Threat Landscape and Security Posture
This chapter begins with the threat landscape in OT environments, examining publicly observed attacks throughout 2025 and comparing them with cybersecurity incidents reported by surveyed organizations to illustrate the overall level of OT exposure to cyber threats and the key areas of defense.
Active OT Threats
Compared with 2024, when threat actors developed numerous ICS malware variants, no new ICS malware was observed in 2025. However, the number of OT cybersecurity incidents increased significantly. Reflecting this shift, the European Union's cybersecurity agency, ENISA, in its Threat Landscape 2025, introduced OT threats as a new indicator, accounting for 18.2% of the threat landscape. Rather than developing custom malware, threat actors focused on exploiting legitimate access paths--ransomware groups targeted IT-to-OT convergence points and geopolitically motivated actors compromised security appliances and network infrastructure to gain strategic access.
Throughout 2025, ransomware groups and geopolitically motivated actors maintained sustained activity across all critical sectors. Both types of threats leveraged social media platforms to amplify their operations and recruit supporters, with attacks against OT environments serving as highly visible demonstrations of capability.
Representative 2025 OT Incidents
The following incidents illustrate the range and persistence of threats targeting OT environments throughout 2025:
Surveyed Enterprises’ OT Security Posture
In addition to examining major cybersecurity incidents, we turn to the security posture of the enterprises we surveyed and the challenges they faced throughout 2025.
Incident Frequency
60% of respondents reported experiencing cybersecurity incidents in 2025, with half experiencing multiple incidents. We also observed significant variation across industries, ranging from 84% in Food Manufacturing to 37% in Oil and Gas. Differences in OT mission profiles and operational environments likely explain this pattern.
Figure 1.1: OT Cybersecurity Incident Frequency by Industry
Figure 1.2: IT-to-OT Incident Spillover by Industry
IT-to-OT Spillover
IT-origin incidents dominate across all industries, ranging from 87% (Automotive) to 100% (Oil & Gas, Food Manufacturing, Mass Transport). Overall, 96% of incidents were traced to IT systems, with 56% due to direct penetration attacks and 40% to collateral damage. The consistency of IT spillover across sectors underscores the fundamental challenge of IT-OT convergence.
IT Defenses Don’t Work for OT
Ransomware relies on known techniques and can be mitigated with basic measures (backups, patching, endpoint protection), unlike zero-day or custom ICS malware. This makes ransomware arguably easier to defend against. However, while this holds in IT environments, the 'basics' are exactly what OT lacks (patching, agent deployment). Therefore, in OT, even ransomware remains difficult to fend off. Among our respondents, 52% reported being impacted by ransomware in the past year, while 35% experienced APT-related incidents. In addition, 79% indicated that attackers exploited zero-day vulnerabilities.
Detection alone leaves a gap; by the time an alert fires, operational damage may already be underway. Organizations face multiple attack vectors simultaneously: over half experienced ransomware, more than one-third faced APT attacks, and the majority of attacks exploited zero-day vulnerabilities. Addressing this threat diversity requires controls designed for OT constraints, such as solutions that can block known and unknown threats without requiring constant signature updates, protect legacy systems without agents, and operate inline without disrupting production.
OT Security Threat Landscape: 2025 Impact
*Zero-day data based on n=71 organizations that experienced attacks
Figure 1.3: Prevalence of Major OT Threat Types in 2025
Ransomware Persistence
Ransomware remains an active and evolving threat across OT environments. While individual groups rise and fall, as illustrated by LockBit's trajectory in recent years, the ransomware ecosystem continues to adapt, with new variants and tactics emerging as older operations face law enforcement pressure. The rise and fall of LockBit, built on a ransomware-as-a-service model with a large affiliate base, illustrates the cyclical nature of these campaigns.
Ransomware Groups
Each ransomware group typically has a limited window of peak activity before law enforcement pressure, operational exposure, or affiliate migration to newer platforms diminishes its impact. Accordingly, as our research team tracked the activity of various ransomware variants throughout 2025, we observed clear patterns of rise and decline. Among those, Qilin, Akira, and Clop led.
Specifically, our review of Qilin's attack strategies revealed that, beyond exploiting vulnerabilities in perimeter devices, the group has begun abusing trusted Windows driver mechanisms to evade security controls. In OT environments, where legacy systems are widespread and zero-disruption requirements are crucial, these vulnerable drivers require sustained attention.
Figure 1.4: The Ransomware Threat Landscape in 2025
Highlighted Cases
Though this report does not profile every active threat actor in 2025, there are several notable cases we believe warrant highlighting.
Scattered Lapsus$ Hunter (Cyber Criminal)
Scattered Lapsus$ Hunter, which surfaced publicly on Telegram in August 2025, is a composite group comprising Scattered Spider, LAPSUS$, and ShinyHunters. The group focuses on supply chain attacks, social engineering, and credential theft, primarily targeting English-speaking regions. After gaining initial access, it relies on legitimate remote management tools to maintain persistence and evade detection, and may escalate to ransomware. In 2025, the group targeted supply chain platforms such as Salesforce, causing widespread credential exposure that extended beyond the original services. Its heavy use of stolen legitimate credentials highlights the limitations of perimeter-only defenses, as compromised SSO or VPN access enables rapid lateral movement, data theft, and ransomware deployment in modern OT environments.

