{"id":43594,"date":"2021-10-25T14:02:00","date_gmt":"2021-10-25T14:02:00","guid":{"rendered":"http:\/\/dd20a2d6-ce9f-48a7-b6f7-bbfcfb91daa9"},"modified":"2021-10-25T14:02:00","modified_gmt":"2021-10-25T14:02:00","slug":"ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/","title":{"rendered":"Ransomware: Industrial services top the hit list &#8211; but cyber criminals are diversifying"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/065d07c4077f40f136b8819a9f03df4a39538d34\/2021\/08\/06\/c55fade0-6def-4c6d-b0b7-d501337b05d8\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Businesses in industrial goods and services are still the most popular target for ransomware attacks, but cyber criminals are increasingly diversifying which organisations they&#8217;re extorting.&nbsp; <\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" target=\"_blank\" rel=\"noopener\">Ransomware<\/a>&nbsp;has become&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/have-we-reached-peak-ransomware-how-the-internets-biggest-security-problem-has-grown-and-what-happens-next\/\" target=\"_blank\" rel=\"noopener\">a major cybersecurity issue<\/a>, as cyber criminals infiltrate networks and encrypt servers and files before demanding a ransom payment \u2013 often amounting to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/largest-ransomware-demand-now-stands-at-30-million-as-crooks-get-bolder\/\" target=\"_blank\" rel=\"noopener\">millions of dollars<\/a>&nbsp;in cryptocurrencies \u2013 in exchange for the decryption key.&nbsp; <\/p>\n<p>In a&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-too-many-firms-are-still-willing-to-pay-up-if-attacked\/\" target=\"_blank\" rel=\"noopener\">significant number of cases<\/a>, the victim will give in to the demands and pay the ransom. This might be because they&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/pc-and-mac-backup-how-to-protect-your-data-from-disaster\/\" target=\"_blank\" rel=\"noopener\">don&#8217;t have back-ups<\/a>, because the&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-theres-been-a-big-rise-in-double-extortion-attacks-as-gangs-try-out-new-tricks\/\" target=\"_blank\" rel=\"noopener\">criminals threaten to leak stolen data if they&#8217;re not paid<\/a>, or simply because the victim perceives paying to the ransom be the quickest means of restoring the network. Yet in reality, even with the correct decryption key, services can remain disrupted for a long time after the event.&nbsp; <\/p>\n<p>In an analysis of hundreds of reported ransomware attacks between July and September this year,&nbsp;<a href=\"https:\/\/www.digitalshadows.com\/blog-and-research\/ransomware-q3-2021-roll-up\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">cybersecurity researchers at Digital Shadows<\/a>&nbsp;found that industrial goods and services was the most commonly reported sector, accounting for almost double the number of incidents that affected the second most affected industry \u2013 technology.&nbsp; <\/p>\n<p>One of the most significant ransomware attacks this year affected an industrial environment, when&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline fell victim to DarkSide ransomware<\/a>.&nbsp; The cyber attack led to a shortage of gas for much of the United States east coast and people rushed to stockpile gas. The company ended up&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-paid-close-to-5-million-in-ransomware-blackmail-payment\/\" target=\"_blank\" rel=\"noopener\">paying a ransom of millions of dollars<\/a>&nbsp;to restore the network.&nbsp; <\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><strong>A winning strategy for cybersecurity<\/strong><\/a><strong>&nbsp;(ZDNet special report) &nbsp;&nbsp;<\/strong> <\/p>\n<p>Industrial environments are a popular target for ransomware cyber criminals because if a product or service can&#8217;t be produced or delivered, it affects customers \u2013 and the bottom line. As such, many companies opt to pay to get services up and running again quickly. <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>&#8220;Companies within the industrial goods and services sector are commonly targeted due to their sensitivity to prolonged outages; manufacturers often need to be working 24\/7,&#8221; Chris Morgan, senior cyber threat intelligence analyst at Digital Shadows told ZDNet.&nbsp; <\/p>\n<p>&#8220;Even the slightest outage can significantly impact the target&#8217;s supply chain. Many companies within this sector\u2014and other sectors like construction and agriculture\u2014rely on technology to provide automation. Without this technology, productivity grinds to a halt.&#8221; <\/p>\n<p>In addition, industrial environments are often running on technology that make them easy pickings for ransomware gangs. This can range from relying on old, out-of-date software that doesn&#8217;t receive security updates, to using much newer,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/iiot-security-why-it-matters-why-it-needs-to-be-much-better\/\" target=\"_blank\" rel=\"noopener\">Internet of Things connected devices and sensors<\/a>&nbsp;that can be exploited by cyber criminals to access a network.