{"id":42054,"date":"2021-06-30T00:00:00","date_gmt":"2021-06-30T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-.html"},"modified":"2021-06-30T00:00:00","modified_gmt":"2021-06-30T00:00:00","slug":"top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/","title":{"rendered":"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/ICS-endpoints-banner.png\"><!-- Begin mPulse library --><!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"The Trend Micro research paper, &quot;2020 Report on Threats Affecting ICS Endpoints,\u201d presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections. \"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"malware,endpoints,iot,smart factories,reports,articles, news, reports\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2021-06-30\"> <meta property=\"article:tag\" content=\"smart factories\"> <meta property=\"article:section\" content=\"reports\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-.html\"> <title>Top Countries With ICS Endpoint Malware Detections <\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-.html\"><br \/>\n<meta property=\"og:title\" content=\"Top Countries With ICS Endpoint Malware Detections \"><br \/>\n<meta property=\"og:description\" content=\"The Trend Micro research paper, \" report on threats affecting ics presents findings endpoints and the that plague them. from these we rounded up list of top ten countries with most malware grayware detections.><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/ICS-endpoints-banner.png\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Top Countries With ICS Endpoint Malware Detections \"><br \/>\n<meta name=\"twitter:description\" content=\"The Trend Micro research paper, \" report on threats affecting ics presents findings endpoints and the that plague them. from these we rounded up list of top ten countries with most malware grayware detections.><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/ICS-endpoints-banner.png\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"49.185540243659\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"223270352\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"12\">\n<div class=\"article-details\" role=\"heading\" readability=\"44\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Smart Factories<\/p>\n<p class=\"article-details__description\">The Trend Micro research paper, &#8220;2020 Report on Threats Affecting ICS Endpoints,\u201d presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections. <\/p>\n<p class=\"article-details__author-by\">By: Matsukawa Bakuei, Ryan Flores, Lord Alfred Remorin, Fyodor Yarochkin <time class=\"article-details__date\">June 30, 2021<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/ICS-endpoints-banner.png\" alt=\"ICS-endpoints-research-logo\"> <\/figure>\n<\/p><\/div>\n<div>\n<div class=\"richText\" readability=\"34.726768377254\">\n<div readability=\"20.479889042996\">\n<p>The&nbsp;ever-increasing&nbsp;interconnection&nbsp;between&nbsp;IT&nbsp;and&nbsp;OT&nbsp;in&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/industrial-control-system\">Industrial Control Systems (ICS)<\/a>&nbsp;promotes efficiency but also makes it susceptible to threats.&nbsp;Organizations should&nbsp;examine&nbsp;possible security issues&nbsp;to&nbsp;prevent&nbsp;compromise.<\/p>\n<p>The Trend Micro research&nbsp;paper,&nbsp;\u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/2020-report-ics-endpoints-as-starting-points-for-threats\">2020 Report on Threats Affecting&nbsp;ICS Endpoints<\/a>,\u201d&nbsp;presents&nbsp;findings&nbsp;on&nbsp;ICS endpoints and the threats&nbsp;\u2014 such as&nbsp;ransomware,&nbsp;coinminers, and legacy malware&nbsp;\u2014 that plague them.&nbsp;From these findings, we rounded up&nbsp;the list of&nbsp;the&nbsp;top ten countries&nbsp;with the most&nbsp;malware and grayware&nbsp;(like potentially unwanted applications, adware, and hacking tools)&nbsp;detections.<\/p>\n<p><span class=\"body-subhead-title\">The top&nbsp;10&nbsp;countries&nbsp;with the most ICS malware infections<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/figure-11-01.jpg\" alt=\"Figure 1. Top 10 countries\u2019 percentage of ICS with malware and grayware detections\"><figcaption>Figure 1. Top 10 countries\u2019 percentage of ICS with malware and grayware detections<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"37\">\n<div readability=\"19\">\n<p>The list includes the following countries: Japan, US, Denmark, Italy, India, Taiwan, China, France, Brazil, and Thailand.<\/p>\n<p>Here are some pertinent findings on specific types of threats:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/Figure-2-Breakdown-of-detected-threat-types.jpg\" alt=\"Figure 2. Breakdown of detected threat types\"><figcaption>Figure 2. Breakdown of detected threat types (Source: Trend Micro\u2122 Smart Protection Network\u2122 infrastructure)<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"31.743292682927\">\n<div readability=\"11.370731707317\">\n<ul>\n<li><span class=\"rte-red-bullet\">The US had the greatest number of organizations affected by&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/definition\/ransomware\">ransomware<\/a>.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">India has the most of the&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/d\/zoomed-in-a-look-into-a-coinminer-bundled-with-zoom-installer.html\">coinminer<\/a>, Equated malware, and WannaCry ransomware detections.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Legacy malware (particularly worms in removable drives and file infecting viruses) infections were mostly detected in India, China, the US, and Taiwan.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Japan has the highest number of&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/threat-encyclopedia\/malware\/EMOTET\/\">Emotet<\/a>&nbsp;infections. However, while Emotet is known to deploy other malware such as&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/cybercrime-and-digital-threats\/addressing-threats-like-ryuk-via-trend-micro-xdr\">Ryuk<\/a>,&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/threat-encyclopedia\/malware\/TRICKBOT\/\">Trickbot<\/a>, or&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/threat-encyclopedia\/malware\/qakbot\">Qakbot<\/a>&nbsp;post-infection, the data seems to show no further installation of malware.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">ICSs in Germany has the most grayware, primarily because of adware bundled with software tools.<\/span><\/li>\n<\/ul>\n<p>In terms of organizations that have ICSs that have been infected with ransomware, the US has the most ransomware detections affecting ICS, followed by India, Taiwan, and Spain.