CA-FORESCOUT
In the last year, the world’s critical infrastructure – the medical, power, communications, waste, manufacturing, and transportation equipment that connects people and machines – has been under near-constant attack. Forescout Research – Vedere Labs recorded more than 420 million attacks between January and December 2023. That is 13 attacks per second, a 30% increase from 2022.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240123671589/en/
2023 Global Threat Roundup Highlights from Forescout Research (Graphic: Business Wire)
Forescout, a global cybersecurity leader, unveiled the global findings of recorded attacks in its Adversary Engagement Environment (AEE) in the new report, “2023 Global Threat Roundup.” The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure.
Despite the formidable challenges posed by the ongoing surge in cyber-activity, there is an optimistic path forward. Elisa Costante, VP of Research at Forescout Research – Vedere Labs, highlights the potential for positive change, stating, "While it's true that current efforts have fallen short in fully harnessing crucial technology to fortify critical assets and assess risks, there is an opportunity for improvement."
Read the blog: 2023 Global Threat Roundup: Trends in Cyberattacks, Exploits and Malware
Here are the top five insights from Forescout Research:
-
Not Yet Dormant: Log4j Dampens Software Library Exploits
Exploits against software libraries are witnessing a decline due to the waning popularity of Log4j exploits. This lull has given rise to a surge in exploits targeting network infrastructure and Internet of Things (IoT) devices.
Among the IoT landscape, the spotlight falls on IP cameras, building automation systems, and network-attached storage, emerging as the most sought-after targets for malicious actors.
Only 35% of exploited vulnerabilities made an appearance in the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) list. This divergence emphasizes the need for a proactive and comprehensive approach to cybersecurity, transcending reliance on known vulnerability databases.
-
OT Protocols Bear the Brunt
Operational Technology (OT) finds itself under relentless assault, with five key protocols bearing the brunt of persistent attacks. The primary targets include protocols used in industrial automation and power sectors, such as Modbus, subject to a staggering one-third of all attacks, closely followed by Ethernet/IP, Step7, and DNP3, each accounting for approximately 18% of the onslaught. IEC10X rounds out this list with 10% of attacks, leaving the remaining 2% distributed among various protocols, with BACnet emerging as the majority.
Building automation protocols, such as BACnet, experience less frequent scans. However, the relative scarcity of scans belies an alarming trend—targeted exploits against vulnerabilities in building automation devices are more prevalent.
-
Post-Exploitation Tactics Shift
Persistence tactics mark a 50% surge from 3% in 2022, along with discovery (roughly 25%) and execution (the other roughly 25%). While most observed commands used by threat actors remain targeted at generic Linux systems, a notable trend involves specific commands executed for network operating systems found on widely used routers.
-
Malware Families Remain Strong
Malware families persist as formidable threats. The Agent Tesla Remote Access Trojan (RAT) commands a significant 16% share of observed malicious activity. Following closely are variants of the Mirai botnet, comprising 15%, and the Redline info stealer, holding its ground at 10%.
Among command-and-control servers, Cobalt Strike emerges as the undisputed leader, commanding a substantial 46% share, trailed by Metasploit at 16%, and the emerging Sliver C2 at 13%. Most of these servers are in the United States, constituting 40% of the global landscape, with China and Russia following at 10% and 8%, respectively.
-
Threats Unleashed Across 163 Countries
Threat actors have cast a digital net far and wide, impacting 163 countries. The United States stands as the primary target, bearing the brunt with 168 malicious actors setting their sights on the nation. Other countries include the United Kingdom (88), Germany (77), India (72), and Japan (66).
The usual suspects boast high concentrations of threat actors: China (155), Russia (88), and Iran (45), collectively representing nearly half of all identified threat groups. The crosshairs of these malicious entities are predominantly fixed on three key sectors: Government, Financial Services, and Media and Entertainment. As the primary pillars of societal infrastructure, these industries are at the forefront of cyber warfare, emphasizing the need for heightened security measures and collaborative efforts.
Costante continues, “The key lies in achieving comprehensive visibility, ensuring real-time contextual awareness of every device, whether managed or unmanaged. By doing so, large enterprises can transition from a reactive defense posture to a more proactive approach, steering clear of the futile game of security whack-a-mole. This shift towards enhanced visibility and proactive defense strategies signals a brighter outlook for critical infrastructure.”
For more information, download the full report, “2023 Global Threat Roundup,” now at https://www.forescout.com/resources/research-report_2023-threat-roundup.
How Forescout Research Works
Forescout Research employs its Adversary Engagement Environment (AEE) to conduct analysis, leveraging a blend of real and simulated connected devices. This dynamic environment functions as a robust tool, enabling the pinpointing of incidents and the identification of intricate threat actor patterns at a granular level. The overarching objective is to elevate responses to complex critical infrastructure attacks by leveraging the detailed insights and understanding derived from this specialized deception environment. The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure. Forescout products directly leverage this research, which is also shared openly with vendors, agencies, and other researchers.
About Forescout
Forescout Technologies, Inc., a global cybersecurity leader, continuously identifies, protects and helps ensure the compliance of all managed and unmanaged connected cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout® Platform delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats.
