{"id":86938,"date":"2024-04-23T01:49:46","date_gmt":"2024-04-23T08:49:46","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=86938"},"modified":"2025-06-26T11:56:21","modified_gmt":"2025-06-26T15:56:21","slug":"cybersecurity-threat-evolution-of-otics-and-iot-devices","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/","title":{"rendered":"The global threat evolution of internet-exposed OT\/ICS"},"content":{"rendered":"<p>Operational technology (OT) and Industrial Control Systems (ICS) are core parts of an engine fueling critical infrastructure in industrialized nations worldwide. Water treatment facilities. Wastewater plants. Electrical transmission and distribution hubs. Nuclear power and manufacturing plants. Energy pipelines.<\/p>\n<p>Over the years, these traditional technologies have become more connected and integrated to information systems that use the internet \u2013 opening them up for more efficient monitoring and automation of operational processes.<\/p>\n<p>However, many integrated systems that emphasize automation with digital connections have been fodder for state-sponsored cyberwarfare, criminal activity and political hacktivism. In fact, opportunistic attackers are increasingly abusing OT\/ICS exposure at scale \u2014 sometimes with a very lax targeting rationale driven by trends, such as current events, copycat behavior or the emergencies found in new, off-the-shelf capabilities or hacking guides.<\/p>\n<p>A recent wave of attacks by the Iranian-affiliated Cyber Av3ngers hacktivist group targeted Unitronics Programmable Logic Controllers (PLCs) around the world, including at a <a href=\"\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\">water utility near Pittsburgh<\/a>. Unfortunately, it has brought internet-exposed OT\/ICS back into the spotlight. A majority of media attention has been focused mostly on attacks on Israel and the US, but there are more countries and regions being exposed and attacked under the surface \u2013 and it extends beyond water utilities and Unitronics PLCs.<\/p>\n<p>Forescout Research \u2013 Vedere Labs has been tracking internet-exposed OT\/ICS data for over seven years \u2013 and the outlook remains mostly unchanged. Despite decades of raising awareness, navigating new regulations and advisories from CISA, critical infrastructure continues to be rife with open ports and hackable devices.<\/p>\n<p>In a new threat briefing \u201c<a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\" target=\"_blank\" rel=\"noopener\">Better Safe Than Sorry<\/a>\u201d, we take a fresh look at exposed OT\/ICS data between 2017 and 2024. We analyze and detail problem areas by region and offer mitigation strategies. We detail three recent cases of device exposure that we have been tracking: the Unitronics attack wave and our attempts to proactively identify and notify asset owners with exposed Schneider Electric Modicon and Wago 750 PLCs.<\/p>\n<p>For complete details with detailed mitigation strategies, plus our data on the exposure of devices using the Nucleus NET and NicheStack TCP\/IP stacks, <a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\">access the report<\/a>.<\/p>\n<h2>The evolution of OT\/ICS exposure between 2017 and 2024<\/h2>\n<p>Using Shodan\u2019s <a href=\"https:\/\/www.shodan.io\/search?query=tag%3Aics\" target=\"_blank\" rel=\"noopener\">pre-configured ICS tag search filter<\/a> \u2013 which finds <a href=\"https:\/\/www.shodan.io\/explore\/category\/industrial-control-systems\" target=\"_blank\" rel=\"noopener\">many but not all<\/a> exposed OT\/ICS devices \u2013 we can see close to 110,000 Internet-facing devices as of the end of January 2024. The United States has 27% of exposed devices, followed by Italy, Spain, France and Canada with a combined total of 17%.<\/p>\n<p><em>How has exposed OT\/ICS evolved since 2017? <a href=\"\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\">Watch our research leaders discuss on-demand<\/a>. <\/em><\/p>\n<div style=\"margin: 20px; width: 80%; text-align: center;\">\n<p class=\"u-display-flex\"><a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\"  title=\"Access Report \" class=\"c-btn c-btn--primary has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-pulse\"><span class=\"cta-button-text\">Access Report <\/span><\/a>\u00a0\u00a0\u00a0<a href=\"\/webinars\/the-emergence-of-exposed-ics-trends-threats-and-best-practices\/\"  title=\"Watch Webinar\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\"><span class=\"cta-button-text\">Watch Webinar<\/span><\/a>\n<\/div>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" align=\"center\"><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3A.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86955\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3A.jpg\" alt=\"\" width=\"500\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3A.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3A-300x164.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3A-1024x559.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3A-768x420.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3B.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86954\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3B.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3B.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3B-300x200.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3B-1024x682.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3B-768x511.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3C.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86953\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3C.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3C.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3C-300x195.