat Activity Group Potentially Linked to Use of Ransomware Against Industrial Organizations

Author: Jennifer Walker

Created: Thursday, March 18, 2021 - 17:38

Categories: Cybersecurity

In its recent ICS Cybersecurity 2020 Year in Review Report (shared in the Security & Resilience Update for February 25, 2021) Dragos revealed four new ICS threat activity groups, KAMACITE, VANADINITE, STIBNITE, and TALONITE, and has been featuring them in follow up blog posts, starting with KAMACITE – an activity group linked to BLACKENERGY and the Ukraine power events. Next up is VANADINITE, another threat activity group with a focus on electric utilities, along with oil and gas, manufacturing, telecommunications, and transportation with targets primarily in North America and Europe.

Thus far, VANADINITE has largely gained initial access into victim infrastructure by exploiting external-facing network and security devices using publicly available exploits. While most of VANADINITE’s operations has been limited to initial access and conducting information-gathering, Dragos has observed activity regarding ColdLock ransomware that they suspect may be attributable to VANADINITE. Dragos assesses that VANADINITE may continue to use ransomware in future operations targeting industrial entities. Additionally, Dragos assesses with high confidence that VANADINITE will continue to leverage exploiting recently disclosed vulnerabilities for initial access because of the success obtained using this method. Most importantly, asset owners and operators should treat vulnerabilities in external-facing network appliances as a serious issue, as multiple ICS-targeting adversaries successfully use this technique. For more details, including how to detect and mitigate VANADINITE network exploitation, visit Dragos.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar