New report sees big increases in cybersecurity risks for ICS/OT devices
What you'll learn:
- Exposure of ICS and OT devices should exceed 200,000 devices visible to potential bad actors each month, up from 160,000 to 180,000 monthly in 2024.
- Many of these systems are often exposed with minimal security and exploitable vulnerabilities that have real-world implications for safety, continuity and national security.
- Many also are part of critical infrastructure. Combined with readily available ICS-aware tools, attackers have an efficient path from scan to impact.
Related content:
Exploitable gaps found and fixed in widely used industrial network devices
Plus on the Podcast: How those flaws show how far OT cybersecurity still has to go
And more on manufacturing cybersecurity: How to prepare OT for system updates
Cybercriminals have more ways of attacking industrial control systems and OT equipment, making high-tech manufacturing more dangerous following years of improvements, according to a new report.
Exposure of ICS and OT devices should exceed 200,000 devices visible to potential bad actors each month, up from 160,000 to 180,000 devices monthly in 2024, the late September assessment from cybersecurity firm BitSight found. And two independent experts agreed.
See also: Taming the data beast is the first step toward smart operations that cannot be skipped
“It’s a concerning trend,” said Joshua Newton, industrial security project engineer at Rockwell Automation.
“The greater implications of it is simply going to be greater risk to those exposed assets,” Newton said, adding that since OT assets have historically been softer targets, they are less likely to be protected.
The BitSight report also found that ICS/OT systems are increasingly exposed to the public internet, as global ICS/OT exposure jumped 12% in 2024.
Many of these systems—which control critical infrastructure such as energy, water and building automation—often are exposed with minimal security and exploitable vulnerabilities.
The vulnerabilities have real-world implications for safety, continuity and national security, highlighting the need for coordinated action from ISPs, manufacturers, integrators and policymakers, BitSight leaders argue in their assessment.
Survey: Data quality issues costing manufacturers billions
According to the BitSight report, the increase in exposures stems from organizations relying largely on enterprise IT-grade firewalls and endpoint tools that were not designed to secure factory environments, where uptime is prioritized over data privacy. As a result of the gap between IT and OT, assets are exposed.
Chris Di Biase, principal application engineer at Rockwell, agreed with BitSight’s observations. As he put it, traditional IT security tools interfere with operations, while in OT and plant floor environment, the emphasis is on keeping the machine running.
“I do think that traditional IT security tooling has a very important role to play at a minimum with perimeter defense,” Di Biase said. “But its availability is the most important thing ... so unless you can prove to [manufacturers] that this is not gonna impact anything, they’re not gonna use it.”
See also: The hardware problem that is stalling half of all digital transformation projects
The report identified FrostyGoop and Fuxnet as two types of malware threatening these systems. That software can disable devices that use Meter-bus and Modbus protocols, to inflicting maximum damage.
“The bigger question is why this is happening,” Newton said.
He speculated that increased exposure within the last year could be from residual outcomes of industry 4.0, edge-to-cloud orchestration and increased drives towards AI. Although, he emphasized that it’s too soon to be sure of the cause and more time needs to pass to make sure this year wasn’t an “anomaly.”
I do think that traditional IT security tooling has a very important role to play at a minimum with perimeter defense. But its availability is the most important thing.
- Chris Di Biase, principal application engineer, Rockwell Automation
BitSight also showed that old gear that should have been retired, and new gear that should not be online, are weaknesses to blame. Those systems include Modbus, S7, BACnet, KNX and ATG.
Many of these systems are part of critical infrastructure. Combined with readily available ICS-aware tools, attackers have an efficient path from scan to real-world impact: pumps stall, lights flicker, heating fails and so do safety systems.
See also: ‘Digital retrofitting’ of plant machines offers course through Industry 4.0 to Industry 5.0
In addition to more devices exposed to bad actors, security experts are finding new vulnerabilities in these devices.
The U.S. Cybersecurity and Infrastructure Security Agency tracks these vulnerabilities and regularly publishes advisories on newly found vulnerabilities that affect industrial control systems. Common vulnerabilities and exposures are rising almost every year.
Almost 30% of these vulnerabilities have no patch or update available, according to CISA.
Newton and Di Biase emphasized that these OT devices should not be internet-facing, and that other security measures won’t be as effective if the devices are discoverable on the internet.
See also: Sensing a shift: Trends in smart industrial automation
“Off-the-shelf IT security components can be used to very great effect to secure the OT equipment if they’re applied carefully, and those things can be applied carefully by quite a few professionals in the IT sphere,” Di Biase said.
“As long as the IT engineers that are doing the application understand the operational requirements of the plant floor, then they can do a really good job of helping partner with OT to secure these environments and, through security, improve availability of the applications and improve run time.”
About the Author
Sarah Mattalian
Staff Writer
Sarah Mattalian is a Chicago-based journalist writing for Smart Industry and Automation World, two brands of Endeavor Business Media, covering industry trends and manufacturing technology. In 2025, she graduated with a master's degree in journalism from Northwestern University's Medill School of Journalism, specializing in health, environment and science reporting. She does freelance work as well, covering public health and the environment in Chicagoland and in the Midwest. Her work has appeared in Inside Climate News, Inside Washington Publishers, NBC4 in Washington, D.C., The Durango Herald and North Jersey Daily News. She has a translation certificate in Spanish.

