Breaking
March 29, 2025

Why OT security needs exposure management to break the cycle of endless patching | usagoldmines.com

Operational technology (OT) has long struggled with modern cybersecurity demands, but operators now face an increasingly dire cyber threat from nation-state actors. OT is essential for managing cyber-physical systems across fields, including manufacturing, transport, and energy, putting it in the sights of hostile actors backed by China, Russia, Iran, and more.

Yet many OT environments are profoundly unprepared for the threat, often struggling with essential vulnerability management activity that should be a baseline to reliable security.

OT security teams should consider a shift to a policy of exposure management, a smarter approach that prioritizes the most exploitable, high-risk vulnerabilities first. Organizations relying on OT must move to reduce operational strain while closing the gaps that leave their systems open to hostile state-backed actors.

Why OT is a prime target for nation-state cyberattacks

OT environments are prime targets for nation-state actors and cybercriminals attacking critical national infrastructure (CNI). Adversaries have a range of objectives, from stealing classified data and conducting corporate espionage to disrupting economic stability.

In the last few years, multiple high-profile incidents have been linked to known threat groups. For example, Volt Typhoon and Salt Typhoon are two prolific groups linked to China that have conducted several attacks on U.S. infrastructure.

Volt Typhoon has infiltrated critical infrastructure, including communications, energy, and water, and is known for using stealthy, low-and-slow tactics to exploit native tools and systems. Salt Typhoon, meanwhile, is believed to be involved in exfiltrating data from ISPs for use by Chinese intelligence operations.

Sandworm, closely linked to Russia’s military intelligence, is another long-running APT targeting critical infrastructure. The group is believed to be behind several attacks on Ukraine’s power grid over the last decade, creating the Industroyer and Industroyer 2 malware designed for industrial equipment using specific protocols. Sandworm also unleashed the notorious NotPetya ransomware.

Iran has also proven itself to be a major player in international cyberattacks. The CyberAv3ngers group has attacked U.S. water facilities using compromised PLCs and HMIs. The group has also targeted civilian infrastructure with IOCONTROL, a Linux-based backdoor designed for multiple standard OT control systems.

While high-level APTs like these have the resources and expertise for advanced tools and tactics, many OT attacks begin with unsecured devices connected to the internet, providing a clear attack path to establish footholds in critical systems.

After assessing nearly one million OT devices across 270 organizations in multiple fields, we found persistent evidence of malware in OT systems. Sample companies in manufacturing, natural resources, and logistics and transportation all had more than 10% of their OT devices communicating with malicious domains.

The problem with traditional vulnerability management

Vulnerability management is a persistent issue across most sectors but can be particularly difficult when dealing with OT environments. In addition to the large and continuously increasing number of vulnerabilities to address, OT security teams must also deal with complex networks that include many disparate assets, often using their own proprietary operating systems. OT assets are seldom compatible with scanning and IT management tools designed for standard IT networks.

As a result, teams often struggle to implement the prioritized, ordered approach to vulnerabilities needed to keep ahead of hostile attacks.

Of the 270 organizations we assessed, 70% had at least one known exploitable vulnerability (KEV) in their OT systems. Twelve percent of the nearly one million devices included in the study contained a KEV that had yet to be patched. Worse, 40% of organizations have OT assets insecurely connected to the internet, creating a direct pathway for cyberattacks.

Security teams are often stuck pursuing slow and inefficient patch management programs that lack clear direction. Prioritization is usually based extensively on CVSS scores, which fail to consider the context within the company and, thus, the vulnerability’s real-world exploitability and impact. More dangerous vulnerabilities may be overlooked while less important issues drain resources.

The case for exposure management

Dealing with vulnerable OT assets requires a more dynamic approach, prioritized by the real risk to the organization and its infrastructure. Exposure management has emerged as one of the most effective strategies, enabling teams to identify and focus on vulnerabilities with the most significant potential for real-world exploitation.

Exposure management weighs priorities based on multiple risk factors, including identifying which KEVs are actively exploited in the wild and whether assets are affected by insecure remote access or misconfigurations that increase risk. The assessment also considers a device’s criticality to business operations, for example, prioritizing those that would disrupt production or cause safety issues in the event of a breach.

