{"id":104335,"date":"2025-02-06T00:01:17","date_gmt":"2025-02-06T08:01:17","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=104335"},"modified":"2025-02-05T13:17:41","modified_gmt":"2025-02-05T21:17:41","slug":"since-stuxnet-a-brief-history-of-critical-infrastructure-attacks","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/","title":{"rendered":"Since Stuxnet: A Brief History of Critical Infrastructure Attacks"},"content":{"rendered":"<p>This year will mark the 15<sup>th<\/sup> anniversary of Stuxnet \u2014 the single event which made the world pay attention to operational technology and <a href=\"\/glossary\/ics-security\/\">industrial control system security<\/a> (OT\/ICS).<\/p>\n<p>In our recent annual <a href=\"\/research-labs\/2024-threat-roundup\/\">threat report roundup<\/a> , we show how the number of cyberattacks and threat actors targeting critical infrastructure (CI) has increased, especially since 2022 where there has been a 668% increase in CI incidents over the last three years.<\/p>\n<p>Here, we discuss the changes in how CI and OT\/ICS have been attacked since Stuxnet.<\/p>\n<h2>The Threat to Critical Infrastructure<\/h2>\n<p>CI, including OT\/ICS devices used to control its physical processes, has been the target of cyberattacks for at least 15 years. It\u2019s technically even longer if you consider pre-Stuxnet events, namely <a href=\"https:\/\/www.osti.gov\/biblio\/1505628\" target=\"_blank\" rel=\"noopener\">Maroochy Water<\/a>.<\/p>\n<p>However, the increasing integration of digital systems within industrial environments has made OT\/ICS more prone to cyberattacks in the past few years by exposing vulnerabilities and providing threat actors with new ways to target their victims.<\/p>\n<p>Cyber attacks specifically targeting OT\/ICS disruption can cause physical damage to critical infrastructure like manufacturing plants, energy grids, and water treatment facilities. These attacks sometimes rely on malware specifically designed to infiltrate, manipulate, or disable the industrial systems that control the processes in critical infrastructure.<\/p>\n<p>However, these targeted complex attacks with sophisticated state-sponsored malware, such as Stuxnet and Industroyer, are only part of the story. Today, there are many attacks to CI beyond state-sponsored digital weapons.<\/p>\n<p>The figure below summarizes a timeline of relevant attacks or events in the past 15 years and how they represent changes in the CI cybersecurity landscape, which we discuss below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-104340\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/ICS-malware-history-1-1024x155.webp\" alt=\"\" width=\"1024\" height=\"155\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/ICS-malware-history-1-1024x155.webp 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/ICS-malware-history-1-300x45.webp 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/ICS-malware-history-1-768x116.webp 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/ICS-malware-history-1-1536x233.webp 1536w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/ICS-malware-history-1-2048x310.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2>State-Sponsored Attacks with OT Malware<\/h2>\n<p>Initially, cyberattacks targeting CI were conducted by state-sponsored actors as part of espionage or sabotage campaigns. Malware was specifically designed to infiltrate a certain facility and tamper with its regular operations. Three events stand out in this period.<\/p>\n<h3>Stuxnet (2010)<\/h3>\n<p>The first globally publicized malware targeting OT\/ICS was Stuxnet. It highlighted the dangers of a new era where cyberattacks could inflict damage to physical infrastructure and not just data. The development of Stuxnet is thought to have begun in 2005 by Israeli and American intelligence with the aim of slowing down the Iranian nuclear program.<\/p>\n<p>The specific targets were Siemens PLCs controlling uranium enrichment centrifuges at the Natanz facility in Iran. The initial access method was an infected USB drive, since the target network was air-gapped. The malware was designed to make the centrifuges spin irregularly, while still informing engineers that everything was operating as usual.<\/p>\n<h3>Industroyer (2016)<\/h3>\n<p>Industroyer was deemed the biggest threat to OT\/ICS since Stuxnet because it was the first malware to target civilian infrastructure. The malware caused a blackout in Ukraine by leveraging the OT protocol IEC-104 to take control of circuit breaker switches and protection relays at a power substation. The attack was attributed to Russia\u2019s Sandworm APT.