ICS industrial control system

Malicious scripts attacking ICS computers rising

During the second half of 2021, almost 40% of all industrial control systems’ (ICS) computers were attacked by malicious software at least once.

Even though the overall number of attacks has seen a slight decrease when compared to the first half of 2021, the ICS threat landscape in the second half of the year has become highly diversified, with the percentage of ICS computers on which miners were blocked growing by 0.5 percentage points, spyware up 0.7 percentage points and malicious scripts increasingly growing at 1.4 times the rate seen at the beginning of 2020.

According to the Kaspersky ICS CERT, the percentage of ICS computers on which malicious objects were blocked in 2021 increased by 1 percentage point from 2020, rising from 38.6% to 39.6%. However, if the situation is examined by each six-month period, the landscape looks better, with H2 2021, seeing this figure drop by 1.4 percentage points for the first time in one and a half years.

Kaspersky detects decline in mobile malware attacks in 2021
PH ranks 4th in countries most targeted by web threats — Kaspersky

“Industrial control systems possess sensitive data and are responsible for the functioning of the most important sectors,” said Kirill Kruglov, security expert at Kaspersky. “A low-risk attack for IT infrastructure can still be a significant threat to operational technology (OT). While overall, the threat types that find their way to ICS computers have remained relatively the same, we have seen a constant increase in the share of ICS computers facing malicious scripts and phishing pages, along with Trojans, spyware, and miners which would be normally delivered by the malicious scripts.”


Overall, Kaspersky security solutions blocked over 20,000 malware variants during the second half of 2021. Although this figure did not change much compared to the previous six months, a detailed analysis of detected malware shows that the proportion of ICS computers attacked with spyware, malicious scripts, and miners grew.

Malicious scripts are rising steadily year over year. In H2 2021, the percentage of ICS computers attacked by them increased by 1.4 times from the beginning of 2020 and was up by 0.5 percentage points compared to the previous half of 2021. Cybercriminals use malicious scripts to achieve various goals ranging from data collection to loading other malware, such as spyware or cryptocurrency miners.

As threat actors use scripts more and more, they are also increasingly using spyware and cryptocurrency miners. The former is mostly used to steal victims’ credentials or money and the percentage of ICS computers attacked with spyware is up by 1.4 percentage points since H1 2020. Spyware continues to grow and is up in use for the third six-month period in a row. The share of ICS computers attacked by miners has more than doubled since H1 2020.

“Crypto miners are generally overlooked as a significant threat, which is not a good approach. While the influence of miners on the office network may be insignificant, in the course of their work and distribution, they can lead to the denial of service for some components of the automated control system,” said Kruglov.

To keep your ICS computers protected from various threats, Kaspersky experts recommend:

  • Regularly updating operating systems and applications software that are part of the enterprise’s industrial network. Apply security fixes and patches to ICS network equipment as soon as they are available.
  • Conducting regular security assessments of OT systems to identify and eliminate possible vulnerabilities.
  • Dedicated ICS security training for IT security teams and OT engineers. This is crucial to improving the response to new and advanced malicious techniques.
  • Make sure you protect industrial endpoints as well as corporate ones. Kaspersky Industrial CyberSecurity solution includes dedicated protection for endpoints and network monitoring to reveal any suspicious and potentially malicious activity in industrial networks.