The result is a drastically reduced and more focused to-do list for security teams. For example, our research found roughly 111,000 devices with KEVS. But filtering the list by vulnerabilities linked to ransomware and devices with insecure connectivity immediately reduces the total number to 3,800. Suddenly, the task has shrunk by a factor of 30, even before applying more context for specific organizations.

How to start implementing exposure management in OT security

Exposure management follows a five-step process to identify, assess and resolve OT vulnerabilities.

1. Scoping

The first step is identifying those OT assets most critical to operations, such as production lines in manufacturing or scheduling control systems in maritime transport. This is especially important for asset-intensive companies with a large volume of devices to manage. The aim is to reduce the number of assets that need continuous security inspection.

2. Discovery

Next, this initial list of assets is built into a detailed inventory, focusing on the highest-risk devices. This needs to be a highly data-driven method, while more extensive and complex operations will need an automated approach to make discovery manageable.

3. Prioritization

The high-risk inventory can now be prioritized based on severity. As discussed, this process needs to move beyond basic CVSS scores to consider the actual risk posed by KEVs, the asset’s connectivity status, and the potential impact of a breach. Exploit prediction scoring and business impact assessments provide more data points to inform these decisions.

4. Validation

Before taking any action, it’s crucial to ensure vulnerabilities are exploitable and not blocked by elements like closed ports or firewalls. This avoids wasting resources on patching vulnerabilities that look severe on paper but are low risk in reality.

5. Mobilization

With all that preparation done, it’s time to get moving. It’s best to integrate exposure management into existing security workflows like patching and access control wherever possible to keep things efficient. Organizations should also look to establish cross-team collaboration between IT, security, and operations, as OT often becomes heavily siloed from standard IT practices.

Hardening OT against advanced adversaries

Traditional vulnerability management is failing OT security teams by focusing on attempting to patch everything rather than addressing real threats. In the face of increasingly aggressive state-backed actors, this inefficient approach leaves critical infrastructure vulnerable to severe security incidents.

Identifying and prioritizing high-risk vulnerabilities through an exposure management approach will enable these organizations to manage vulnerabilities quickly and efficiently, drastically improving defenses against nation-state threats, ransomware, and cybercriminals.

We feature the best network monitoring tool.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

The Fujifilm X100VI effect – how it's sparked a compact camera price boom and what I'd buy instead m...

Need some help using AI for the first time? You’re not just limited to ChatGPT | usagoldmines.com

An everyday Chromebook for the everyday family — 81% off | usagoldmines.com

ICYMI: the week's 7 biggest tech stories from Nintendo's last Switch direct to the Google Pixel 9a f...

I tried Mind Maps in NotebookLM and it's my new favorite feature erichs211@gmail.com (Eric Hal Schwa...

Here’s your first hands-on look at the Star Wars: Grogu, Mandalorian, R2-D2, and Darth Vader earbuds...

New Windows 11 build makes mandatory Microsoft Account sign-in even more mandatory Andrew Cunningham...

Elon Musk’s X has a new owner—Elon Musk’s xAI Jon Brodkin | usagoldmines.com

Six Things to Know About Apple's Upcoming Foldable iPhone Juli Clover | usagoldmines.com

Why do LLMs make stuff up? New research peers under the hood. Kyle Orland | usagoldmines.com

This Powerful, Portable Speaker Is $70 Off During Amazon's Big Spring Sale Daniel Oropeza | usagoldm...

Beyond RGB: A new image file format efficiently stores invisible light data Benj Edwards | usagoldmi...

Samsung’s One UI 7 Rollout Should Happen Quickly for a Bunch of Devices Kellen | usagoldmines.com

Samsung’s Galaxy Buds 3 Pro are Down to $140 ($110 Off) Kellen | usagoldmines.com

The Best Fitness Watches for Every Kind of Runner Beth Skwarecki | usagoldmines.com

11 Low-Cost, High-Impact Upgrades You Should Do Immediately After Buying a Home Jeff Somers | usagol...

iOS 18.4 Expected Next Week - Here Are the Release Notes Juli Clover | usagoldmines.com

Report: US scientists lost $3 billion in NIH grants since Trump took office Beth Mole | usagoldmines...