<\/p>\n<p>There was a follow-up version called Industroyer2 also attributed to Sandworm in 2022 that was caught before causing the same level of disruption.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-104341 size-full\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Industroyer-malware-process-flow-1-scaled.webp\" alt=\"\" width=\"2560\" height=\"1780\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Industroyer-malware-process-flow-1-scaled.webp 2560w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Industroyer-malware-process-flow-1-300x209.webp 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Industroyer-malware-process-flow-1-1024x712.webp 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Industroyer-malware-process-flow-1-768x534.webp 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Industroyer-malware-process-flow-1-1536x1068.webp 1536w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Industroyer-malware-process-flow-1-2048x1424.webp 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><br \/>\n<em><small>Figure 1 &#8211; Industroyer2 execution workflow (from our <a href=\"\/resources\/industroyer2-and-incontroller-report\/\">analysis done in 2022<\/a>)<\/small><\/em>\n<h3>Triton (2017)<\/h3>\n<p>Triton was the first malware designed to target safety instrumented systems (SIS), which ensure the safety of industrial processes, potentially risking human lives. Triton specifically targeted Schneider Electric\u2019s Triconex SIS controllers used at a Saudi petrochemical plant. By compromising the SIS, Triton could disable safety features and potentially lead to explosions or toxic releases. The attack was also attributed to Russia, more specifically a group in their Central Scientific Research Institute of Chemistry and Mechanics.<\/p>\n<h2>The Rise of Ransomware and Cybercrime (since 2017)<\/h2>\n<p>As shown in our latest threat roundup report , cybercriminals are the most common threat actors in most critical infrastructure sectors today.<\/p>\n<p>Different from most state-sponsored actors, cybercriminals are after money. One of the most lucrative ways to earn money from cyber attacks is via ransomware-enabled extortion.<\/p>\n<p>Ransomware has been around since 1989. The <a href=\"https:\/\/sites.temple.edu\/care\/cira\/\" target=\"_blank\" rel=\"noopener\">Critical Infrastructure Ransomware Attacks<\/a> database which is maintained by researchers at Temple University lists close to <strong>two thousand ransomware incidents in CI since 2013<\/strong>. However, two moments were very memorable in the rise of ransomware targeting CI.<\/p>\n<h3>WannaCry (2017)<\/h3>\n<p>WannaCry emerged in 2017 and is thought to have affected over 200,000 devices in more than 150 countries, including victims like Honda, Nissan, FedEx and the UK\u2019s NHS, impacting organizations involved in manufacturing, transportation, healthcare and many other CI sectors. The malware was attributed to the North Korean threat actor Lazarus, which is supposedly run by the North Korean government.<\/p>\n<p>WannaCry exploited the EternalBlue Windows vulnerability, which allowed it to spread without user intervention. The ransomware infected computers, encrypted files and demanded a ransom in Bitcoin for files to be decrypted.<\/p>\n<p>This was the first time that many people had contact with the ransomware threat that would became so widespread in the following decade. The WannaCry ransom note became an easily recognizable sign of this type of extortion.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-104342\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/WannaCry-decryptor-screenshot.webp\" alt=\"\" width=\"408\" height=\"308\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/WannaCry-decryptor-screenshot.webp 408w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/WannaCry-decryptor-screenshot-300x226.webp 300w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/><br \/>\n<em><small>Figure 2 \u2013 WannaCry ransom note (from <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\" target=\"_blank\" rel=\"noopener\">Wikipedia<\/a>)<\/small><\/em>\n<h3>Data Exfiltration and the RaaS Model (2019-2021)<\/h3>\n<p>Between 2019 and 2020, ransomware attacks <a href=\"https:\/\/www.pbs.org\/newshour\/nation\/why-ransomware-attacks-are-on-the-rise-and-what-can-be-done-to-stop-them\" target=\"_blank\" rel=\"noopener\">increased by 62% globally and by 158% in North America<\/a>. This explosive growth continued during and after the COVID-19 pandemic fueled by increased remote work. Two major innovations in ransomware operations at the time ensured that these attacks became hugely profitable and were partly responsible for this spike in activity.