Business Wire

CA-FORESCOUT

24.1.2024 07:02:27 CET | Business Wire | Press release

Share
At 13 Attacks Per Second, Critical Infrastructure is Under Siege

In the last year, the world’s critical infrastructure – the medical, power, communications, waste, manufacturing, and transportation equipment that connects people and machines – has been under near-constant attack. Forescout Research – Vedere Labs recorded more than 420 million attacks between January and December 2023. That is 13 attacks per second, a 30% increase from 2022.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240123671589/en/

To view this piece of content from mms.businesswire.com, please give your consent at the top of this page.

2023 Global Threat Roundup Highlights from Forescout Research (Graphic: Business Wire)

Forescout, a global cybersecurity leader, unveiled the global findings of recorded attacks in its Adversary Engagement Environment (AEE) in the new report, “2023 Global Threat Roundup.” The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure.

Despite the formidable challenges posed by the ongoing surge in cyber-activity, there is an optimistic path forward. Elisa Costante, VP of Research at Forescout Research – Vedere Labs, highlights the potential for positive change, stating, "While it's true that current efforts have fallen short in fully harnessing crucial technology to fortify critical assets and assess risks, there is an opportunity for improvement."

Read the blog: 2023 Global Threat Roundup: Trends in Cyberattacks, Exploits and Malware

Here are the top five insights from Forescout Research:

  1. Not Yet Dormant: Log4j Dampens Software Library Exploits
    Exploits against software libraries are witnessing a decline due to the waning popularity of Log4j exploits. This lull has given rise to a surge in exploits targeting network infrastructure and Internet of Things (IoT) devices.

    Among the IoT landscape, the spotlight falls on IP cameras, building automation systems, and network-attached storage, emerging as the most sought-after targets for malicious actors.

    Only 35% of exploited vulnerabilities made an appearance in the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) list. This divergence emphasizes the need for a proactive and comprehensive approach to cybersecurity, transcending reliance on known vulnerability databases.

  2. OT Protocols Bear the Brunt
    Operational Technology (OT) finds itself under relentless assault, with five key protocols bearing the brunt of persistent attacks. The primary targets include protocols used in industrial automation and power sectors, such as Modbus, subject to a staggering one-third of all attacks, closely followed by Ethernet/IP, Step7, and DNP3, each accounting for approximately 18% of the onslaught. IEC10X rounds out this list with 10% of attacks, leaving the remaining 2% distributed among various protocols, with BACnet emerging as the majority.

    Building automation protocols, such as BACnet, experience less frequent scans. However, the relative scarcity of scans belies an alarming trend—targeted exploits against vulnerabilities in building automation devices are more prevalent.

  3. Post-Exploitation Tactics Shift
    Persistence tactics mark a 50% surge from 3% in 2022, along with discovery (roughly 25%) and execution (the other roughly 25%). While most observed commands used by threat actors remain targeted at generic Linux systems, a notable trend involves specific commands executed for network operating systems found on widely used routers.

  4. Malware Families Remain Strong
    Malware families persist as formidable threats. The Agent Tesla Remote Access Trojan (RAT) commands a significant 16% share of observed malicious activity. Following closely are variants of the Mirai botnet, comprising 15%, and the Redline info stealer, holding its ground at 10%.

    Among command-and-control servers, Cobalt Strike emerges as the undisputed leader, commanding a substantial 46% share, trailed by Metasploit at 16%, and the emerging Sliver C2 at 13%. Most of these servers are in the United States, constituting 40% of the global landscape, with China and Russia following at 10% and 8%, respectively.

  5. Threats Unleashed Across 163 Countries
    Threat actors have cast a digital net far and wide, impacting 163 countries. The United States stands as the primary target, bearing the brunt with 168 malicious actors setting their sights on the nation. Other countries include the United Kingdom (88), Germany (77), India (72), and Japan (66).

    The usual suspects boast high concentrations of threat actors: China (155), Russia (88), and Iran (45), collectively representing nearly half of all identified threat groups. The crosshairs of these malicious entities are predominantly fixed on three key sectors: Government, Financial Services, and Media and Entertainment. As the primary pillars of societal infrastructure, these industries are at the forefront of cyber warfare, emphasizing the need for heightened security measures and collaborative efforts.

Costante continues, “The key lies in achieving comprehensive visibility, ensuring real-time contextual awareness of every device, whether managed or unmanaged. By doing so, large enterprises can transition from a reactive defense posture to a more proactive approach, steering clear of the futile game of security whack-a-mole. This shift towards enhanced visibility and proactive defense strategies signals a brighter outlook for critical infrastructure.”

For more information, download the full report, “2023 Global Threat Roundup,” now at https://www.forescout.com/resources/research-report_2023-threat-roundup.

How Forescout Research Works

Forescout Research employs its Adversary Engagement Environment (AEE) to conduct analysis, leveraging a blend of real and simulated connected devices. This dynamic environment functions as a robust tool, enabling the pinpointing of incidents and the identification of intricate threat actor patterns at a granular level. The overarching objective is to elevate responses to complex critical infrastructure attacks by leveraging the detailed insights and understanding derived from this specialized deception environment. The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure. Forescout products directly leverage this research, which is also shared openly with vendors, agencies, and other researchers.

