{"id":41589,"date":"2021-07-02T15:29:10","date_gmt":"2021-07-02T15:29:10","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32432\/Ransomware-Gangs-Taking-Aim-At-Soft-Target-Industrial-Control-Systems.html"},"modified":"2021-07-02T15:29:10","modified_gmt":"2021-07-02T15:29:10","slug":"ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/","title":{"rendered":"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems"},"content":{"rendered":"<p>Ransomware attacks are targeting legacy industrial control systems (ICS) and more needs to be done to secure networks at industrial facilities against the threat of being disrupted by cyber criminals attempting to make money from extortion.&nbsp;<\/p>\n<p>A report by&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/2020-report-ics-endpoints-as-starting-points-for-threats\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">cybersecurity researchers at Trend Micro<\/a>&nbsp;warns that&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>&nbsp;is &#8220;a concerning and rapidly evolving threat to ICS endpoints globally&#8221; with a significant rise in activity during the past year.&nbsp;<\/p>\n<p>The motive behind ransomware attacks is simple \u2013 making money. Cyber criminals know that by hitting the industrial control systems used to operate factories and manufacturing environments, which rely on constant uptime, they have a good chance of getting paid.<\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/\" target=\"_blank\" rel=\"noopener\"><strong>Cybersecurity: Let&#8217;s get tactical<\/strong><\/a><strong>&nbsp;(ZDNet\/TechRepublic special feature) |&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/cybersecurity-let-s-get-tactical-free-pdf\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\"><strong>Download the free PDF version<\/strong><\/a><strong>&nbsp;(TechRepublic)<\/strong><\/strong><\/p>\n<p>These networks, and the ones that support utilities like water and power, need to be fully operational in order to provide services and the longer the network is down, the more disruption there will be, so the victim might make the decision to give in and meet the ransom demand of the cyber criminals.&nbsp;<\/p>\n<p>&#8220;The underground cybercrime economy is big business for ransomware operators and affiliates alike. Industrial Control Systems found in critical national infrastructure, manufacturing and other facilities are seen as soft targets, with many systems still running legacy operating systems and unpatched applications. Any infection on these systems will most likely cause days if not weeks of outage,&#8221; said Bharat Mistry, technical director at Trend Micro.&nbsp;<\/p>\n<p>Recent examples of successful ransomware campaigns like&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/jbs-usa-cyber-attack-affecting-north-american-and-australian-systems\/\" target=\"_blank\" rel=\"noopener\">the attack against meat processor JBS<\/a>&nbsp;demonstrate just how lucrative ransomware can be, as&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/fbi-attributes-jbs-ransomware-attack-to-revil\/\" target=\"_blank\" rel=\"noopener\">cyber criminals using REvil ransomware<\/a>&nbsp;were able to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-meat-firm-jbs-says-it-paid-out-11m-after-attack\/\" target=\"_blank\" rel=\"noopener\">make off with $11 million in bitcoin<\/a>.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Meanwhile,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">the Colonial Pipeline ransomware attack<\/a>&nbsp;showed how a ransomware attack against an industrial target can have very real consequences for people, as gasoline supplies to much of the north-eastern United States were limited because of the attack.&nbsp;<\/p>\n<p>Cyber criminals using many different forms of ransomware are targeting industrial control systems but four families of ransomware account for over half of these attacks.&nbsp;<\/p>\n<p>They are&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-dangerous-ransomware-is-using-a-new-trick-to-encrypt-your-network\/\" target=\"_blank\" rel=\"noopener\">Ryuk<\/a>&nbsp;\u2013 which accounts for one in five ransomware attacks affecting ICS by itself \u2013 Nefilm, REvil (also known as&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-ransomware-has-learned-a-new-trick-scanning-for-point-of-sales-devices\/\" target=\"_blank\" rel=\"noopener\">Sodinokibi<\/a>) and&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/a-deep-dive-into-the-operations-of-the-lockbit-ransomware-group\/\" target=\"_blank\" rel=\"noopener\">LockBit<\/a>. &nbsp;<\/p>\n<div class=\"relatedContent alignRight\" readability=\"6.5573770491803\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-cyber-insurance\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2020\/10\/27\/db3c0325-2b86-435b-8efa-93828deb6b56\/resize\/220x165\/ca81e8e32da38a71067a1e86cc96b129\/cybersecurity-lock-resized.jpg\" class alt=\"The best cyber insurance\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-cyber-insurance\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> The best cyber insurance <\/a> <\/p>\n<p class=\"dek\">The cyber insurance industry is likely to go mainstream and is a simple cost of doing business. Here are a few options to consider.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-cyber-insurance\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>According to the report, the US is the country with the most instances of ransomware affecting ICSs, followed by India, Taiwan and Spain.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-paying-up-wont-stop-you-from-getting-hit-again-says-cybersecurity-chief\/#link=%7B%22linkText%22:%22Ransomware:%20Paying%20up%20won't%20stop%20you%20from%20getting%20hit%20again,%20says%20cybersecurity%20chief%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/ransomware-paying-up-wont-stop-you-from-getting-hit-again-says-cybersecurity-chief\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\"><strong>Ransomware: Paying up won&#8217;t stop you from getting hit again, says cybersecurity chief<\/strong><\/a><\/p>\n<p>To help secure ICS endpoints against ransomware and other cyberattacks, the Trend Micro report offers several recommendations.&nbsp;<\/p>\n<p>They&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" target=\"_blank\" rel=\"noopener\">include patching systems with security updates<\/a>, something the paper acknowledges as a &#8220;tedious&#8221; but necessary process. By ensuring networks are patched with the latest security updates, it means cyber criminals can&#8217;t exploit known vulnerabilities that can be protected against.&nbsp;<\/p>\n<p>If patching isn&#8217;t an option, then the network should be segmented in order to restrict vulnerable industrial control systems from internet-connected systems. &nbsp;<\/p>\n<p>It&#8217;s also recommended that ICS networks are secured with strong username and passwords combinations that are difficult to crack with brute force attacks. Applying&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/multi-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\/\" target=\"_blank\" rel=\"noopener\">multi-factor authentication across the network<\/a>&nbsp;can also help secure it against unauthorized intrusions.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY&nbsp;<\/strong><\/h3>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32432\/Ransomware-Gangs-Taking-Aim-At-Soft-Target-Industrial-Control-Systems.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41590,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9433],"class_list":["post-41589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackermalwarecybercrimedata-lossscadacryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-02T15:29:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"220\" \/>\n\t<meta property=\"og:image:height\" content=\"153\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems\",\"datePublished\":\"2021-07-02T15:29:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/\"},\"wordCount\":604,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg\",\"keywords\":[\"headline,hacker,malware,cybercrime,data loss,scada,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/\",\"name\":\"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg\",\"datePublished\":\"2021-07-02T15:29:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg\",\"width\":220,\"height\":153},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,cybercrime,data loss,scada,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarecybercrimedata-lossscadacryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-02T15:29:10+00:00","og_image":[{"width":220,"height":153,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems","datePublished":"2021-07-02T15:29:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/"},"wordCount":604,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg","keywords":["headline,hacker,malware,cybercrime,data loss,scada,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/","name":"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg","datePublished":"2021-07-02T15:29:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems.jpg","width":220,"height":153},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-gangs-taking-aim-at-soft-target-industrial-control-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,cybercrime,data loss,scada,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarecybercrimedata-lossscadacryptography\/"},{"@type":"ListItem","position":3,"name":"Ransomware Gangs Taking Aim At Soft Target Industrial Control Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41589"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41589\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41590"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}