<\/p>\n<h4>1. Ransomware-as-a-Service (RaaS)<\/h4>\n<p>The creation of the RaaS model was pivotal. Ransomware developers lease their creations via affiliate programs to operators who breach organizations, deploy the malware, and share the profits with the original developers. This provided massive scale to cybercriminal operations, which was later increased by further division of labor including initial access brokers and other specialized actors.<\/p>\n<h4>2. New Extortion Methods with Public Pressure Points<\/h4>\n<p>Innovations in extortion methods, such as exfiltrating data before encrypting, publishing it on leak sites, and publicly shaming victims, changed the game. These methods increased the probability that a ransom would be paid and incentivized criminals to go after very large organizations. This was the time when names like Cl0p, Conti, DarkSide, LockBit, Maze and REvil \u2013 some now long gone \u2013 became infamous due to the millions of dollars they extorted from their victims.<\/p>\n<p>Remember the attacks on <a href=\"\/blog\/it-ot-cybersecurity-orchestration\/\">Colonial pipeline<\/a>? On May 7, 2021, the company suffered a ransomware attack from the DarkSide group that caused it to halt all operations in an attempt to contain the breach. That halt caused long lines of drivers trying to fuel their cars and stockpile whatever gas was still available at stations. The attack started because of leaked employee\u2019s password that was found on the dark web and was only contained after Colonial chose to pay the ransom of $4.4 million.<\/p>\n<h2>What We See Today: Botnets, Hacktivists, Opportunistic Attacks (Since 2018)<\/h2>\n<p>Beyond sophisticated state-sponsored APTs and highly organized cyber criminal groups, what we see emerging is a myriad of opportunistic attacks perpetrated by hacktivist groups, launched by automated botnets or blindly moving from IT\/IoT infections to OT devices because of <a href=\"\/blog\/american-water-security-incident-ransomware\/\">increased interconnection and lack of segmentation<\/a>.<\/p>\n<h3>Botnets and Mixed IT\/IoT\/OT Attacks<\/h3>\n<p>The precursor of IoT botnets targeting OT was VPNFilter, a Russian botnet and wiper identified in 2018 with modules dedicated to infecting IoT devices and sniffing OT Modbus traffic. VPNFilter showed that attackers were well aware of the growing interconnections in target networks.<\/p>\n<p>The botnet mainly targeted routers and network-attached storage (NAS) devices exposed on the internet, and is estimated to have affected over 500,000 devices. The malware could exploit these devices, survive reboots, execute commands, steal data and \u201cbrick\u201d infected devices.<\/p>\n<p>In 2022 and 2023, Forescout Research \u2013 Vedere Labs:<\/p>\n<ul>\n<li>Reported the <a href=\"\/resources\/2022-threat-roundup-report-the-emergence-of-mixed-itiot-threats\/\">emergence of mixed IoT\/IT botnets<\/a>, such as Chaos, which included usual exploits for IoT devices as initial access but also the possibility to move laterally to IT after the initial infection.<\/li>\n<li>Developed a <a href=\"\/blog\/r4iot-when-ransomware-meets-the-internet-of-things\/\">proof-of-concept called R4IoT<\/a> to show how a malware could infect a network via IoT devices, move laterally to IT and then to OT to cause different types of damage.<\/li>\n<\/ul>\n<p>In 2024, we continued following this trend and <a href=\"\/blog\/targeting-ot-security-ics-threats-malware\/\">reported on well-known IoT botnets<\/a> including default credentials for OT devices, as well as including the capability to wipe some devices.<\/p>\n<p>A threat that is unrelated to botnets, but also facilitated by the increased interconnection of device types, is common Windows malware spreading to engineering workstations. In 2024, we <a href=\"\/blog\/ics-threat-analysis-new-experimental-malware-can-kill-engineering-processes\/\">confirmed that this trend continued active<\/a>, while also stumbling upon a new experimental malware that could kill engineering processes.<\/p>\n<h3>Hacktivist Activity<\/h3>\n<p>Hacktivists have been around since the 1990s, but in the past few years \u2013 especially since the Russia-Ukraine war in 2022 \u2013 they have shown a <a href=\"\/resources\/threat-report-the-increasing-threat-posed-by-hacktivist-attacks\/\">particular interest in targeting critical infrastructure and OT\/ICS<\/a>.