SECURITY REPORT

OT/IoT Cybersecurity Trends and Insights

2024 2H Review | February 2025
Read the full report

Twice a year the Nozomi Networks Labs teams assesses the OT/IoT threat landscape, leveraging a network of more than 50,000 global honeypots, wireless monitoring sensors, inbound telemetry, partnerships, threat intelligence and other resources. Here are highlights from our latest report, covering the second half of 2024.

Read the full report for deeper insights into:

Regional and industry risk exposure
Threats to industrial wireless networks
OT/ICS vulnerability trends
Persistent IoT botnet threats 
Recommendations for defense in depth

Important! If you’re a Nozomi Networks customer, you are covered for the vulnerabilities and threats in this report. Asset intelligence and threat intelligence about them is baked into our platform by the Labs team.

Unprotected Wireless Networks Are Wide Open to Deauthentication Attacks

Industries increasingly rely on wireless technologies for critical operations yet lack of visibility into what’s communicating over the air leaves asset owners vulnerable to threats that exploit unmonitored wireless networks.

Newly Discovered Vulnerabilities

Among the top ICS vulnerabilities during this period, four were marked as Known Exploited Vulnerabilities (KEVs) and 20 had an Exploit Prediction Scoring System (EPSS) score indicating a >1% probability of being exploited in the wild — a threshold hold considered high.

241
New advisories reported by CISA
619
ICS-CERT vulnerabilities disclosed
70
Total vendors affected by disclosed vulnerabilities

Top CWEs

Top 5 CWEs Associated with CVEs

Familiar weaknesses associated with the top CVEs reinforce the need to integrate the best available OT/ICS-specific threat intelligence into your cybersecurity platform to ensure you can automatically detect known issues.

Most Targeted Sectors

The top two industries affected by new ICS CVEs — Critical Manufacturing and Energy — are consistent frontrunners in headlines and government warnings regarding attacks. The appearance of the Communications sector in 3rd place may be tied to Salt Typhoon.

Top 5 Sectors Affected by Disclosed Vulnerabilities

Data Manipulation Is the Most Common Global Attack Technique

Top 10 Most Common MITRE ATT&CKTM Techniques Associated with Raised Alerts

Based on alerts gathered from anonymized telemetry, Data Manipulation was by far the most common technique detected in customer environments — 3x more often than the next most-detected threats.

It was also the dominant attack method detected in three top sectors: Manufacturing; Transportation; and Energy, Utilities and Waste environments.

The IoT Botnet Epidemic

Brute-forcing default SSH and Telnet credentials that grant high privileges is still the top technique cybercriminals use to gain access to IoT devices, a stark reminder to immediately change default credentials and enforce strong credential management

Once inside, attackers primarily use shell commands to explore the environment or achieve persistence. We also observed commands to make the .ssh directory easy to edit, collect basic information about the compromised system, and replace public SSH keys with a new key only they can use to connect.

Attack Surface Locations
Unique Daily Attack IPs

Recommendations for Defense in Depth

Here are specific actions defenders can take to remove OT/IoT blind spots, maximize limited resources, increase operational resilience and reduce business risk.

Prioritize anomaly detection and response to catch new threats that signature-based methods cannot.
Enhance vulnerability management with key metrics that factor asset criticality and exposure into risk scores.
Adopt regional and industry-specific threat intelligence to understand the unique risks you face.
Fortify defenses against botnet attacks with traffic analysis and anomaly detection tools, endpoint security and network segmentation.
Strengthen wireless network security with regular audits and continuous monitoring to identify vulnerabilities and mitigate common threats.

Download the Complete OT & IoT Security Report