Signal controversy: Why the secure messaging app is all over the news | usagoldmines.com

Amazon's Biggest Kindle Is $75 Off Right Now Michelle Ehrhardt | usagoldmines.com

Why Bill Gates is wrong about AI and 3 things he needs to realize erichs211@gmail.com (Eric Hal Schw...

Google discontinues Nest Protect smoke alarm and Nest x Yale lock Ryan Whitwam | usagoldmines.com

Oracle has reportedly suffered 2 separate breaches exposing thousands of customers‘ PII Dan Goodin |...

Use this trick to beat shady ‘dynamic pricing’ when shopping online | usagoldmines.com

These Dutch Ovens Are Less Than $70 Right Now (Including My Favorite One) Allie Chanthorn Reinmann |...

You Can Finally Turn the Page on Some Kindles Without Tapping the Screen Michelle Ehrhardt | usagold...

The Sleep Earbuds I Use Every Night Are $30 Off Right Now Daniel Oropeza | usagoldmines.com

The 'AI economy is currently a closed loop' - and that's probably why OpenAI, not Microsoft, investe...

NASA to put Starliner’s thrusters through an extensive workout before next launch Eric Berger | usag...

Ex-FCC chairs from both parties say CBS news distortion investigation is bogus Jon Brodkin | usagold...

Google is moving on from smoke detectors and smart locks | usagoldmines.com

My Favorite Amazon Deal of the Day: The Dangbei Freedo Portable Projector Daniel Oropeza | usagoldmi...

Facebook's New Friends-Only Feed Lets You Scroll Like It's 2008 Khamosh Pathak | usagoldmines.com

Apple watchOS 12: Everything we know so far stephen.warwick@futurenet.com (Stephen Warwick) | usagol...

Best USB-C monitors 2025: These displays have a hidden talent | usagoldmines.com

The new Windows 11 roadmap shows when you’ll get certain features | usagoldmines.com

How to pick the right in-wall smart dimmers and switches | usagoldmines.com

The best smart dimmer switches of 2025 | usagoldmines.com

Suction Isn't the Only Thing That Matters When Choosing a Robot Vacuum Amanda Blum | usagoldmines.co...

Apple Seeds Second iOS 18.4 and iPadOS 18.4 Release Candidate With Priority Notifications, Ambient M...

MindsEye, the single-player dystopian action game from a former GTA producer gets June release date ...

An old Android RAT has returned with some new tricks - here is what to look out for | usagoldmines....

7 new movies and TV shows to watch on Netflix, Prime Video, Max, and more this weekend (March 28) to...

Google solves its mysterious Pixel problem, announces 9a launch date Ryan Whitwam | usagoldmines.com

Nvidia RTX 5090 cards with missing ROPs are being sold as ‘B-stock’ | usagoldmines.com

Windows 11 will get a surprise feature update in April | usagoldmines.com

Google Ends Production of Nest Protect, Nest x Yale Lock – Here’s What You Need to Know Kellen | usa...

Save Time Resizing Images on Mac With a Quick Action Tim Hardwick | usagoldmines.com

Marvel sleuths think they've solved the case about Avengers: Doomsday's story, and it's all down to ...

I experienced Snap’s new multiplayer AR and I’m completely sold on an AR glasses filled future hamis...

Xiaomi's Google TV Streamer rival gets a new processor and a much-needed storage leap | usagoldmine...

Google Pixel 9a delay ends – here's when you'll be able to buy one philip.berne@futurenet.com (Phili...

A future Apple Watch could debut a glass frame with touch controls stephen.warwick@futurenet.com (St...

I'm obsessed with Netflix's new horror comedy movie that has a glowing 94% Rotten Tomatoes rating lu...

Hang on handheld fans, we could be seeing AMD's FSR 4 upscaling on new handhelds after all - if this...

Firefox patches zero-day security flaw days after Chrome fixes the same issue | usagoldmines.com

Trump annoyed the Smithsonian isn’t promoting discredited racial ideas John Timmer | usagoldmines.co...

Corning’s new Apple-like ceramic glass might save your next phone from disaster Ryan Whitwam | usago...