<\/p>\n<p>Their attacks are nowadays motivated by geopolitics and aim to spread a message or cause physical disruption via data exfiltration, defacements, DDoS, direct interaction with OT protocols and even ransomware deployment on IoT\/OT devices. Often, these groups are supported by nation-state governments or even act as a front for their own civilian or military agencies.<\/p>\n<p>In the six months between November 2023 and April 2024, the US suffered <a href=\"https:\/\/www.dni.gov\/files\/CTIIC\/documents\/products\/Recent_Cyber_Attacks_on_US_Infrastructure_Underscore_Vulnerability_of_Critical_US_Systems-June2024.pdf\" target=\"_blank\" rel=\"noopener\">at least 36 attacks by hacktivist groups<\/a> affiliated with Iran or Russia targeting OT\/ICS. Most of these targeted water utilities, but other sectors such as healthcare, energy and manufacturing were also hit.<\/p>\n<p><script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/egc9n28pia.js\" async type=\"module\"><\/script><\/p>\n<style>wistia-player[media-id='egc9n28pia']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/egc9n28pia\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style>\n<p> <wistia-player media-id=\"egc9n28pia\" seo=\"false\" aspect=\"1.7777777777777777\"><\/wistia-player><\/p>\n<div style=\"margin: 10px 0 10px 0; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px 0 10px 0;\">\n<h4>Go deeper: Join our 2024 Threat Report webinar with Daniel Dos Santos, Head of Research, and VP of Security Intelligence, Rik Ferguson.<\/h4>\n<p class=\"u-display-flex u-flex-wrap u-gap\"><a href=\"\/webinars\/2024-threat-roundup-evolving-attacks-on-critical-infrastructure\/\"  title=\"Join Webinar\" class=\"c-btn c-btn--primary has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\"><span class=\"cta-button-text\">Join Webinar<\/span><\/a>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>Recommended Mitigations<\/h2>\n<p>OT-specific malware, such as Stuxnet and Industroyer, continue to be very frightening and are becoming more common, but it\u2019s still rare.<\/p>\n<p>There are much more common threats to critical infrastructure, including hacktivists, botnets, IT malware, and ransomware that can affect OT operations \u2014 although less dramatic than OT-specific malware.<\/p>\n<p>Risk is the product of likelihood and impact. These threats with higher likelihood but often lower impact are also relevant. To manage this risk, especially for the types of threats we see as more likely to impact critical infrastructure nowadays, we recommend the following:<\/p>\n<div style=\"max-width: 300px; float: right; width: 100%; height: auto; display: flex; flex-wrap: wrap; margin: 0 0 20px 20px;\">\n<p><a href=\"https:\/\/www.forescout.com\/resources\/2024-global-threat-roundup-report\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-46206\" style=\"width: 100%; height: auto;\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/01\/2024-Threat-Roundup-Report-Cover-540x700-1.webp\" alt=\"\" width=\"300\" height=\"auto\" \/><\/a><\/p>\n<p class=\"u-flex-wrap u-gap\" style=\"margin: auto; display: block; text-align: center;\"><a href=\"https:\/\/www.forescout.com\/resources\/2024-global-threat-roundup-report\/\"  title=\"Explore the Data\" class=\"c-btn c-btn--lblue has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\"><span class=\"cta-button-text\">Explore the Data<\/span><\/a>\n<\/div>\n<ul>\n<li>Identify and patch vulnerable IoT devices to prevent them from being used as part of botnets.<\/li>\n<li>Change defaults or easily guessable passwords of IoT devices.<\/li>\n<li>Do not expose IoT\/OT\/ICS devices directly to the internet, follow CISA\u2019s guidance on providing <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/recommended_practices\/RP_Managing_Remote_Access_S508NC.pdf\" target=\"_blank\" rel=\"noopener\">remote access for industrial control systems<\/a>.<\/li>\n<li>Segment the network to isolate IT, IoT and OT devices, limiting network connections to only specifically allowed management and engineering workstations or among unmanaged devices that need to communicate.<\/li>\n<li>Ensure administrative interfaces (such as web UIs and engineering ports) on connected devices are behind IP-based access control lists or are only accessible from a separate, VPN-protected management VLAN.<\/li>\n<li>Add authentication to administrative interfaces of IoT and OT devices, such as web UIs and proprietary engineering ports.<\/li>\n<li>Use an IoT\/OT-aware, DPI-capable monitoring solution to alert on malicious indicators and behaviors, watching internal systems and communications for known hostile actions such as vulnerability exploitation, password guessing and unauthorized use of OT protocols.<\/li>\n<li>Monitor the traffic of IoT\/OT devices to identify those being used as part of distributed attacks.