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3C-1024x666.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-3C-768x499.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><center><em>Figure 1 \u2013 Summary of exposed OT\/ICS<\/em><\/center>Only the US and Canada significantly reduced the number of exposed devices during the period of study: 47% in the US and 45% in Canada. The other top 10 countries increased the number of exposed devices: 82% in Spain, 58% in Italy, 26% in France, 13% in Germany and 10% in Russia.<\/p>\n<table>\n<tbody>\n<tr>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4A.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86952\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4A.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4A.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4A-300x190.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4A-1024x649.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4A-768x486.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4B.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86951\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4B.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4B.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4B-300x182.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4B-1024x622.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4B-768x466.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" align=\"center\"><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4C.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86950\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4C.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4C.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4C-300x204.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4C-1024x695.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-4C-768x521.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><center><em>Figure 2 \u2013 Changes in exposed OT\/ICS in the top 10 countries<\/em><\/center><\/p>\n<h4>Manufacturing and building automation protocols make up a major portion of exposed device types.<\/h4>\n<p>Modbus represents 29% of exposed services, followed by three building automation protocols \u2013 KNX, BACnet and Tridium Fox \u2013 with a combined total of 32%.<\/p>\n<p>The top 10 types of exposed services remained mostly constant since 2017, but Tridium Fox, Lantronix and MOXA Nport saw a significant decrease in the number of devices (70% for the first two and 53% for the last) while Modbus and Siemens S7 saw an increase: 48% for Modbus and 121% for S7. Some of these reductions correlate with proactive research and <a href=\"https:\/\/cyberscoop.com\/fox-protocol-fbi-warning-port-1911-ics-security\/\" target=\"_blank\" rel=\"noopener\">government notifications<\/a>.<\/p>\n<table>\n<tbody>\n<tr>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5A.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86949\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5A.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5A.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5A-300x204.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5A-1024x695.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5A-768x521.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5B.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86948\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5B.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5B.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5B-300x204.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5B-1024x695.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-5B-768x521.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><center><em>Figure 3 \u2013 Changes in the top exposed OT\/ICS services<\/em><\/center><\/p>\n<h2>A fresh take on the Unitronics attacks: Israel and the US are not alone \u2014 and it extends way beyond water<\/h2>\n<p>Media focus has mostly been on the effects of the Unitronics\u2019 attacks on the US and Israeli water sectors, however, the attack waves have not been limited in geographic or sector scope. Deeper awareness has led to a reduction in exposed devices, according to our data. But the risk remains and is not limited to one flavor of PLC.<\/p>\n<p>This indiscriminate wave hit everything from water utilities in <a href=\"https:\/\/therecord.media\/water-outage-in-ireland-county-mayo\">Ireland<\/a> and <a href=\"https:\/\/twitter.com\/Terror_Alarm\/status\/1729590728907456938?s=20\">Romania<\/a>, <a href=\"https:\/\/www.linkedin.com\/posts\/advanced-industrial-devices_cyberattack-unitronics-plc-activity-7136089668802027520-mG_x\/\">oil pumps<\/a> and <a href=\"https:\/\/beavercountian.com\/content\/special-coverage\/cyber-army-promises-more-attacks-as-fbi-ny-takes-aliquippa-case\">a public aquarium<\/a> in the US, a <a href=\"https:\/\/twitter.com\/fullpintbeerpgh\/status\/1729568323455594998\">brewery<\/a> in Pittsburgh, a <a href=\"https:\/\/twitter.com\/davierm_\/status\/1730425688782483538\">factory<\/a> in the Czech Republic, and various unspecified victims on the <a href=\"https:\/\/forum.unitronics.com\/topic\/9904-plc-hacking-more-commonplace-than-you-might-think\/\">Unitronics support forum<\/a>, to several agricultural entities in Western Europe reported privately to Forescout.<\/p>\n<p>Back in <a href=\"https:\/\/www.secureworks.com\/blog\/iranian-cyber-av3ngers-compromise-unitronics-systems\">February 2022 and April 2023<\/a> \u00a0defacement imagery on these PLCs had already targeted this equipment in agricultural water controllers and parcel distribution centers in Israel. By November 2023, there were a series of attacks on internet-exposed PLCs manufactured by <a href=\"https:\/\/unitronicsplc.com\/\">Unitronics<\/a> where hacktivists defaced the interfaces on those PLCs.