Business Wire

CA-FORESCOUT

Share
At 13 Attacks Per Second, Critical Infrastructure is Under Siege

In the last year, the world’s critical infrastructure – the medical, power, communications, waste, manufacturing, and transportation equipment that connects people and machines – has been under near-constant attack. Forescout Research – Vedere Labs recorded more than 420 million attacks between January and December 2023. That is 13 attacks per second, a 30% increase from 2022.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240123671589/en/

To view this piece of content from mms.businesswire.com, please give your consent at the top of this page.

2023 Global Threat Roundup Highlights from Forescout Research (Graphic: Business Wire)

Forescout, a global cybersecurity leader, unveiled the global findings of recorded attacks in its Adversary Engagement Environment (AEE) in the new report, “2023 Global Threat Roundup.” The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure.

Despite the formidable challenges posed by the ongoing surge in cyber-activity, there is an optimistic path forward. Elisa Costante, VP of Research at Forescout Research – Vedere Labs, highlights the potential for positive change, stating, "While it's true that current efforts have fallen short in fully harnessing crucial technology to fortify critical assets and assess risks, there is an opportunity for improvement."

Read the blog: 2023 Global Threat Roundup: Trends in Cyberattacks, Exploits and Malware

Here are the top five insights from Forescout Research:

  1. Not Yet Dormant: Log4j Dampens Software Library Exploits
    Exploits against software libraries are witnessing a decline due to the waning popularity of Log4j exploits. This lull has given rise to a surge in exploits targeting network infrastructure and Internet of Things (IoT) devices.

    Among the IoT landscape, the spotlight falls on IP cameras, building automation systems, and network-attached storage, emerging as the most sought-after targets for malicious actors.

    Only 35% of exploited vulnerabilities made an appearance in the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) list. This divergence emphasizes the need for a proactive and comprehensive approach to cybersecurity, transcending reliance on known vulnerability databases.

  2. OT Protocols Bear the Brunt
    Operational Technology (OT) finds itself under relentless assault, with five key protocols bearing the brunt of persistent attacks. The primary targets include protocols used in industrial automation and power sectors, such as Modbus, subject to a staggering one-third of all attacks, closely followed by Ethernet/IP, Step7, and DNP3, each accounting for approximately 18% of the onslaught. IEC10X rounds out this list with 10% of attacks, leaving the remaining 2% distributed among various protocols, with BACnet emerging as the majority.

    Building automation protocols, such as BACnet, experience less frequent scans. However, the relative scarcity of scans belies an alarming trend—targeted exploits against vulnerabilities in building automation devices are more prevalent.

  3. Post-Exploitation Tactics Shift
    Persistence tactics mark a 50% surge from 3% in 2022, along with discovery (roughly 25%) and execution (the other roughly 25%). While most observed commands used by threat actors remain targeted at generic Linux systems, a notable trend involves specific commands executed for network operating systems found on widely used routers.

  4. Malware Families Remain Strong
    Malware families persist as formidable threats. The Agent Tesla Remote Access Trojan (RAT) commands a significant 16% share of observed malicious activity. Following closely are variants of the Mirai botnet, comprising 15%, and the Redline info stealer, holding its ground at 10%.

    Among command-and-control servers, Cobalt Strike emerges as the undisputed leader, commanding a substantial 46% share, trailed by Metasploit at 16%, and the emerging Sliver C2 at 13%. Most of these servers are in the United States, constituting 40% of the global landscape, with China and Russia following at 10% and 8%, respectively.

  5. Threats Unleashed Across 163 Countries
    Threat actors have cast a digital net far and wide, impacting 163 countries. The United States stands as the primary target, bearing the brunt with 168 malicious actors setting their sights on the nation. Other countries include the United Kingdom (88), Germany (77), India (72), and Japan (66).

    The usual suspects boast high concentrations of threat actors: China (155), Russia (88), and Iran (45), collectively representing nearly half of all identified threat groups. The crosshairs of these malicious entities are predominantly fixed on three key sectors: Government, Financial Services, and Media and Entertainment. As the primary pillars of societal infrastructure, these industries are at the forefront of cyber warfare, emphasizing the need for heightened security measures and collaborative efforts.

Costante continues, “The key lies in achieving comprehensive visibility, ensuring real-time contextual awareness of every device, whether managed or unmanaged. By doing so, large enterprises can transition from a reactive defense posture to a more proactive approach, steering clear of the futile game of security whack-a-mole. This shift towards enhanced visibility and proactive defense strategies signals a brighter outlook for critical infrastructure.”

For more information, download the full report, “2023 Global Threat Roundup,” now at https://www.forescout.com/resources/research-report_2023-threat-roundup.

How Forescout Research Works

Forescout Research employs its Adversary Engagement Environment (AEE) to conduct analysis, leveraging a blend of real and simulated connected devices. This dynamic environment functions as a robust tool, enabling the pinpointing of incidents and the identification of intricate threat actor patterns at a granular level. The overarching objective is to elevate responses to complex critical infrastructure attacks by leveraging the detailed insights and understanding derived from this specialized deception environment. The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure. Forescout products directly leverage this research, which is also shared openly with vendors, agencies, and other researchers.

About Forescout

Forescout Technologies, Inc., a global cybersecurity leader, continuously identifies, protects and helps ensure the compliance of all managed and unmanaged connected cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout® Platform delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats.

To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.

