SHARE
Facebook X Pinterest WhatsApp

Industrial Automation Threats Decline Slightly in Q2 2025, but Risks Remain

ICS malware infections fell in Q2 2025, but phishing and evolving threats keep OT environments at risk.

Sep 23, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The latest report from Kaspersky’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) reveals both encouraging and concerning trends in the cyber threat landscape for industrial automation systems in Q2 2025. 

Overall, 20.5% of ICS computers faced blocked malicious objects during the quarter, a 1.4 percentage point (pp) drop from Q1 2025 and a 3.0 pp decrease compared to Q2 2024.

While the decline indicates progress in reducing exposures, regional disparities and evolving attack techniques highlight ongoing risks for operational technology (OT) environments.

Globally, the percentage of ICS computers encountering blocked threats ranged from 11.2% in Northern Europe to 27.8% in Africa. 

Most regions experienced declines in infection attempts compared to the previous quarter, with the exceptions of Australia, New Zealand, and Northern Europe, where rates increased. This geographic variation underscores differences in infrastructure maturity, patch adoption, and attacker focus.

Industry-Specific Findings

Across all surveyed industries, the percentage of ICS computers with blocked malicious objects declined in Q2 2025. However, the biometrics sector led all industries in exposure rates, reflecting the high-value nature of identity and authentication systems. 

Despite overall declines, the breadth of malicious activity remains significant: Kaspersky blocked malware from 10,408 different families across OT networks during the quarter.

Threat Sources and Infection Vectors

Internet-based threats remain the most common vector for OT environments, including compromised websites, malicious downloads, and poisoned cloud services. 

In Q2 2025, 5.91% of ICS computers were blocked from accessing deny listed internet resources, an increase tied to malicious code hosted on popular file-sharing platforms. Malicious documents also rose slightly, detected on 1.97% of systems.

Email-borne threats continue to grow in prominence. Phishing messages carrying malicious attachments, spyware, and scripts accounted for an increasing share of ICS compromises, with rates rising in all regions except Russia. Meanwhile, threats originating from removable storage and network folders continued to decline, reaching their lowest global levels since Q2 2022.

Malware Categories

Multi-stage attacks remain the norm, with initial infection tools paving the way for spyware, ransomware, and cryptominers. Although percentages fell across all categories, the risks are notable:

  • Spyware was blocked on 3.84% of ICS computers (down 0.36 pp).
  • Ransomware appeared on 0.14% of systems (down 0.02 pp).
  • Executable miners were detected on 0.63% of systems (down 0.15 pp).
  • Web miners dropped sharply to 0.30%, their lowest rate since Q2 2022.

Self-propagating malware such as worms and viruses also declined, blocked on just over 1% of ICS systems. AutoCAD-targeting malware, often used to steal or corrupt industrial design files, dropped to 0.29%, the lowest figure recorded since Q2 2022.

The Bigger Picture

While the decline in overall infection rates suggests progress in defense, the diversity of threats—spanning thousands of malware families—demonstrates the persistence and adaptability of attackers. 

ICS and OT environments remain attractive because they underpin critical infrastructure, manufacturing, energy, and industrial operations worldwide. The rise in email-borne attacks also shows that attackers continue to shift toward social engineering and phishing to bypass other technical defenses.

Moreover, the Shai-Hulud worm incident in September 2025, affecting npm packages, highlights how quickly wormable malware can spread through ecosystems when authentication and publishing controls are weak. For industrial systems, where patching and downtime are difficult, the stakes are even higher.

Mitigation Strategies

Defenders in industrial organizations should consider several actions:

  • Adopt phishing-resistant email protections such as sandboxing, advanced attachment scanning, and domain authentication (DMARC, SPF, DKIM).
  • Limit internet exposure of ICS assets and enforce strict network segmentation between OT and IT environments.
  • Deploy removable media controls and continuously scan for malware families associated with worms and infostealers.
  • Strengthen monitoring and visibility using behavioral detection, threat intelligence feeds, and anomaly detection tuned for ICS environments.
  • Adopt secure defaults for authentication including multifactor authentication (MFA) for remote management interfaces.

The Q2 2025 ICS CERT findings highlight a paradox: overall infection rates are down, yet attackers remain relentless in innovating through email, malicious documents, and social engineering. 

For critical infrastructure operators, this means vigilance cannot wane. Proactive defense strategies—focused on phishing resilience, internet isolation, and advanced monitoring—are essential to protecting the OT systems that power modern industry.

Recommended for you...

Ransomware’s Favorite Door? Phishing Attacks
Ken Underhill
Sep 23, 2025
Wormable Malware Triggers GitHub’s Push for Stronger npm Security
MalTerminal Malware Turns GPT-4 Into a Ransomware Factory
Ken Underhill
Sep 22, 2025
FBI Warns of Spoofed IC3 Websites Harvesting Victim Data
Ken Underhill
Sep 22, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.