&nbsp; <\/p>\n<p>While it won&#8217;t do away with the threat entirely, businesses can take steps to avoid falling victim to cyber attacks, such as&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" target=\"_blank\" rel=\"noopener\">applying security updates<\/a>&nbsp;in a timely manner and applying&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/multi-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\/\" target=\"_blank\" rel=\"noopener\">multi-factor authentication<\/a>. <\/p>\n<p><strong>Diversifying targets<\/strong> <\/p>\n<p>While industrial environments remain the top target for ransomware attacks, there was a reduction in the number of attacks against them during the last quarter as cyber criminals diversified their targets. <\/p>\n<p>The research by Digital Shadows found that the technology industry was the second most targeted during the reporting period. The most significant attack on this sector in recent months was against&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/\" target=\"_blank\" rel=\"noopener\">Kaseya, an IT solutions provider<\/a>, which was targeted in&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/supply-chain-attacks-are-the-hackers-new-favourite-weapon-and-the-threat-is-getting-bigger\/\" target=\"_blank\" rel=\"noopener\">a supply chain attack<\/a>&nbsp;that&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/kaseya-ransomware-attack-1500-companies-affected-company-confirms\/\" target=\"_blank\" rel=\"noopener\">affected thousands of companies around the world<\/a>. &nbsp; <\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/this-company-was-hit-with-ransomware-heres-what-they-did-next-and-why-they-didnt-pay-up\/\" target=\"_blank\" rel=\"noopener\"><strong>This company was hit by ransomware. Here&#8217;s what they did next, and why they didn&#8217;t pay up<\/strong><\/a><strong>&nbsp;<\/strong> <\/p>\n<p>Other common ransomware targets include construction, financial services and legal services, as well as food and drink companies, all of which possess vital systems or data that criminals can leverage to coerce victims into paying the ransom.&nbsp; <\/p>\n<p>Researchers warn that the expansion in sectors being targeted could be due to the emergence of new ransomware groups and increased competition amongst gangs. &#8220;The diversification of targets likely comes naturally as a result of the ransomware market becoming more saturated,&#8221; said Morgan.&nbsp; <\/p>\n<p>&#8220;Digital Shadows currently tracks 35 data-leak sites operated by distinct ransomware groups, and while this number fluctuates regularly, it is highly likely to increase in 2022. With more groups needing more victims to target, new sectors will come into the firing line of this type of activity.&#8221; <\/p>\n<p><strong>MORE ON CYBERSECURITY<\/strong> <\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-industrial-services-are-still-the-most-popular-target-but-now-cyber-criminals-are-diversifying-attacks\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware gangs are heavily targeting industry with attacks &#8211; but increased competition means cyber criminals are expanding their targets.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-43594","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: Industrial services top the hit list - but cyber criminals are diversifying 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: Industrial services top the hit list - but cyber criminals are diversifying 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-25T14:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/065d07c4077f40f136b8819a9f03df4a39538d34\/2021\/08\/06\/c55fade0-6def-4c6d-b0b7-d501337b05d8\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware: Industrial services top the hit list &#8211; but cyber criminals are diversifying\",\"datePublished\":\"2021-10-25T14:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/065d07c4077f40f136b8819a9f03df4a39538d34\\\/2021\\\/08\\\/06\\\/c55fade0-6def-4c6d-b0b7-d501337b05d8\\\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/\",\"name\":\"Ransomware: Industrial services top the hit list - but cyber criminals are diversifying 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/065d07c4077f40f136b8819a9f03df4a39538d34\\\/2021\\\/08\\\/06\\\/c55fade0-6def-4c6d-b0b7-d501337b05d8\\\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-10-25T14:02:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/065d07c4077f40f136b8819a9f03df4a39538d34\\\/2021\\\/08\\\/06\\\/c55fade0-6def-4c6d-b0b7-d501337b05d8\\\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/065d07c4077f40f136b8819a9f03df4a39538d34\\\/2021\\\/08\\\/06\\\/c55fade0-6def-4c6d-b0b7-d501337b05d8\\\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: Industrial services top the hit list &#8211; but cyber criminals are diversifying\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: Industrial services top the hit list - but cyber criminals are diversifying 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: Industrial services top the hit list - but cyber criminals are diversifying 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-25T14:02:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/065d07c4077f40f136b8819a9f03df4a39538d34\/2021\/08\/06\/c55fade0-6def-4c6d-b0b7-d501337b05d8\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware: Industrial services top the hit list &#8211; but cyber criminals are diversifying","datePublished":"2021-10-25T14:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/"},"wordCount":749,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/065d07c4077f40f136b8819a9f03df4a39538d34\/2021\/08\/06\/c55fade0-6def-4c6d-b0b7-d501337b05d8\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/","name":"Ransomware: Industrial services top the hit list - but cyber criminals are diversifying 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/065d07c4077f40f136b8819a9f03df4a39538d34\/2021\/08\/06\/c55fade0-6def-4c6d-b0b7-d501337b05d8\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-10-25T14:02:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/065d07c4077f40f136b8819a9f03df4a39538d34\/2021\/08\/06\/c55fade0-6def-4c6d-b0b7-d501337b05d8\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/065d07c4077f40f136b8819a9f03df4a39538d34\/2021\/08\/06\/c55fade0-6def-4c6d-b0b7-d501337b05d8\/hands-on-a-keyboard-in-the-dark.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-industrial-services-top-the-hit-list-but-cyber-criminals-are-diversifying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware: Industrial services top the hit list &#8211; but cyber criminals are diversifying"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43594"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43594\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}