Dragos

Impact of FrostyGoop ICS Malware on Connected OT Systems

FrostyGoop is the ninth industrial control systems (ICS) specific malware. It is the first ICS-specific malware that uses Modbus TCP communications to achieve an impact on Operational Technology (OT). PIPEDREAM, an ICS malware discovered in 2022, uses Modbus communications in one of its components for enumeration. Dragos discovered FrostyGoop in April 2024. It can interact […]

Impact of FrostyGoop ICS Malware on Connected OT Systems Read More »

Australian 2023 OT Cybersecurity Year in Review

Are you prepared to defend your operational technology (OT) against the next wave of cyber threats? Several forces drove a surge of activity from adversaries targeting operational technology (OT) infrastructure in 2023, marking a pivotal shift in the OT cyber threat landscape for Australian organisations and around the globe. Motivated by mounting geopolitical tensions, sophisticated

Australian 2023 OT Cybersecurity Year in Review Read More »

OT Cybersecurity: The 2023 Year in Review

In 2023, a surge in global tension resulted in an increase in cyber threat activity and disruptions in critical infrastructure worldwide. Escalating conflicts, including those between Ukraine and Russia, Israel and Hamas, and countries in the South China Sea, emboldened adversaries and hacktivists to develop new capabilities and reuse old techniques. Simultaneously, ransomware attacks affected

OT Cybersecurity: The 2023 Year in Review Read More »

ICS/OT Cybersecurity Year in Review 2022

2022 Key Findings Overview 2022 saw a breakthrough escalation in capabilities by a new modular industrial control systems (ICS) malware, PIPEDREAM, developed by the threat group, CHERNOVITE. CHERNOVITE’S PIPEDREAM toolkit has the capabilities to impact tens of thousands industrial devices that control critical infrastructure – devices that manage the electrical grid, oil and gas pipelines,

ICS/OT Cybersecurity Year in Review 2022 Read More »