About Forescout

Forescout Technologies, Inc., a global cybersecurity leader, continuously identifies, protects and helps ensure the compliance of all managed and unmanaged connected cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout® Platform delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats.

To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.

View source version on businesswire.com: https://www.businesswire.com/news/home/20240123671589/en/

About Business Wire

Business Wire
Business Wire
101 California Street, 20th Floor
CA 94111 San Francisco

http://businesswire.com
DK

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

The Bolivarian Republic of Venezuela Announces the Initiation of a Comprehensive Public Debt Restructuring Process13.5.2026 22:08:00 CEST | Press release

The Bolivarian Republic of Venezuela announces today its decision to initiate a comprehensive restructuring of its external public debt obligations. CONTEXT & RATIONALE Over the past decade, Venezuela's economy has been severely impacted by external shocks – from the end of the commodity super-cycle to foreign sanctions and COVID-19 – resulting in a sharp economic contraction, a protracted default since 2017, and a ballooning of public sector liabilities. The country nonetheless possesses a strong economic potential, including unique hydrocarbon and mineral endowments. A recovery is underway, and Venezuela is committed to accelerating it through a comprehensive reform agenda in support of growth, fiscal sustainability, monetary stabilization, and enhanced governance. Restoring public debt sustainability is central to this agenda: the current debt overhang constrains external financing, limits public investment capacity, and prevents full re-engagement with the international financial s

Boomi Announces Intent to Acquire Lunar.dev to Deliver Governed Agent Connectivity Across the Enterprise13.5.2026 21:00:00 CEST | Press release

Proposed acquisition extends Boomi’s AI gateway capabilities, enabling enterprises to govern massive volumes of traffic for production-ready AI Boomi, the data activation company for AI, today announced it has signed a letter of intent to acquire Lunar.dev, an innovator in AI and MCP gateway. The proposed acquisition is expected to enrich the Boomi Enterprise Platform and Boomi Connect with advanced capabilities to govern and scale AI usage across enterprise systems. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260513850557/en/ Boomi Announces Intent to Acquire Lunar.dev to Deliver Governed Agent Connectivity Across the Enterprise As organizations move from AI experimentation to production, controlling how agents and AI applications interact with LLMs at scale has become critical. Lunar.dev addresses this need with an AI gateway that delivers granular, policy-driven control over AI interactions, with the visibility, securi

BeOne Medicines’ BEQALZI™ (sonrotoclax) Approved by U.S. FDA as First and Only BCL2 Inhibitor for R/R Mantle Cell Lymphoma13.5.2026 19:27:00 CEST | Press release

BEQALZI is a foundational BCL2 inhibitor designed for greater potency and selectivity, with potential to improve efficacy, tolerability, and convenience versus others in the classApproval of BEQALZI marks the first new BCL2 inhibitor approved in a decade in the U.S. and the only BCL2 inhibitor approved in MCL, aiming to set a new standard of innovation BeOne Medicines Ltd. (“BeOne”) (Nasdaq: ONC; HKEX: 06160; SSE: 688235), a global oncology company, today announced that the U.S. Food and Drug Administration (FDA) has granted accelerated approval to BEQALZI™(bee-KAHL-zee; sonrotoclax), a foundational, next-generation BCL2 inhibitor, for the treatment of adult patients with relapsed or refractory (R/R) mantle cell lymphoma (MCL), after at least two lines of systemic therapy, including a Bruton’s tyrosine kinase (BTK) inhibitor. BEQALZI was designed to enhance BCL2 inhibition—with greater potency, selectivity, and a pharmacologic profile with potential to improve efficacy, tolerability, a

Boomi Unveils Innovations That Power the Agentic Enterprise13.5.2026 16:30:00 CEST | Press release

Orchestration capabilities simplify workflows, while advanced agent connectivity and an enhanced context layer activate data and scale AI Boomi, the data activation company for AI, today announced a major expansion of the Boomi Enterprise Platform at Boomi World 2026, introducing new capabilities across orchestrated agentic workflows, agentic engineering, governed agent connectivity, grounded agent context, and localized agent infrastructure. Together, these innovations are designed to power the agentic enterprise — where agents and humans work together to drive action and operationalize AI at scale. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260513996223/en/ Boomi Unveils Innovations That Power the Agentic Enterprise The enterprise has reached a defining moment as AI becomes the primary interface for work and MCP emerges as the new standard. While the shift toward a headless, agentic enterprise is inevitable, this visio

Boomi and Red Hat Collaborate on Production-Ready Agentic AI13.5.2026 16:30:00 CEST | Press release

Companies team to deliver a unified, enterprise-scale agentic stack to help organizations with managing data sovereignty and optimizing AI costs Boomi, the data activation company for AI, and Red Hat, the world’s leading provider of open source solutions, today announced a strategic collaboration to deliver a single, integrated stack for deploying agentic AI at scale. For many organizations, building production AI today means assembling numerous disconnected vendor choices spanning agent builders, orchestration tools, governance platforms, model providers, integration middleware, and security infrastructure, which can lead to data leaks and unpredictable costs. Boomi and Red Hat are working together to simplify AI innovation for customers by bringing together Boomi’s Agentstudio with the enterprise-grade power of Red Hat AI. This makes it easier for organizations to build agents that solve real business problems while supporting corporate standards for sovereignty, infrastructure flexi

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye