Cybersecurity Agency: Increased Attacks Targeting EU’s Operational Technology

Published:

spot_img

ENISA’s 2025 Threat Landscape Report: A Deep Dive into Cybersecurity Challenges

The European Union Agency for Cybersecurity (ENISA) has released its 2025 Threat Landscape report, revealing alarming trends in cyberattacks directed at operational technology (OT) systems in Europe. This comprehensive analysis is crucial for understanding the evolving threat landscape and enhancing defenses across various sectors.

Overview of Cyber Incidents

The report aggregates data from nearly 4,900 cybersecurity incidents documented between July 2024 and June 2025. This collection includes both publicly reported incidents and attacks conveyed to ENISA from EU member states and participants in its information-sharing initiatives. Such extensive research provides valuable insights into the types of threats organizations face.

Key Findings on Threat Targets

While ENISA’s report spans a wide array of cyber threats, it highlights that 18.2% of these incidents were specifically aimed at operational technology. This figure positions OT behind mobile threats, which comprised 42% of attacks, and web threats at 27%. The increasing percentage of attacks on OT systems underscores the vulnerabilities present within industrial and critical infrastructure.

ENISA pointed out that the rising number of OT threats reflects a concerning trend as industrial systems become more interconnected and thus more susceptible to compromise.

Motivations Behind OT Attacks

Many attacks targeting industrial control systems (ICS) are attributed to hacktivist groups. However, these groups are often state-sponsored, complicating the landscape of cyber threats. One notable example is the pro-Russian hacker group NoName057(16), recognized for its distributed denial-of-service (DDoS) attacks against European nations. ENISA indicates that NoName057(16) is a member of the more extensive Z-Pentest Alliance, which has been operational since October 2023 and is known for its specific focus on ICS and OT systems.

Z-Pentest Alliance: A State-Sponsored Threat

According to a report from Orange Cyberdefense, Z-Pentest Alliance has a distinct aim of undermining industrial and control systems in Western countries. By exploiting technological weaknesses, this group seeks to bolster Russia’s geopolitical stance. ENISA has observed that members of Z-Pentest have increasingly targeted OT systems in Italy, particularly since late 2024, illustrating a worrying trend.

Emerging Groups and Their Activities

Another pro-Russia group highlighted by ENISA is Rippersec, which has gained momentum in its operations against EU member states. This organization’s attacks seemingly focus on public administration and the media/entertainment sectors, with a specific interest in compromising operational technology systems.

Infrastructure Destruction Squad (IDS)

The report also draws attention to the Infrastructure Destruction Squad (IDS), which emerged in June 2025. IDS is associated with developing malicious software tailored to ICS, notably a malware dubbed VoltRuptor. This malware features advanced persistence and anti-forensic capabilities, reportedly available for purchase on the dark web.

ENISA documented an IDS strike on an Italian smart building automation firm, expanding the narrative of cyber threats to include industrial facilities in Ukraine, Romania, and the United States. "As this threat is too recent to assess fully, the leveraging of the IDS identity by a Russia-aligned intrusion set is a plausible scenario," the report maintains.

Implications for Cybersecurity

The findings outlined in ENISA’s 2025 Threat Landscape report present significant implications for cybersecurity across Europe. With the increasing sophistication of cyber threats—especially targeting operational technology—organizations must prioritize robust defenses and remain vigilant against evolving tactics employed by threat actors.

This report serves as an essential resource for cybersecurity professionals and lays the groundwork for future enhancements in security protocols. The full 2025 Threat Landscape report is accessible as a PDF on ENISA’s website, providing in-depth analysis and data for those looking to better understand the current landscape of cyber threats.

For further guidance, recent publications such as NIST’s guide on protecting ICS against USB-borne threats and new recommendations for OT operators to maintain continuously updated system inventories may be beneficial.

spot_img

Related articles

Recent articles

Leaked iPhone Hacking Tool Hits Dark Web: Government Resource in the Hands of Cyber Criminals

Cybersecurity Alert: Hacking Toolkit Coruna Falls into Criminal Hands In a troubling development, security researchers have revealed that a sophisticated hacking toolkit, initially linked to...

149 DDoS Attacks Target 110 Organizations Across 16 Countries in Wake of Middle East Conflict

Surge in Hacktivist Activity Amid U.S.-Israel Military Actions Recent developments in cybersecurity have raised alarms among experts regarding a notable uptick in hacktivist operations. This...

Ajman Ruler Enacts Law for Managing Lost and Abandoned Property

New Law on Lost and Abandoned Property in Ajman Introduction of Law No. (2) of 2026 His Highness Sheikh Humaid bin Rashid Al Nuaimi, the Ruler...

Mobile Banking Evolution: Access Your CIBIL Score Instantly

New Delhi | The digital banking landscape in India is evolving at an astonishing pace, significantly altering how customers interact with their financial institutions....