A ransomware speed record: three hours to disaster
Ransomware now reaches full encryption in just three hours. Analysis of Barracuda and Securin data reveals how Akira and others are accelerating attacks.
Read More
In 2025, OT adversaries changed posture.
A recently published year-in-review report from Dragos documents threat groups that are actively mapping industrial control loops – identifying engineering workstations, exfiltrating configuration files and alarm data, and analysing processes closely enough to disrupt them. The report describes this as the removal of the last practical barrier between network access and physical consequence.
That detail is huge for OT risk. Mapping control logic requires patience, domain familiarity and intent, and it shows threat actors are preparing for operational impact.
Dragos also identified three new OT-focused threat groups in 2025: AZURITE, PYROXENE and SYLVANITE. This brings the total it tracks to 26 OT-specific groups, with 11 active during the year.
So the threat landscape is expanding in both volume and sophistication.
Dragos describes an increasingly structured operating model among threat actors. Initial access providers establish footholds and then hand off environments to teams with ICS-specific capability. In some cases, this division of labour compresses the timeline from compromise to operational readiness from weeks to days.
That efficiency mirrors developments seen in the ransomware ecosystem. OT tradecraft now follows similar patterns of specialisation and workflow.
AZURITE and PYROXENE were observed operating inside OT environments and exfiltrating operational intelligence from engineering workstations. Engineering systems, configuration files and alarm histories are becoming priority targets – because they provide insight into how physical processes behave. If you know how systems are controlled, you’ve got operational leverage.
The year also delivered a milestone in critical infrastructure targeting.
The report notes that ELECTRUM (the group linked to the 2015 and 2016 Ukraine power outages) expanded its targeting into Poland in late December 2025, focusing on distributed energy resources (DERs) – the first major coordinated cyberattack against DERs globally.
DER environments introduce new architectural complexity. They rely on software-defined coordination, remote management and interconnected supply chains. The fact that adversaries are giving serious attention to this segment reflects the strategic value of these systems.
Speed was another defining feature of 2025.
Dragos reports a median of 24 days from vulnerability disclosure to public exploit in 2025. In addition, 4% of ICS vulnerabilities were actively exploited at disclosure. The report also notes that 26% of advisories offered no patch and 25% contained incorrect CVSS scores.
That means exposure windows remain wide while attacker development cycles accelerate.
Telemetry from Nozomi provides supporting context. In the second half of 2025, adversary-in-the-middle (AiTM) activity accounted for 26.5% of all alerts. Credential interception and session hijacking continue to be highly effective entry techniques across converged IT, OT and IoT environments.
The same report highlights a rise in data manipulation activity, climbing to fifth place in technique rankings. Integrity attacks can alter operational data in ways that influence decisions, safety thresholds and automated responses. Access and manipulation increasingly move together.
Reading these reports, it’s clear that the structural concern here sits on the defensive side.
Dragos estimates that fewer than 10% of OT networks worldwide have network visibility and monitoring in place.
And operational anecdotes reinforce that statistic. Thirty percent of incident response cases in 2025 began with someone observing that “something seems wrong”, often without sufficient telemetry to determine whether cyber activity was involved.
To investigate, you have to have data – but many environments still lack it.
Meanwhile, Nozomi reports that 48% of recent 2025 vulnerabilities present in observed environments were rated ‘high’ or ‘critical’. Wireless exposure is also still common, with 68% of observed wireless networks lacking management frame protection, and only 0.3% using enterprise-grade 802.1X authentication.
In effect, the gap between adversary capability and defender instrumentation is widening. For cybersecurity, that represents a monumental task: to protect OT, we have to close the gap.
There’s no simple way to do that. But this research does bring up some strong pathways to more robust security:
OT environments now attract focused, technically capable adversaries who invest time in understanding how physical processes operate. Resilience now depends on whether organisations match that seriousness with visibility and disciplined operational defence.
Join the newsletter to receive the latest updates in your inbox.
Ransomware now reaches full encryption in just three hours. Analysis of Barracuda and Securin data reveals how Akira and others are accelerating attacks.
Read More
The average time to exploit has fallen from 745 days in 2020 to just 44 days in 2025, according to Flashpoint. Here’s why N-day vulnerabilities are driving faster attacks.
Read More
Saudi Arabia’s cybersecurity workforce is now 32% women, outpacing the global average. Leaders at Black Hat MEA share their perspective, alongside our lowdown on the data about gender diversity in the region.
Read More