Skip to main content
Industries
Industrial Cybersecurity in the
Manufacturing
Industry
http://dragos%20illustration%20representing%20manufacturing

Manufacturing accounted for 65% of all ransomware attacks in 2021.

With the advent of Industry 4.0 and a steady increase in digital transformation initiatives to improve operations, manufacturers simultaneously need to invest in cybersecurity to mitigate risk. Dragos’s unique approach analyzes the entire spectrum of manufacturing production inputs from support systems, quality control systems, material handling technologies, and automation/control technologies.
an icon depicting cybersecurity. The green gradient icon has a square with a padlock in the middle and multiple arms

Visualize, Detect, and Respond to Threats Against Your Manufacturing Operations

Robots on an automobile manufacturing line
Deep Packet icon

Rest easy knowing your operational infrastructure is in good hands.

The Dragos Platform utilizes deep packet inspection to give operators a complete picture of all connected OT equipment and network communications, from vendors like Rockwell Automation, Siemens, and Emerson. Your team will immediately benefit from in-depth visibility of assets and threats in your environment, along with playbooks to guide analysts step-by-step as they investigate potential incidents.

EXPLORE THE DRAGOS PLATFORM
threat-analytics

Stay ahead of evolving threats.

The manufacturing sector has always been inherently global in nature, with supply chains spanning the world. This expanded attack surface makes it increasingly subject to the challenges of cyber risk, such as theft of intellectual property or disruption of production due to ransomware. Our world-class Threat Intelligence team distills adversary behaviors, tactics, techniques, and procedures into regular reports, so you can stay one step ahead of threats they pose to your operations.

MANUFACTURING THREAT REPORT
Manage icon

Prevent Significant Breaches with Proactive Defenses.

Dragos’ professional cybersecurity services helps security and operations teams prepare for and respond to significant threats, no matter where you’re at in your journey. Our team will work with your staff on assessments, threat hunting, penetration testing, tabletop exercises, incident response, and training — either on-site or remotely.

PROFESSIONAL SERVICES

Known Activity Groups Targeting Manufacturing Operations

The manufacturing sector is a prime target for adversaries seeking to exploit industrial control systems environments. An attack can happen at any point across the major stages of operations. To help protect your infrastructure, Dragos tracks three activity groups specifically targeting manufacturing organizations and will continue to update this list as more information becomes available.

a token from CHERNOVITE has the capability to disrupt, degrade, and potentially destroy industrial environments and physical processes in industrial environments.
CHERNOVITE
since 2021
CHERNOVITE has the capability to disrupt, degrade, and potentially destroy industrial environments and physical processes in industrial environments.
ERYTHRITE adversary group trading card from Dragos
ERYTHRITE
since 2020
ERYTHRITE is an activity group that broadly targets organizations in the U.S. and Canada with ongoing, iterative malware campaigns.
adversary group PETROVITE trading card from Dragos
PETROVITE
since 2019
PETROVITE demonstrates Stage 1 of the ICS Kill Chain capabilities and targets mining and energy operations in Kazakhstan.
Vanadinite adversary group trading card from Dragos
VANADINITE
since 2019
IT compromise and information gathering
KAMACITE
KAMACITE
since 2014
Known to facilitate operations leading to disruptive ICS attack
Xenotime logo
XENOTIME
since 2014
Focused on physical destruction and long-term persistence
Covellite Icon
COVELLITE
since 2017
IT compromise with hardened anti-analysis malware against industrial orgs
Magnallium logo
MAGNALLIUM
since 2017
IT network limited, information gathering against industrial orgs
Parisite logo
PARISITE
since 2017
VPN compromise of IT networks to conduct reconnaissance
wassonite logo
WASSONITE
since 2018
IT compromise and information gathering
Chrysene logo
CHRYSENE
since 2017
IT compromise, information gathering and recon against industrial orgs

Cyber threats don't wait _

Join us on the frontlines with the latest webinars and events.

Events
H-ISAC Fall Americas Summit

12.06.22 – 12.08.22

Webinars
Crown Jewels Analysis for Industrial Control Systems

12.08.22

SANS ICS Consequence-Driven Incident Response Solutions Forum

12.09.22 – 01.01.70