{"id":86934,"date":"2024-04-16T15:19:25","date_gmt":"2024-04-16T22:19:25","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/2023-threat-roundup-copy\/"},"modified":"2024-04-22T03:46:54","modified_gmt":"2024-04-22T10:46:54","slug":"better-safe-than-sorry","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/","title":{"rendered":"Better Safe Than Sorry"},"content":{"rendered":"<h1>Better Safe Than Sorry<\/h1>\n<p>In a new threat briefing, Forescout researchers examine data gathered from 2017-2024 of internet exposed OT\/ICS data. \u201cBetter Safe Than Sorry\u201d contains an analysis of problem areas by region and offers mitigation strategies. The report also details three recent cases of device exposure, including the Unitronics attack wave, and attempts to proactively identify and notify asset owners with exposed Schneider Electric Modicon and Wago 750 PLCs.<\/p>\n<p>\u00a0<\/p>\n<p>Watch Webinar<br \/>\nRead Report\n\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/FS-2022-OT-ICEFALL-LP-Web-Icons-v1-Vulnerabilities.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n110000<\/h3>\n<p class=\"c-stats__text\">internet-facing OT\/ICS devices worldwide<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/threat-detection.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n47%<\/h3>\n<p class=\"c-stats__text\">decrease in exposed OT\/ICS in the US (2017-2024)<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/01\/infected-laptop.png\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n1000~<\/h3>\n<p class=\"c-stats__text\">Unitronics PLCs still exposed on the internet worldwide<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Webinar: The Emergence of Exposed ICS: Trends, Threats and Best Practices<\/h2>\n<p>Dive into the world of operational technology (OT) and industrial control systems (ICS) with Forescout\u2019s Elisa Costante and Rik Ferguson. Discover the latest in exposed ICS, including regional variations, targeted services and best practices for security.<\/p>\n<p><a href=\"\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\" title=\"Watch Now\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Now<br \/>\n<\/a>\n<h2 class=\"c-title \">\n<h3>Exposed OT\/ICS Devices per Service (Jan. 2024)<\/h3>\n<\/h2>\n<ul>\n<li>Manufacturing and building automation protocols are the most exposed<\/li>\n<li>Top 10 exposed service types are the same since 2017<\/li>\n<li>Significant decrease in exposed Tridium Fox, Lantronix and MOXA Nport devices<\/li>\n<li>Modbus and Siemens S7 saw increases<\/li>\n<\/ul>\n<p><a href=\"\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">Read Blog<br \/>\n<\/a>\n<h2 class=\"c-title \">\n<h3>Exposed OT\/ICS devices per country (Jan. 2024)<\/h3>\n<\/h2>\n<ul>\n<li>US has 27% of exposed devices followed by: Italy, Spain, France and Canada (combined total of 17%)<\/li>\n<li>Only the US and Canada significantly reduced the number of exposed devices: 47% in the US; 45% in Canada<\/li>\n<\/ul>\n<h2 class=\"c-title \">\n<h3>After One Year<\/h3>\n<\/h2>\n<ul>\n<li>50% of exposed PLCs reported to asset owners remained open<\/li>\n<li>30% were no longer internet exposed<\/li>\n<li>20% remained exposed but had closed the OT port<\/li>\n<\/ul>\n<p><a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/THM_better-safe-than-sorry.png\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Dive into the Research <\/h2>\n<p>Our research takes a fresh look at the topic of exposed OT\/ICS by examining the nuanced evolution of exposed devices from 2017 to 2024. Read the full report to see other findings such as:<br \/>\n\u00a0\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>Why many of these internet-exposed OT devices and protocols appear to be the result of system integrator practices<\/li>\n<li>How exposure rates can be reduced proactively through targeted notification efforts <\/li>\n<li>Specific statistics about Unitronics PLCs and devices running InterNiche and Nucleus TCP\/IP stacks<\/li>\n<\/ul>\n<p><a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\" title=\"Read Report\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Read Report<br \/>\n<\/a>\n<h2 class=\"c-title\">Strategic Recommendations:How Forescout Can Help<\/h2>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong>Risk and exposure management:<\/strong> Identify, quantify and prioritize cybersecurity risk. Start by <a href=\"\/solutions\/asset-inventory\/\">discovering and assessing every connected asset<\/a> to gain real-time awareness of your attack surface.<\/li>\n<li><strong>Network security:<\/strong> Continuously monitor all connected assets to <a href=\"\/solutions\/network-access-control\/\">govern network access<\/a>, using real-time traffic visibility to manage segmentation and dynamic control policies to mitigate and remediate risk.<\/li>\n<li><strong>Threat detection and response:<\/strong> <a href=\"\/products\/threat-detection-and-response-xdr\/\">Detect, investigate and respond<\/a> to true threats and incidents using threat detection and response capabilities to collect telemetry and logs, correlate attack signals, generate high-fidelity detections and enable automated responses.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/demo\/\" title=\"schedule demo\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-demo icon-position-right has-icon-animation icon-animation-pulse\">schedule demo<br \/>\n<\/a>\n","protected":false},"excerpt":{"rendered":"<p>Better Safe Than Sorry In a new threat briefing, Forescout researchers examine data gathered from 2017-2024 of internet exposed OT\/ICS data. \u201cBetter Safe Than Sorry\u201d contains an analysis of problem areas by region and offers mitigation strategies. The report also details three recent cases of device exposure, including the Unitronics attack wave, and attempts to [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":86915,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-86934","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Better Safe Than Sorry - Forescout Research<\/title>\n<meta name=\"description\" content=\"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Better Safe Than Sorry - Forescout Research\" \/>\n<meta property=\"og:description\" content=\"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T10:46:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/\",\"name\":\"Better Safe Than Sorry - Forescout Research\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png\",\"datePublished\":\"2024-04-16T22:19:25+00:00\",\"dateModified\":\"2024-04-22T10:46:54+00:00\",\"description\":\"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Better Safe Than Sorry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Better Safe Than Sorry - Forescout Research","description":"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/","og_locale":"en_US","og_type":"article","og_title":"Better Safe Than Sorry - Forescout Research","og_description":"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS","og_url":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-04-22T10:46:54+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/","url":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/","name":"Better Safe Than Sorry - Forescout Research","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png","datePublished":"2024-04-16T22:19:25+00:00","dateModified":"2024-04-22T10:46:54+00:00","description":"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/better-safe-than-sorry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"Better Safe Than Sorry"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/86934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=86934"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/86934\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/86915"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=86934"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=86934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}