Significance: This is one of the few intrusion paths that deliberately target supply chain systems. CRM platforms such as Salesforce store vast amounts of critical operational and business-sensitive information. This forces us to reassess our assumptions about attacker intent. It was originally assumed that these environments were the intended targets of cyberattacks. However, these isolated cases compel us to consider that attackers may be using OT environments as stepping stones to reach supplier networks. This possibility further underscores the importance of supply chain cybersecurity. Defenses need to be built with the assumption that perimeters will be compromised, so that a contingency plan can be made to protect critical assets even when credentials or access have been stolen by attackers.

Qilin (Ransomware)
Qilin emerged as the most active ransomware group in 2025, claiming more than 1,000 victims across sectors including healthcare, food and beverage, manufacturing, automotive, and transportation. Active since at least 2022, the group poses a particularly serious challenge to OT security. Qilin commonly exploits vulnerabilities in perimeter devices and uses advanced antivirus evasion techniques to maintain persistence, making it especially difficult to defend against in OT environments where legacy systems are prevalent. Notably, unlike earlier ransomware campaigns that tended to avoid healthcare, Qilin directly targeted hospitals in 2025, leading to large-scale patient data breaches and, in some cases, temporary disruptions to medical services.
Significance: Qilin's primary intrusion vector exploits known vulnerabilities in widely deployed firewall devices to gain entry, followed by ransomware attacks delivered through a ransomware-as-a-service model. Compromising defenders is nothing new in the cybersecurity world. This case clearly reinforces the importance of layered security defenses. When perimeter devices become the point of compromise, endpoint and network-level protections become the critical line of defense against ransomware execution and lateral movement.
Z-Pentest Alliance (Geopolitically Motivated)
Z-Pentest Alliance, a pro-Russian hacking group formed in 2024, has targeted OT environments in critical infrastructure by exploiting vulnerabilities in internet-facing systems and abusing control interfaces to execute physical disruption. In 2025, the group breached OT systems in the oil and gas industry in Texas and Taiwan, resulting in the leak of operational data and screenshots. By publicly showcasing its attacks on social media, the group amplifies the risk of copycats, increasing the likelihood that poorly understood intrusions escalate into operational disruptions, safety hazards, and public service risks.

Significance: This case spotlights a critical reality—much of the infrastructure that sustains national operations is built on OT technologies. When essential public services lack sufficient cybersecurity capabilities, they are at a disadvantage when facing well-resourced threat actors. Therefore, cybersecurity for critical infrastructure must be viewed and addressed at the national security level.

