{"id":1817,"date":"2020-08-03T08:00:29","date_gmt":"2020-08-03T08:00:29","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1817"},"modified":"2021-04-12T03:45:45","modified_gmt":"2021-04-12T03:45:45","slug":"industrial-control-systems-are-being-targeted-by-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/","title":{"rendered":"Industrial Control Systems are Being Targeted by Ransomware Attacks"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Industrial Control Systems (ICS) are essential for the functioning of critical infrastructures such as the energy and water grid or the manufacturing sector. These systems often referred to as Operational Technology (OT), are usually legacy systems with known vulnerabilities but no easy way to patch them.<\/p>\n<h2 class=\"navy\">Attacks on ICS are increasing<\/h2>\n<p>Cyber criminals are increasingly leveraging these vulnerabilities and launching attacks. In fact, according to the latest <a href=\"https:\/\/www.ibm.com\/security\/data-breach\/threat-intelligence\" target=\"_blank\" rel=\"noopener noreferrer\">IBM X-Force Threat Intelligence 2020<\/a> report, attacks against OT environments during 2019 increased over 2000% compared to 2018. Most of the observed attacks were centered around using a combination of known vulnerabilities within<a href=\"http:\/\/www.subnet.com\/resources\/dictionary\/SCADA.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"> SCADA<\/a> and <a href=\"https:\/\/us-cert.cisa.gov\/ics\" target=\"_blank\" rel=\"noopener noreferrer\">ICS<\/a> hardware components, as well as password-spraying attacks using brute force login tactics against ICS targets.<\/p>\n<p><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/operational-technology-ot\" target=\"_blank\" rel=\"noopener noreferrer\">OT systems<\/a> which often use legacy software and hardware lead to production systems that can no longer be patched and are riddled with older vulnerabilities. These unpatched OT systems are becoming easy prey for cyber criminals, who after gaining a foothold, perform lateral movement using simple exploitation techniques.<\/p>\n<p>The attackers target these OT systems with the purpose of disrupting their availability and reliability and cause ripple effects in the national and global economy. That is the reason why the <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">Verizon DBIR 2020<\/a> report indicates that these industries are targeted by financially motivated external actors, performing espionage.<\/p>\n<h2 class=\"navy\">Ransomware as a threat vector<\/h2>\n<p>Exploiting vulnerabilities is not the only threat vector. Lately, attackers seem to employ ransomware as a method to harm OT systems. The convergence of IT and OT infrastructure allows IT breaches to target OT devices controlling physical assets, which can greatly increase the cost to recover. The IBM X-Force report mentions an example where a global manufacturing company was infected by ransomware starting on an IT system, which then moved laterally into OT infrastructure and brought plant operations to a halt. The attack impacted not only the company\u2019s own operations but also caused a ripple effect in global markets.<\/p>\n<h2 class=\"navy\">Ekans ransomware<\/h2>\n<p>It appears that ransomware has become one of the key methods in which attackers are attempting to exploit infrastructure. According to a <a href=\"https:\/\/dragos.com\/blog\/industry-news\/ekans-ransomware-and-ics-operations\/\" target=\"_blank\" rel=\"noopener noreferrer\">threat report<\/a> from security company Dragos, cyber criminals are launching ransomware attacks that are specifically targeting ICS. The report details the characteristics of the ransomware known as Ekans. This ransomware, also known as Snake, first emerged in December 2019 and has been designed for use against Windows systems used in industrial environments.<\/p>\n<p>Although this is not the first instance of ICS-targeting malware, with <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-the-key-lessons-of-the-triton-malware-cyberattack-you-need-to-learn\/\" target=\"_blank\" rel=\"noopener noreferrer\">Triton malware<\/a> being a recent example of a state-sponsored hacking campaign, researchers have concluded that Ekans looks to be the work of a cybercriminal operation getting involved in this space and that it represents &#8220;a unique and specific risk to industrial operations not previously observed in ransomware malware operations&#8221;.<\/p>\n<p>Dragos\u2019 researchers found that Ekans contains commands and processes aimed at stopping a number of industrial control system functionalities during a ransomware attack. This ransomware variant represents &#8220;a deeply concerning evolution in ICS-targeting malware&#8221; because it indicates that cyber criminals are now targeting ICS operation systems purely for financial gain.<\/p>\n<p>According to the Dragos report, Ekans ransomware does not have a self-propagation mechanism. The malware has to be launched following a compromise of the target network. The researchers note that Ekans follows the same trend as in the Ryuk or Megacortex ransomware families, where self-propagation is avoided in favor of performing large-scale compromise of an enterprise network.<\/p>\n<h2 class=\"navy\">Ransomware installed in an experimental honeypot<\/h2>\n<p>Security company Cybereason <a href=\"https:\/\/www.cybereason.com\/blog\/cybereason-honeypot-multistage-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">built a &#8216;honeypot&#8217;<\/a>, which was designed to look like an electricity company with operations across Europe and North America. The network was made to look authentic to attract potential attackers by including IT and OT environments, as well as human interface systems. The infrastructure was built with common security issues found in critical infrastructures including internet-facing remote desktop ports, medium-complexity passwords, and some custom security controls including network segmentation.<\/p>\n<p>The researchers found that it was only three days after the honeypot went live that the attackers discovered it and were finding ways to compromise. Their actions included a ransomware campaign that infiltrated parts of the network, as well as stealing credentials.<\/p>\n<p>&#8220;Very early after launching the honeypot, the ransomware capability was placed on every compromised machine,&#8221; Israel Barak, chief information security officer at Cybereason, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-hackers-took-just-three-days-to-find-this-fake-industrial-network-and-fill-it-with-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">told ZDNet<\/a>.<\/p>\n<p>Hackers put ransomware onto the network by exploiting remote administration tools to gain access to the network and cracking the administrator password to log in and remotely control the desktop.