View source version on businesswire.com: https://www.businesswire.com/news/home/20240123671589/en/

About Business Wire

Business Wire
Business Wire
101 California Street, 20th Floor
CA 94111 San Francisco

http://businesswire.com
DK

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

Andersen Consulting udvider sit udbud af humankapital med tilføjelsen af Jakarta Consulting Group16.1.2026 21:09:00 CET | Pressemeddelelse

Andersen Consulting styrker sine kompetencer gennem en samarbejdsaftale med Jakarta Consulting Group (JCG), der er et rådgivningsfirma, som er kendt for sin ekspertise inden for organisatorisk transformation, humankapitalstrategi og ledelsesudvikling. Med hovedsæde i Indonesien har JCG rådgivet virksomheder inden for brancher som ejendom, minedrift og produktion gennem strategisk og kulturel transformation. Med kerneydelser, der omfatter virksomheds- og administrationsrådgivning, hr-rådgivning, vurdering samt virksomheds- og ledelsestræning, er virksomheden kendt for sin evne til at transformere virksomheder og ledere med agilitet, kulturel intelligens og handlingsorienterede løsninger. "Vi har altid ment, at bæredygtig transformation begynder med mennesker – når ledere udvikler sig, følger organisationer med," siger Patricia Susanto, CEO for Jakarta Consulting Group. "Ved at kombinere Andersen Consultings globale perspektiv med vores regionale indsigt kan vi tilbyde kunderne mere helh

ClickHouse Raises $400M Series D Led by Dragoneer to Accelerate Expansion Across Analytics and AI Infrastructure16.1.2026 15:30:00 CET | Press release

Company acquires Langfuse to enter LLM observability and introduces a native Postgres service to unify transactional and analytical workloads ClickHouse, a leader in real-time analytics, data warehousing, observability, and AI/ML, announced today the close of its Series D financing, raising $400 million. The round was led by Dragoneer Investment Group, with participation from Bessemer Venture Partners, GIC, Index Ventures, Khosla Ventures, Lightspeed Venture Partners, accounts advised by T. Rowe Price Associates, Inc., and WCM Investment Management. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260116008883/en/ ClickHouse Co-Founders (left to right): Yury Izrailevsky, Aaron Katz, Alexey Milovidov The financing follows a period of sustained, accelerating growth for ClickHouse. The company now serves more than 3,000 customers on its fully managed service, ClickHouse Cloud, with ARR growing more than 250 percent year over year

Qualcomm Announces Quarterly Cash Dividend16.1.2026 15:00:00 CET | Press release

Qualcomm Incorporated (NASDAQ: QCOM) today announced a quarterly cash dividend of $0.89 per common share, payable on March 26, 2026, to stockholders of record at the close of business on March 5, 2026. About Qualcomm Qualcomm relentlessly innovates to deliver intelligent computing everywhere, helping the world tackle some of its most important challenges. Building on our 40 years of technology leadership in creating era-defining breakthroughs, we deliver a broad portfolio of solutions built with our leading-edge AI, high-performance, low-power computing, and unrivaled connectivity. Our Snapdragon® platforms power extraordinary consumer experiences, and our Qualcomm Dragonwing™ products empower businesses and industries to scale to new heights. Together with our ecosystem partners, we enable next-generation digital transformation to enrich lives, improve businesses, and advance societies. At Qualcomm, we are engineering human progress. Qualcomm Incorporated includes our licensing busine

Nominations open for The MIDORI Prize for Biodiversity 2026 by AEON Environmental Foundation and the Secretariat of the Convention on Biological Diversity16.1.2026 09:00:00 CET | Press release

The MIDORI Prize recognizes outstanding individual contributions to the conservation and sustainable use of biodiversityThe unique prize contributes to raising public awareness of the essential role biodiversity plays for human well-being and in addressing global challenges such as climate changeThe Award Ceremony and Award Winners Forum will be held on 27 August 2026 in Tokyo, Japan The call for nominations for The MIDORI Prize for Biodiversity 2026 is open from 2 February to 31 March 2026. Nominations are invited from members of the public through the AEON Environmental Foundation website at https://www.aeonkankyozaidan.or.jp/en/prize/. The Award Ceremony and Award Winners Forum of the 2026 edition of the Prize will be held on 27 August in Tokyo, Japan. These events will contribute to the global mobilization around COP 17 of the Convention on Biological Diversity (CBD), which will take place in Yerevan (Armenia) under the theme of “Taking action for Nature”. Co-organized by the AEON

Tigo Energy and Weco Certify MLPE-Inverter Compatibility to Simplify PV System Design16.1.2026 06:00:00 CET | Press release

Tigo MLPE technology and hybrid inverters of Italian manufacturer Weco are now certified to work together to enhance design flexibility, system performance, and seamless integration. Tigo Energy, Inc. (NASDAQ: TYGO) (“Tigo” or “Company”), a leading provider of intelligent solar and energy software solutions, today announced the Company has signed a certificate of compatibility with Weco S.r.l., documenting the compatibility between Tigo Flex MLPE products and hybrid solar inverters from Weco. The certification covers certain single-phase and three-phase Weco products and members of the Tigo TS4-A and TS4-X product families, when properly designed and installed. Together, these products are designed to deliver high-quality, enhanced value through a system that generates and manages solar energy more efficiently and delivers the features residential energy customers demand. “The compatibility between our inverter solutions and Tigo optimizers represents a significant step forward for the

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye