Executive Summary
In Q2 2025, industrial automation systems worldwide experienced significant and persistent threats, with 20.5% of ICS (Industrial Control Systems) computers encountering malicious objects, despite a slight quarterly decrease. Attackers leveraged a multi-stage campaign, beginning with phishing emails and malicious documents to gain access, and subsequently deploying next-stage malware such as spyware, ransomware, and cryptominers. Regions like Africa and sectors such as biometrics were among the most targeted, while common initial infection sources included malicious internet resources, infected emails, and removable media devices. Multiple sophisticated malware families (over 10,000 variants) exploited ICS security gaps to enable lateral movement, persistent access, and data exfiltration, impacting operational resilience and increasing risk of service disruption for critical industries.
This incident underscores the continued evolution of ICS-targeting malware and the increasing sophistication of attack vectors in the operational technology sector. The upward trend in email-based infiltration and malicious cloud links, coupled with persistent use of multi-stage payloads, highlights the urgent need for robust, layered security, Zero Trust policies, and compliance alignment to protect critical infrastructure environments against both commodity and targeted threats.
Why This Matters Now
Industrial organizations face ongoing ransomware, spyware, and phishing threats, with ICS networks remaining exposed via unprotected east-west traffic and weak email controls. As attackers shift to multi-vector, multi-stage approaches and leverage widely accessible malware to exploit operational gaps, urgent visibility, segmentation, and compliance efforts are critical to prevent downtime and regulatory penalties.
Attack Path Analysis
The attack began when adversaries compromised an ICS endpoint via malicious email attachments or denylisted internet resources, gaining an initial foothold. Leveraging malware and scripts, they escalated privileges on compromised systems, possibly exploiting flaws in software or abusing poorly segmented network access. With increased access, attackers moved laterally through east-west network paths within OT environments to access critical assets and supervisory components. They established command and control channels, often leveraging encrypted or covert outbound communications to remote servers. The adversary then exfiltrated sensitive operational data, using compromised accounts or covert channels to bypass perimeter controls. The final impact included potential deployment of ransomware, disruptive actions, or destructive payloads that could halt industrial operations.
Kill Chain Progression
Initial Compromise
Description
Attackers delivered malicious documents or links via phishing emails and targeted ICS endpoints by exploiting internet-facing assets or leveraged malicious scripts from denylisted internet sources to execute initial code.
Related CVEs
CVE-2025-30280
CVSS 6.9An observable response discrepancy vulnerability in Siemens Mendix Runtime allows unauthenticated remote attackers to enumerate valid entities and attribute names.
Affected Products:
Siemens Mendix Runtime – V8, V9, V10
Exploit Status:
no public exploitCVE-2024-54092
CVSS 8.8A weak authentication vulnerability in Siemens Industrial Edge Device Kit allows unauthorized access to sensitive functions.
Affected Products:
Siemens Industrial Edge Device Kit – All versions
Exploit Status:
no public exploitCVE-2024-8956
CVSS 9.1An authentication bypass vulnerability in PTZOptics PT30X-SDI/NDI cameras allows remote attackers to access cameras without credentials, exposing sensitive information.
Affected Products:
PTZOptics PT30X-SDI/NDI cameras – Firmware versions prior to 6.3.40
Exploit Status:
exploited in the wildCVE-2024-7847
CVSS 8.8Insufficient verification of data authenticity in Rockwell Automation's RSLogix 5 and RSLogix 500 software allows embedding malicious VBA scripts in project files, leading to remote code execution.
Affected Products:
Rockwell Automation RSLogix 5 – All versions
Rockwell Automation RSLogix 500 – All versions
Exploit Status:
no public exploitReferences:
MITRE ATT&CK® Techniques
Spearphishing Attachment
Phishing: Spearphishing Link
User Execution
Command and Scripting Interpreter
Ingress Tool Transfer
Obfuscated Files or Information
Application Layer Protocol
Exploitation of Remote Services
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Malicious Software Detection
Control ID: 5.2.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Measures
Control ID: Art. 9(2)
CISA Zero Trust Maturity Model 2.0 – Device and Workload Visibility and Control
Control ID: Identity Pillar: Device & Workload Security
NIS2 Directive – Technical and Organizational Measures
Control ID: Article 21(2)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Industrial Automation
Highest risk sector with 20.5% of ICS computers blocking malware, facing direct threats to operational technology systems and control infrastructure.
Oil/Energy/Solar/Greentech
Critical infrastructure vulnerability through ICS-targeted attacks, ransomware, and spyware compromising energy generation and distribution systems requiring zero trust segmentation.
Utilities
Essential services disruption risk from industrial control system threats, requiring enhanced east-west traffic security and encrypted communications for grid operations.
Defense/Space
Mission-critical systems exposed to sophisticated industrial automation threats, demanding comprehensive threat detection and anomaly response for national security infrastructure.
Sources
- Threat landscape for industrial automation systems in Q2 2025https://securelist.com/industrial-threat-report-q2-2025/117532/Verified
- CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilitieshttps://www.linkedin.com/pulse/cisa-issues-9-new-ics-advisories-addressing-critical-lqqvcVerified
- CISA Industrial Control Systems (ICS) Advisories Recap for 2025https://socradar.io/cisa-industrial-control-systems-ics-advisories-2025/Verified
- CISA Issues Six Advisories for Industrial Control Systemshttps://firsthackersnews.com/cisa/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, internal workload policy enforcement, east-west inspection, egress controls, and anomaly detection would have curtailed adversary progression by restricting lateral spread, blocking unauthorized outbound communications, and enabling rapid detection of suspicious behavior at each stage.
Control: Threat Detection & Anomaly Response
Mitigation: Malicious activity from initial access vectors would be detected in near-real time.
Control: Zero Trust Segmentation
Mitigation: Privilege escalation beyond minimum-required segments would be blocked.
Control: East-West Traffic Security
Mitigation: Unapproved internal communications and lateral movement are denied.
Control: Cloud Firewall (ACF)
Mitigation: Suspicious outbound C2 traffic is detected and blocked at the perimeter.
Control: Egress Security & Policy Enforcement
Mitigation: Unauthorized data exfiltration attempts are blocked or detected.
Malicious payloads and known ransomware signatures are blocked in real time.
Impact at a Glance
Affected Business Functions
- Manufacturing Operations
- Supply Chain Management
- Quality Control
Estimated downtime: 13 days
Estimated loss: $18,000,000,000
Potential exposure of sensitive operational data, including proprietary manufacturing processes and employee information, due to unauthorized access facilitated by exploited vulnerabilities.
Recommended Actions
Key Takeaways & Next Steps
- • Deploy east-west microsegmentation to tightly constrain lateral movement paths within ICS and OT cloud environments.
- • Enforce strict egress controls and URL/FQDN filtering to detect and block outbound C2 and exfiltration attempts at all network boundaries.
- • Implement continuous anomaly detection and incident response with baselining to surface covert initial compromise and privilege escalation activities.
- • Enable inline network IPS and real-time threat intelligence feeds to rapidly block known ransomware and exploit signatures before impact.
- • Apply workload identity-based access controls and least-privilege policies to prevent privilege escalation and contain any single compromise.



