By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    McDonald’s Delaware Court Decision Will Change CCO World Forever
    21 February 2023
    Health Equity: Board Directors’ Most Important ESG Measure
    7 May 2023
    News Roundup: 75% of US Companies Mention Climate Risk in 10-Ks
    15 June 2024
    Latest News
    US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors
    13 December 2025
    Top 10 Risk & Compliance Trends for 2026
    7 December 2025
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Scandinavian Airlines website hit by cyber attack, customer details exposed
    21 February 2023
    Planet Ice hacked! 240,000 skating fans’ details stolen
    22 February 2023
    North Korea’s APT37 Targeting Southern Counterpart with New M2RAT Malware
    23 February 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Best Amazon deal: Spend $40, save $10 on makeup, skincare, vitamins, and more
    22 February 2023
    PlayStation’s State of Play Livestream Coming Thursday: How to Watch, Start Time
    23 February 2023
    Meet the couple that built an EV rock crawler for King of the Hammers
    24 February 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Missing Chinese banker was working to set up Singapore family office
    22 February 2023
    European countries step up delivery of tanks to Ukraine
    23 February 2023
    Borealis Foods to Go Public via Merger with Oxus Acquisition Corp
    24 February 2023
    Latest News
    Blue Owl Technology Finance stock initiated with Buy rating by B.Riley
    16 December 2025
    Client Challenge
    15 December 2025
    At least 2 killed and 8 injured hurt in shooting at Brown University with suspect still at large
    14 December 2025
    Thailand vows to keep fighting Cambodia, despite Trump's ceasefire claim
    13 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Cybersecurity Venture Capital Report, Week Of Feb. 27, 2023. WCYB Digital Radio.
    27 February 2023
    Stream episode CISO Show. Security Awareness Training Market. Sponsored by KnowBe4. by Cybercrime Magazine podcast
    7 March 2023
    Cybercrime News For Mar. 16, 2023. Cyberattack On UK’s Wymondham College. WCYB Digital Radio.
    16 March 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: What’s Wrong with Manufacturing?
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Cyber Security > What’s Wrong with Manufacturing?
Cyber Security

What’s Wrong with Manufacturing?

webmaster
Last updated: 2023/03/16 at 9:36 AM
webmaster
Share
11 Min Read
SHARE

In last year’s edition of the Security Navigator we noted that the Manufacturing Industry appeared to be totally over-represented in our dataset of Cyber Extortion victims. Neither the number of businesses nor their average revenue particularly stood out to explain this.

Manufacturing was also the most represented Industry in our CyberSOC dataset – contributing more Incidents than any other sector.

We found this trend confirmed in 2023 – so much in fact that we decided to take a closer look. So let’s examine some possible explanations.

And debunk them.

Hunting for possible explanations

Manufacturing is still the most impacted industry in our Cyber Extortion dataset in 2023, as tracked by monitoring double-extortion leak sites. Indeed, this sector now represents more than 20% of all victims since we started observing the leak sites in the beginning of 2020.

Cybersecurity for Manufacturing Industry

Approximately 28% of all our clients are from Manufacturing, contributing with an overall share of 31% of all potential incidents we investigated.

We note that 58% of the Incidents this industry deals with are internally caused, 32% were externally caused, 1% was classified as “Partner” or 3rd parties. When external threat actors had caused the security incident, we observed the top 3 threat actions were Web Attacks, Port Scanning and Phishing.

On the other hand, Manufacturing has the lowest apparent number of confirmed security vulnerabilities per IT Asset in our Vulnerability scanning dataset. Our pentesting teams on the other hand report 4.81 CVSS findings per day, which is quite a bit above the average of 3.61 across all other industries.

Several questions present themselves, which we will attempt to examine here:

  1. What part does Operation Technology play?
  2. Are businesses in Manufacturing more vulnerable?
  3. Is the Manufacturing sector being deliberately targeted more?
  4. Do our Manufacturing clients experience more incidents?

What part does OT play?

A tempting assumption to make is that businesses in the Manufacturing sector are compromised more often via notoriously insecure Operational Technology (OT) or Internet of Things (IoT) systems. Plants and factories can often not afford to be disrupted or shut down and that Manufacturing is therefore a soft target for extortionists.

It sure sounds plausible. The catch is: we don’t see these theories supported in our data.

The attack against US Energy giant Colonial Pipeline was probably the most notable recent example of a successful attack against an industrial facility.

Discover the latest in cybersecurity with comprehensive “Security Navigator 2023” report. This research-driven report is based on 100% first-hand information from 17 global SOCs and 13 CyberSOCs of Orange Cyberdefense, the CERT, Epidemiology Labs and World Watch and provides a wealth of valuable information and insights into the current and future threat landscape.

In July this year US intelligence agencies even warned of a hacking toolset dubbed ‘Pipedream’ that is designed target specific Industrial Control Systems. But it is not clear to us if or when these tools have ever been encountered in the wild. Apart from the infamous Stuxnet attack from 2010, one struggles to recall a single cyber security incident where the entry point was an OT system.

At Colonial Pipeline the backend ‘conventional’ administrative systems were compromised first. Looking more closely, this is the case for almost all reported incidents at industrial facilities.

Are businesses in the Manufacturing sector more vulnerable to attacks?

