• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Almost Half of Industrial Sector Computers Affected By Malware in 2022

You are here: Home / General Cyber Security News / Almost Half of Industrial Sector Computers Affected By Malware in 2022
March 6, 2023

Two out of each individual 5 (40.6%) operational technology (OT) desktops utilised in industrial options have been affected by malware in 2022.

The details arrives from a report posted previously today by security scientists at Kaspersky. The figures signify a 6% enhance in contrast with the previous 50 percent of the year and virtually 1.5 moments additional than in the next fifty percent of 2021.

“Overall, 2022 stands out for its irregular absence of any seasonal improvements. Our workforce observed a steadily large fee of attacks on industrial sectors – devoid of a common drop in attacks through summer season vacations or wintertime holidays interval,” spelled out Kirill Kruglov, senior researcher at Kaspersky ICS CERT, commenting on the report’s results.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“However, the expanding attack fees in industrial sectors that are remaining done working with social engineering look alarming.”

In fact, the most current Kaspersky report suggests the leading two malware classes seen by the group (malicious scripts and phishing internet pages) showed advancement in the next fifty percent of 2022. Threat actors reportedly applied these applications to accumulate details, monitor activity and redirect browser requests to malicious web assets.

Kaspersky also observed malicious scripts currently being used to allow the download of several destructive packages and for loading malware, this kind of as adware or applications for covert cryptocurrency mining in users’ browsers.

From a geographical standpoint, Northern Europe was the only area that confirmed a advancement in malware unfold by way of email customers. Africa, the Middle East, Asia and Latin America topped regional rankings for most OT computer systems compromised making use of removable products.

Additional, attacks targeting the automotive manufacturing and power sectors grew considerably, according to the report, accounting for 36.9% and 34.5% of all industries.

“We strongly endorse prospects in these sectors to revise their existing strategy to security and verify whether or not all security programs are up-to-day and their staff is effectively-experienced,” Kruglov concluded.

The Kaspersky data comes about two months following a SecurityScorecard report suggested 48% of critical manufacturing corporations in the US are susceptible to a information breach.


Some sections of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News EPA Calls For Cybersecurity Improvements in Public Water Systems
Next Post: LastPass Hack: Engineer’s Failure to Update Plex Software Led to Massive Data Breach lastpass hack: engineer's failure to update plex software led to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.