<\/p>\n<p><a href=\"https:\/\/www.secureworks.com\/blog\/iranian-cyber-av3ngers-compromise-unitronics-systems\">Secureworks<\/a> reported the hacktivist group <a href=\"https:\/\/www.forescout.com\/resources\/threat-report-the-increasing-threat-posed-by-hacktivist-attacks\/\">GhostSec<\/a> also claimed to have targeted Unitronics PLCs in Israel in October 2023. In March 2023, a Telegram channel associated with GhostSec posted an <a href=\"https:\/\/t.me\/NewBlood_Project\/462\">ICS \/ SCADA hacking guide<\/a> explicitly showing how to identify Unitronics devices and how to use Unitronics <a href=\"https:\/\/www.unitronicsplc.com\/software-visilogic-for-programmable-controllers\/\">VisiLogic<\/a> software to connect to these devices using the PCOM protocol (port 20256\/TCP) and then take control of their HMIs.<\/p>\n<p>We noted <a href=\"https:\/\/www.forescout.com\/blog\/cyber-aveng3rs-attack-water-treatment-plant\/\">in November<\/a> there were over 1,800 internet-exposed Unitronics PLCs across the globe. As of early February 2024, this number has <strong>fallen to 937<\/strong> Figure 4.<\/p>\n<table>\n<tbody>\n<tr>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7A.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86947\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7A.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7A.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7A-300x196.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7A-1024x669.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7A-768x502.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<td><a href=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7B.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-86946\" src=\"\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7B.jpg\" alt=\"\" width=\"600\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7B.jpg 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7B-300x199.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7B-1024x679.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-BetterSafe-Graphs-Figure-7B-768x509.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><center><em>Figure 4 \u2013 Decrease in exposed Unitronics PLCs between late 2020 and early 2024<\/em><\/center>While reduction in exposure is good news overall, we can see that the decrease in Israel started in early 2022 which coincides with the earliest attacks reported on those devices.<\/p>\n<p>In the US, the decrease only started at the end of 2023. <strong>To be clear, this means that if the US authorities had paid attention to the attacks in Israel in 2022, the most recent attacks in the US could have been avoided<\/strong>.<\/p>\n<h2>The scope of PLC exposure and fresh use cases<\/h2>\n<p>Beyond that, we still see too many Unitronics PLCs exposed in the water and agricultural sectors, but also in building management systems, including at:<\/p>\n<ul>\n<li>A major distribution center<\/li>\n<li>A healthcare contractor<\/li>\n<li>A research lab gas management system<\/li>\n<li>Multiple residential apartment complexes managed by a property management company<\/li>\n<\/ul>\n<p>Another interesting use case is the deployment of Unitronics PLCs in <strong>so-called <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Package_boiler\" target=\"_blank\" rel=\"noopener\"><strong>packaged units<\/strong><\/a><strong> or <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Modular_process_skid\" target=\"_blank\" rel=\"noopener\"><strong>modular skid systems<\/strong><\/a>. These self-contained systems are typically integrated by a third party into a customer\u2019s control system in a turnkey fashion, with the internals of the unit being a black box to the asset owner. We found examples of Unitronics PLCs as part of:<\/p>\n<ul>\n<li><a href=\"https:\/\/aidusa.com\/homepage-new\/optipump\/\" target=\"_blank\" rel=\"noopener\">Oil field pump controllers<\/a> (previously unreported)<\/li>\n<li><a href=\"https:\/\/www.brewmation.com\/brewing\/turnkey-brewing\" target=\"_blank\" rel=\"noopener\">Brewery solutions<\/a><\/li>\n<li><a href=\"https:\/\/www.kalvis.lt\/en\/produktas\/control-systems\/\" target=\"_blank\" rel=\"noopener\">Biofuel boilers<\/a><\/li>\n<li><a href=\"https:\/\/agb.lv\/industrialie-apkures-katli\/\" target=\"_blank\" rel=\"noopener\">Industrial heating boilers<\/a><\/li>\n<li><a href=\"https:\/\/colterlec.com.au\/product-applications\/#1633067363171-59f061a6-03a1\" target=\"_blank\" rel=\"noopener\">Substation battery tripping units<\/a><\/li>\n<\/ul>\n<p>Finally, we observed that many PLCs were exposed in similar \u2018clusters\u2019: e.g. various water controllers belonging to several <em>different<\/em> municipal utilities in a Nordic country, all with very similar configurations, which points to the likely role of system integrators servicing multiple asset owners in the misconfigured exposure to the internet.<\/p>\n<h2><a name=\"_Toc160008217\"><\/a>Does proactive notification of exposed asset owners help?<\/h2>\n<p>As part of our <a href=\"\/blog\/deep-lateral-movement-in-ot-networks-when-is-a-perimeter-not-a-perimeter\/\">Deep Lateral Movement<\/a> research published in February 2023, we showed internet-exposed instances of two PLC lines covered in that research: the Schneider Modicon exposing <a href=\"https:\/\/securelist.com\/the-secrets-of-schneider-electrics-umas-protocol\/107435\/\" target=\"_blank\" rel=\"noopener\">UMAS<\/a> and the Wago 750 series exposing web and\/or FTP interfaces. At the time of that research, we identified dozens of affected asset owners and contacted CISA to alert them.