To answer this questions we examined a set of 3 million vulnerability scan findings, and a sample of 1,400 Ethical Hacking reports.

We derived three metrics that facilitate somewhat normalized comparisons across the industries in our client base:

VOC scanning findings per asset, time to patch, Pentest findings per day of testing.

If we rank industries for their performance on each of those metrics and sort from worst to best, then our clients in the Manufacturing sector arrives in 5th place out of 12 comparable industries.

The chart below shows the overall *ranking* of our Manufacturing clients out of comparable industries.

Cybersecurity for Manufacturing Industry

VOC unique findings/asset

On this metric there were seven other industries that performed better than Manufacturing.

While we have a comparatively high number of assets from Manufacturing clients in our scanning dataset, we report far fewer Findings per Asset than the average across all industries. Almost 10 times fewer, in fact.

Time to patch

On this metric 6 other industries ranked better than Manufacturing. The average age of all findings for this industry is 419 days, which is a concerning number and worse than recorded for eight other industries in this dataset.

Pentesting findings

We observe that the average CVSS Per Day was 4.81, compared to 3.61 on average for clients in all other sectors in the dataset – 33% higher.

Is the Manufacturing sector being targeted more by extortionists?

We use the North American Industry Classification System – NAICS – classification system when categorizing our clients.

A consideration of double-extortion victim counts per industry reveals a very interesting pattern: Of the 10 industries with the most recorded victims in the dataset, 7 are also counted amongst the biggest industries by entity count.

Manufacturing however, is a clear trend-breaker.

Another factor raises questions: if businesses in the Manufacturing sector were more willing to pay ransom that would make them more attractive as victims. But then we would expect to see such businesses featuring on the ‘name and shame’ leak site less often, not more.

Cybersecurity for Manufacturing Industry

Do our Manufacturing clients experience more incidents?

The Manufacturing industry once again generated the highest number of Incidents as a percentage of the total in our CyberSOC dataset. 31% of all Incidents are generated for the 28% of our clients that are from this sector.

The Incident data lacks context, however. To establish a baseline for comparison, we assign customers a ‘Coverage Score’ between 0 and 5 in 8 different ‘domains’ of Threat Detection, accounting for a maximum total detection score of 40.

We use the coverage score to normalize the incident count. Put simply, the lower a client’s assessed coverage score is, the more this adjustment will ‘boost’ the number of Incidents in this comparison. The logic is that a low amount of coverage will just not show us a lot of incidents, though they very likely occurr.

If we adjust the True Positive and False Positive Incidents as described above, we still see more than seven times as many Incidents per clients from Manufacturing than the average for all industries.

In a similar comparison, limited only to Perimeter Security, and only Medium Sized business, Manufacturing ranks 1st with the most Incidents per Customer out of 7 comparable Industries.

Conclusion

We ruled out a massive impact of OT security vulnerabilities, and therefore focus on regular IT systems. Our scanning teams assessed a large number of targets but reported relatively few vulnerabilities per asset. Overall, we rank the Manufacturing sector as 5th or 6th weakest of all industries from a vulnerability point of view.

The question of why we consistently record such a high proportion of victims from the Manufacturing industry is not readily answered with the data we have. We believe that in the end it still comes down to the level of vulnerability, best reflected in our Penetration Testing, and Findings Age data.

All of our data points to the fact that attackers are mostly opportunistic. Rather than deliberately singling industries out, they simply compromise businesses that are vulnerable.

The customers represented in our datasets have engaged with us for Vulnerability Assessment or Managed Detection, and therefore represent relatively ‘mature’ examples of that industry. We can deduce that average businesses in this sector would benchmark worse in terms of vulnerabilities. Whether the high number of victims we observe on attacker leak-sites is a direct reflection of the high number of overall victims in this sector, or the skewed reflection of an industry that refuses to concede to initial ransom demands, is not entirely clear.

What does appear likely, however, is that vulnerability is the primary factor that determines which businesses get compromised and extorted – in this sector as much as any other.

This is just an excerpt of the analysis. More details on how different Industries performed in comparison to others, as well as more CyberSOC, Pentesting and VOC data (along with plenty of other interesting research topics) can be found in the Security Navigator. It’s free of charge, so have a look. It’s worth it!

Note: This article has been written and contributed by Charl van der Walt, Head of Security Research at Orange Cyberdefense.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Contents
Hunting for possible explanationsWhat part does OT play?Are businesses in the Manufacturing sector more vulnerable to attacks?VOC scanning findings per asset, time to patch, Pentest findings per day of testing.VOC unique findings/assetTime to patchPentesting findingsIs the Manufacturing sector being targeted more by extortionists?Do our Manufacturing clients experience more incidents?Conclusion

You Might Also Like

North Korean Hackers Target Developers with Malicious npm Packages

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit

Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Multiple Hacker Groups Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency
Next Article Robot vacuum deals: Save on iRobot, Samsung, and Shark this week
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

Evaluating AI’s ability to perform scientific research tasks
Application Security ARTIFICIAL INTELLIGENCE (AI) CHECKMARKX Innovation VERACODE 16 December 2025
Fair Credit Reporting Act Updates
CHECKMARKX 16 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
Switzerland to tighten rules on military service for dual nationals
SWITZERLAND 16 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?