<\/li>\n<li>Follow the <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/denial-service-dos-guidance-collection\" target=\"_blank\" rel=\"noopener\">NCSC-UK\u2019s guide on Denial of Service attacks<\/a>, which includes a preparation phase of understanding weak points in your service, ensuring that service providers can handle resource exhaustion, scaling the service to handle concurrent sessions, preparing a response plan and stress testing systems regularly.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Stuxnet turns 15. Vedere Labs research spotlights industrial cyber attack methods since this historic malware hit an Iranian plant in 2010.<\/p>\n","protected":false},"author":124,"featured_media":104400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[542],"class_list":["post-104335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Since Stuxnet: A History of Critical Infrastructure Attacks<\/title>\n<meta name=\"description\" content=\"Stuxnet turns 15. Vedere Labs research spotlights industrial cyber attack methods since this historic malware hit an Iranian plant in 2010.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Since Stuxnet: A History of Critical Infrastructure Attacks\" \/>\n<meta property=\"og:description\" content=\"Stuxnet turns 15. Vedere Labs research spotlights industrial cyber attack methods since this historic malware hit an Iranian plant in 2010.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-06T08:01:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"Since Stuxnet: A Brief History of Critical Infrastructure Attacks\",\"datePublished\":\"2025-02-06T08:01:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\"},\"wordCount\":1904,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\",\"name\":\"Since Stuxnet: A History of Critical Infrastructure Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp\",\"datePublished\":\"2025-02-06T08:01:17+00:00\",\"description\":\"Stuxnet turns 15. Vedere Labs research spotlights industrial cyber attack methods since this historic malware hit an Iranian plant in 2010.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp\",\"width\":1201,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Since Stuxnet: A Brief History of Critical Infrastructure Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Since Stuxnet: A History of Critical Infrastructure Attacks","description":"Stuxnet turns 15. Vedere Labs research spotlights industrial cyber attack methods since this historic malware hit an Iranian plant in 2010.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Since Stuxnet: A History of Critical Infrastructure Attacks","og_description":"Stuxnet turns 15. Vedere Labs research spotlights industrial cyber attack methods since this historic malware hit an Iranian plant in 2010.","og_url":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2025-02-06T08:01:17+00:00","og_image":[{"width":1201,"height":629,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp","type":"image\/webp"}],"author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"Since Stuxnet: A Brief History of Critical Infrastructure Attacks","datePublished":"2025-02-06T08:01:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/"},"wordCount":1904,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/","url":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/","name":"Since Stuxnet: A History of Critical Infrastructure Attacks","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp","datePublished":"2025-02-06T08:01:17+00:00","description":"Stuxnet turns 15. Vedere Labs research spotlights industrial cyber attack methods since this historic malware hit an Iranian plant in 2010.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp","width":1201,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/since-stuxnet-a-brief-history-of-critical-infrastructure-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Since Stuxnet: A Brief History of Critical Infrastructure Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Vedere-labs-ICS-Threats-Stuxnet-feature.webp","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/104335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=104335"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/104335\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/104400"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=104335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=104335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=104335"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=104335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}