<\/p>\n<h2 class=\"navy\">How to mitigate ransomware attacks<\/h2>\n<p>In their threat report, Dragos suggests a list of actions ICS organizations can take to mitigate ransomware attacks. First and foremost, it is recommended that OT systems are segmented from the rest of the IT network, so even if a standard Windows machine is compromised, attackers cannot move laterally onto systems that control infrastructure.<\/p>\n<p>Having visibility into your assets and monitoring them continually to spot any abnormal behavior is essential to identify and isolate attacks before they reach their final target. Coupled with strict access controls, the ICS organizations can minimize the impact of intrusions and maintain business continuity.<\/p>\n<p>Organizations should also ensure that systems are regularly backed up and backups are stored offline. Focusing on ICS operations, these backups must include the last known good-profile data to ensure a swift recovery and to minimize the impact of the attack.<\/p>\n<p>ITEGRITI helps protect some of the nation\u2019s most critical infrastructure, serving clients in the energy, healthcare, transportation, education, retail and financial sectors.\u00a0 We develop and implement programs that mitigate cyber and compliance risk, supported by internal controls to measure, monitor and report ongoing program effectiveness. Our programs help companies avoid hacks and minimize business impact during a cybersecurity event. To learn more, visit our <a href=\"http:\/\/72.52.228.46\/~itegriti\/\">website<\/a> or <a href=\"http:\/\/72.52.228.46\/~itegriti\/contact\/\">contact our experts<\/a>.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Intelligent or smart public transportation and shipping systems require more and more data to function efficiently and effectively. Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.<\/p>\n","protected":false},"author":10,"featured_media":1820,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179,13],"tags":[1941,633],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrial Control Systems are Being Targeted by Ransomware Attacks - kw022024<\/title>\n<meta name=\"description\" content=\"Cyber criminals are increasingly leveraging vulnerabilities and launching attacks. According to the latest IBM X-Force Threat Intelligence 2020 report, attacks against OT environments during 2019 increased over 2000% compared to 2018.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Control Systems are Being Targeted by Ransomware Attacks\" \/>\n<meta property=\"og:description\" content=\"Cyber criminals are increasingly leveraging vulnerabilities and launching attacks. According to the latest IBM X-Force Threat Intelligence 2020 report, attacks against OT environments during 2019 increased over 2000% compared to 2018.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-03T08:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T03:45:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Industrial Control Systems are Being Targeted by Ransomware Attacks\",\"datePublished\":\"2020-08-03T08:00:29+00:00\",\"dateModified\":\"2021-04-12T03:45:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/\"},\"wordCount\":1199,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg\",\"keywords\":[\"12 Minute Read\",\"Recent\"],\"articleSection\":[\"Compliance\",\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/\",\"name\":\"Industrial Control Systems are Being Targeted by Ransomware Attacks - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg\",\"datePublished\":\"2020-08-03T08:00:29+00:00\",\"dateModified\":\"2021-04-12T03:45:45+00:00\",\"description\":\"Cyber criminals are increasingly leveraging vulnerabilities and launching attacks. According to the latest IBM X-Force Threat Intelligence 2020 report, attacks against OT environments during 2019 increased over 2000% compared to 2018.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Control Systems are Being Targeted by Ransomware Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Industrial Control Systems are Being Targeted by Ransomware Attacks - kw022024","description":"Cyber criminals are increasingly leveraging vulnerabilities and launching attacks. According to the latest IBM X-Force Threat Intelligence 2020 report, attacks against OT environments during 2019 increased over 2000% compared to 2018.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Industrial Control Systems are Being Targeted by Ransomware Attacks","og_description":"Cyber criminals are increasingly leveraging vulnerabilities and launching attacks. According to the latest IBM X-Force Threat Intelligence 2020 report, attacks against OT environments during 2019 increased over 2000% compared to 2018.","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-08-03T08:00:29+00:00","article_modified_time":"2021-04-12T03:45:45+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_description":"Governments and companies alike need to take measures to safeguard the cybersecurity and privacy of these systems.","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Industrial Control Systems are Being Targeted by Ransomware Attacks","datePublished":"2020-08-03T08:00:29+00:00","dateModified":"2021-04-12T03:45:45+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/"},"wordCount":1199,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg","keywords":["12 Minute Read","Recent"],"articleSection":["Compliance","Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/","name":"Industrial Control Systems are Being Targeted by Ransomware Attacks - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg","datePublished":"2020-08-03T08:00:29+00:00","dateModified":"2021-04-12T03:45:45+00:00","description":"Cyber criminals are increasingly leveraging vulnerabilities and launching attacks. According to the latest IBM X-Force Threat Intelligence 2020 report, attacks against OT environments during 2019 increased over 2000% compared to 2018.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/08\/Itegriti_Blog20_hero.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/industrial-control-systems-are-being-targeted-by-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Industrial Control Systems are Being Targeted by Ransomware Attacks"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1817"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1817"}],"version-history":[{"count":7,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1817\/revisions"}],"predecessor-version":[{"id":2038,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1817\/revisions\/2038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1820"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}