To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.
View source version on businesswire.com: https://www.businesswire.com/news/home/20240123671589/en/
About Business Wire
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
Andersen Consulting tilføjer samarbejdspartneren Cloud2321.11.2025 18:45:00 CET | Pressemeddelelse
Andersen Consulting indgår en samarbejdsaftale med Cloud23, en næstegenerations konsulentvirksomhed, der integrerer data og kunstig intelligens med henblik på at drive digital transformation. Cloud23 er baseret i Sydafrika og leverer intelligente, platformsbaserede løsninger til kunder inden for sektorer som finans, telekommunikation, sundhedsvæsen og produktion. Virksomhedens ydelser spænder over Salesforce-rådgivning og -implementering, managed services og ai-strategi, hvilket giver organisationer mulighed for at modernisere kundeengagement, optimere driften og skabe målbare resultater. “Vores mål hos Cloud23 har altid været at forenkle transformation gennem smart, skalerbart design,” udtaler Ram Ramakrishnan, stifter og administrerende direktør for Cloud23. “Vi fokuserer på at afstemme teknologi med formål og levere resultater, der understøtter langsigtet vækst, kundeværdi og innovation. Samarbejdet med Andersen Consulting giver os mulighed for at styrke vores mission og opnå en stø
AI Takes Out the Trash: Largest U.S. Recycling Project to Extend Landfill Life for Virginia Residents21.11.2025 13:30:00 CET | Press release
Southeastern Public Service Authority of Virginia contracts with AMP to cost-effectively process municipal solid waste, boost recycling and landfill diversion rates The Southeastern Public Service Authority of Virginia (“SPSA”), the regional waste authority for South Hampton Roads, has signed a 20-year contract with Commonwealth Sortation LLC, an affiliate of AMP Robotics Corporation (together, “AMP”), to provide solid waste processing services for SPSA’s eight member communities and their 1.2 million residents. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251120330758/en/ Building on a nearly two-year pilot project in Portsmouth—which featured an AMP ONE™ system capable of processing up to 150 tons of locally sourced municipal solid waste (“MSW”) per day—AMP will now scale its technology region-wide. Under this long-term partnership, which will facilitate the largest recycling project in the country, AMP will deploy addit
RSA Recognized for the Second Consecutive Year in the 2025 Gartner® Magic Quadrant™ for Access Management21.11.2025 13:00:00 CET | Press release
RSA, the security-first identity leader, today announced that RSA® ID Plus has been recognized for the second year in a row in the Gartner® Magic Quadrant™ for Access Management. “The RSA Access Management strategy has never been about being everything to everyone,” said Greg Nelson, RSA CEO. “We specialize in protecting organizations where risk tolerance is at its lowest and security requirements are at their highest. Our focus is intentional: providing security-first access management that supports compliance, ensures resilience, and delivers confidence at scale.” “RSA specializes in the workforce access management use cases where security, compliance, and operational resilience are non-negotiables,” said Jim Taylor, RSA President, Chief Product and Strategy Officer. “Our product development strategy will continue to emphasize the key qualities that highly regulated industries prioritize, including user experience, strong support for workforce management, and intelligent posture mana
NIQ and Amazon Marketing Cloud (AMC) Collaborate to Measure Reach and Impact of Cross-Platform Ad Campaigns in Italy21.11.2025 09:00:00 CET | Press release
NIQ and Amazon Marketing Cloud (AMC) have announced a new collaboration to study the effectiveness of cross-platform advertising across linear TV and Amazon Ads inventory in Italy. Through the collaboration advertisers and agencies will gain actionable insights into the relative performance of ad placements across digital, linear TV and streaming environments, including how each contributes to incremental reach and influences product purchases on Amazon’s ecommerce platforms. The insights are made possible by using high-quality data from Sinottica®—a well-established single-source consumer panel in Italy owned by NIQ—with data from Amazon Marketing Cloud. Specifically, the research will leverage Sinottica’s linear TV data alongside several Amazon inventory sources, including Amazon DSP, Sponsored Ads (Products, Brands, Display), and Streaming TV (Prime Video, Twitch, Fire TV). This approach will enable a deeper understanding of how ad exposure across digital and TV channels translates
Ahead of Holiday Season, Visa Identifies Five Transformative Forces Reshaping Global Payment Security20.11.2025 19:50:00 CET | Press release
New Biannual Threats Report Reveals Fundamental Shift in Fraud Operations as Criminals Adopt Industrial-Scale Tactics To celebrate International Fraud Awareness Week, Visa (NYSE: V) today released its Fall 2025 Biannual Threats Report, revealing five forces that are transforming the global payments security landscape. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251120412198/en/ The report, produced by Visa's Payment Ecosystem Risk and Control (PERC) team, draws on intelligence from Visa's global network to identify how criminal operations are evolving with unprecedented speed, scale, and sophistication. "The payments ecosystem is experiencing a paradigm shift in how fraud operates," said Paul Fabara, Chief Risk and Client Services Officer at Visa. "Criminals are no longer working as opportunistic individuals-- they're operating like tech startups, building reusable infrastructure and deploying systematic, industrial-scale
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