This Ryzen 7 mini PC with 32GB RAM is a steal for $300 | usagoldmines.com

Office is too slow, so Microsoft is making it load at Windows startup | usagoldmines.com

Amazon Spring Sale 2025: Best deals on laptops, USB drives, SSDs, and more | usagoldmines.com

Aston Martin’s new home racing simulator is peak luxury for gamers | usagoldmines.com

R-Drive Image 7.3 review: A backup favorite gets even better | usagoldmines.com

This smart bird feeder with built-in 1080p camera is now 37% off | usagoldmines.com

Google Pixel 9a Arrives April 10 in the US Kellen | usagoldmines.com

Best Apple Deals of the Week: AirPods, iPad, and More in Amazon's Big Spring Sale, Plus Save on Sams...

New Windows 11 roadmap will tell you exactly when to expect Microsoft’s next annoying feature | usa...

Hey listen! The live-action Legend of Zelda movie just got a 2027 release date confirmed by Sony and...

Quordle hints and answers for Saturday, March 29 (game #1160) | usagoldmines.com

NYT Strands hints and answers for Saturday, March 29 (game #391) | usagoldmines.com

NYT Connections hints and answers for Saturday, March 29 (game #657) | usagoldmines.com

5 things I learned when I tested the LG C5 OLED TV, from embracing AI to troublesome reflections jam...

Mullvad VPN brings Multihop to Android – promising to make online tracking even harder chiara.castro...

Data-driven medicine is the key to unlocking the future of the NHS | usagoldmines.com

This new phishing campaign can tailor its messages to target you with your favorite businesses | us...

Digital transformation without cybersecurity is a risk that public sector can’t afford | usagoldmin...

Gran Turismo 7 expands its use of AI/ML-trained NPCs with good effect Jonathan M. Gitlin | usagoldmi...

Nintendo hints at enhanced “Switch 2 Edition games” for new console Kyle Orland | usagoldmines.com

Best PCIe 4.0 SSDs 2025: Top picks from experts | usagoldmines.com

A 25-year-old PC pinball game is my new meditation app | usagoldmines.com

Samsung’s high-speed 256GB flash drive hits its lowest deal price | usagoldmines.com

This Action Camera With Accessories Is Now Under $200 Pradershika Sharma | usagoldmines.com

Google's First-Gen Pixel Watch Is at Its Lowest Price Stephen Johnson | usagoldmines.com

Apple TV+ 'Friday Night Baseball' Returns With New Documentary Series Tim Hardwick | usagoldmines.co...

IKEA's new smart home button with Matter support just leaked –and it looks like my next impulse buy ...

Samsung's new AI smart fridge could stop you from accidentally wasting food, and I've seen it in act...

Thousands of websites have now been hijacked by this devious, and growing, malicious scheme | usago...

Live: Garmin Connect+ backlash – tell us what you think about Garmin's new Premium tier matt.evans@f...

I’m a gaming mouse expert: Here’s why I carefully select my mouse mat | usagoldmines.com

Grab Acer’s RTX-powered OLED gaming laptop for $550 off right now | usagoldmines.com

Microsoft is streamlining logins for Windows, Xbox, and M365 | usagoldmines.com

This Subscription-Free, Solar-Powered 4K Security Camera Kit Is at Its Lowest Price Pradershika Shar...

VPN services may soon become a new target of EU lawmakers after being deemed a "key challenge" chiar...

There’s suddenly tons of Nvidia RTX 5090 GPU stock on the shelves of one US retailer – probably beca...

Black Ops 6 Season 3 release date and time in your timezone | usagoldmines.com

EU will go easy with Apple, Facebook punishment to avoid Trump’s wrath Barbara Moens and Henry Foy, ...

Tel‘Aran’Rhiod at last—the Wheel of Time reveals the world of dreams Andrew Cunningham & Lee Hut...

All-Glass Apple Watch – A First Step Toward Jony Ive's Dream iPhone? Tim Hardwick | usagoldmines.com

‘Our GPUs are melting’ – OpenAI puts limits on image creation and delays rollout to free accounts |...

Fed up streaming songs that all sound the same? Qobuz brings you legendary labels to level up your l...

Leave a Reply