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a class=\"bs-modal\" id=\"cb504d\" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/Figure-3-Per-country-breakdown-of-organization-related-ransomware-detections.jpg\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/Figure-3-Per-country-breakdown-of-organization-related-ransomware-detections.jpg\" alt=\"Figure 3. Per country breakdown of organization-related ransomware detections for ICS in 2020\"> <\/a><figcaption>(Click to enlarge image) Figure 3. Per country breakdown of organization-related ransomware detections for ICS in 2020 (Source: Trend Micro\u2122 Smart Protection Network\u2122 infrastructure)<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35.486111111111\">\n<div readability=\"17.5\">\n<p>However, taking the percentage of organizations that had ransomware affecting their ICS, Vietnam can be considered to have the most detections, followed by Spain and Mexico.<\/p>\n<p>India had the most coinminer detections, with&nbsp;<a href=\"https:\/\/success.trendmicro.com\/solution\/000261917\" target=\"_blank\" rel=\"noopener\">MALXMR<\/a>&nbsp;being the most detected variant in 2020. Of the countries with MALXMR running on ICS endpoints, India accounts for more than a third of detections. This shows that ICS software in the country is vulnerable to&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/vulnerabilities-and-exploits\/putting-the-eternal-in-eternalblue-mapping-the-use-of-the-infamous-exploit\">EternalBlue<\/a>; this data is supported by the high percentage of detections for WannaCry ransomware in the same region. The said ransomware also exploits EternalBlue.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/Figure-4-MALXMR-distribution-ICS.jpg\" alt=\"Figure 4. MALXMR distribution per country and organization\"><figcaption>Figure 4. MALXMR distribution per country and organization (Source: Trend Micro\u2122 Smart Protection Network\u2122 infrastructure)<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-\/Figure-5-%20WannaCry-distribution-per-country-and-organization.jpg\" alt=\"Figure 5. WannaCry distribution per country and organization\"><figcaption>Figure 5. WannaCry distribution per country and organization (Source: Trend Micro\u2122 Smart Protection Network\u2122 infrastructure)<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"42.38687150838\">\n<div readability=\"32.385474860335\">\n<p>To protect ICSs from threats, organizations need to regularly patch and update their systems. Although this might be a tedious process especially for legacy systems, doing so is necessary to thwart threats before they get in and do serious damage. If patching is not an option, organizations can also avail of virtual patching technologies.<\/p>\n<p>Organizations can also implement micro-segmentation to enhance security by restricting network access and communications to the necessary devices and protocols. Adhering to the principle of least privilege, where employees are only given the exact level of access they need and nothing more, would also help curb the possible spread of threats.<\/p>\n<p>Security solutions can also help.&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/iot\/industrial-endpoint-security\/txone-stellar-protect.html\">TXOne StellarProtect<sup>TM<\/sup><\/a>&nbsp;is an application control security software that only allows known benign executables and processes to execute in an endpoint. This solution delivers patternless protection against both known and unknown malware via machine learning and the ICS root of trust.<\/p>\n<p>Other recommendations and more extensive findings can be read in our report, \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/internet-of-things\/2020-report-ics-endpoints-as-starting-points-for-threats\">2020 Report on Threats Affecting ICS Endpoints<\/a>\u201d.<\/p>\n<p><i>Disclaimer: Please note that these detection numbers are from the coverage of the SPN sensors distributed globally, which is not exhaustive. Those regional rankings and figures cannot be free from such market-share influenced distribution bias.<\/i><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/top-countries-with-ics-endpoint-malware-detections-.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Trend Micro research paper, &#8220;2020 Report on Threats Affecting ICS Endpoints,\u201d presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42055,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9508,9514,9513,9516,9515],"class_list":["post-42054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-iot","tag-trend-micro-research-malware","tag-trend-micro-research-reports","tag-trend-micro-research-smart-factories"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-30T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher\",\"datePublished\":\"2021-06-30T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/\"},\"wordCount\":764,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : IoT\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Reports\",\"Trend Micro Research : Smart Factories\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/\",\"name\":\"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png\",\"datePublished\":\"2021-06-30T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/","og_locale":"en_US","og_type":"article","og_title":"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-30T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher","datePublished":"2021-06-30T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/"},"wordCount":764,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : IoT","Trend Micro Research : Malware","Trend Micro Research : Reports","Trend Micro Research : Smart Factories"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/","url":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/","name":"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png","datePublished":"2021-06-30T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/top-countries-with-ics-endpoint-malware-detections-sr-security-specialist-sr-manager-threat-research-sr-threat-researcher-sr-threat-researcher\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Top Countries With ICS Endpoint Malware Detections Sr. Security Specialist Sr. Manager, Threat Research Sr. Threat Researcher Sr. Threat Researcher"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42054"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42054\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42055"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}