<\/p>\n<p>In light of the Unitronics attack wave, and considering the historical <a href=\"\/resources\/threat-report-the-increasing-threat-posed-by-hacktivist-attacks\/\">targeting of Modicon and Wago PLCs<\/a> and the <a href=\"https:\/\/news.sky.com\/story\/irans-secret-cyber-files-on-how-cargo-ships-and-petrol-stations-could-be-attacked-12364871\" target=\"_blank\" rel=\"noopener\">reported interest in Wago PLCs<\/a> by the attackers to which Cyber Av3ngers have been attributed, we decided to reassess the exposed devices a year after we originally reported them to CISA.<\/p>\n<p>Unfortunately, we noticed that <strong>about half<\/strong> of the reported PLCs <strong>still had the same ports open<\/strong> <strong>with no changes or measures taken<\/strong>. About 30% were no longer internet exposed, while the other 20% remained exposed but had closed the OT port in question (though sometimes leaving FTP and web interfaces open).<\/p>\n<p>Although we saw a reduction in exposed devices due to proactive asset owner notifications, that has not happened with the same speed as for Unitronics \u2013 possibly because there has not yet been any mass exploit campaign against Schneider Electric or WAGO equipment. However, there are early examples of opportunistic attackers targeting these devices.<\/p>\n<h4>We reinforce the message that these devices are likely to be mass targeted in the future and action should be taken as soon as possible to protect them.<\/h4>\n<h2>Recommended mitigations<\/h2>\n<p>It is likely responsible asset owners are unaware that OT\/ICS systems contain potentially vulnerable Unitronics, Schneider and Wago devices exposed to the internet, once again highlighting the need for an accurate and granular software and hardware bill of materials as part of a comprehensive risk management strategy.<\/p>\n<h5>To reduce risk, organizations should proactively leverage targeted notifications. Due to the increased scope of attacks on exposed OT\/ICS, we recommend asset owners:<\/h5>\n<blockquote>\n<h4>Harden connected devices<\/h4>\n<p>Identify every device connected to the network and enumerating known vulnerabilities, used credentials, and open ports. Change default or easily guessable credentials and use strong unique passwords for each device. Disable unused services and patch vulnerabilities to prevent exploitation.<\/p>\n<h4>Segment<\/h4>\n<p>Do not expose unmanaged devices directly to the internet, with very few exceptions such as routers and firewalls. Follow CISA\u2019s guidance on providing remote access for industrial control systems. Segment the network to isolate IT, IoT and OT devices, limiting network connections to only specifically allowed management and engineering workstations or among unmanaged devices that need to communicate.<\/p>\n<h4>Monitor<\/h4>\n<p>Use an IoT\/OT-aware, DPI-capable monitoring solution to alert on malicious indicators and behaviors, watching internal systems and communications for known hostile actions such as vulnerability exploitation, password guessing and unauthorized use of OT protocols. And monitor the activity of hacktivists on Telegram, Twitter and other sources \u2013 and watch what kind of hacking material is shared.<\/p><\/blockquote>\n<p>For specific details with complete mitigation strategies, <a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\" target=\"new\" rel=\"noopener\">access the report<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS<\/p>\n","protected":false},"author":124,"featured_media":88503,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[540],"tags":[],"coauthors":[542],"class_list":["post-86938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-and-cyber-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The global threat evolution of internet-exposed OT\/ICS - Forescout<\/title>\n<meta name=\"description\" content=\"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The global threat evolution of internet-exposed OT\/ICS - Forescout\" \/>\n<meta property=\"og:description\" content=\"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-23T08:49:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T15:56:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"The global threat evolution of internet-exposed OT\/ICS\",\"datePublished\":\"2024-04-23T08:49:46+00:00\",\"dateModified\":\"2025-06-26T15:56:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\"},\"wordCount\":1643,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg\",\"articleSection\":[\"Research &amp; Cyber Alerts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\",\"name\":\"The global threat evolution of internet-exposed OT\/ICS - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg\",\"datePublished\":\"2024-04-23T08:49:46+00:00\",\"dateModified\":\"2025-06-26T15:56:21+00:00\",\"description\":\"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The global threat evolution of internet-exposed OT\/ICS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The global threat evolution of internet-exposed OT\/ICS - Forescout","description":"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/","og_locale":"en_US","og_type":"article","og_title":"The global threat evolution of internet-exposed OT\/ICS - Forescout","og_description":"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS","og_url":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2024-04-23T08:49:46+00:00","article_modified_time":"2025-06-26T15:56:21+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg","type":"image\/jpeg"}],"author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"The global threat evolution of internet-exposed OT\/ICS","datePublished":"2024-04-23T08:49:46+00:00","dateModified":"2025-06-26T15:56:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/"},"wordCount":1643,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg","articleSection":["Research &amp; Cyber Alerts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/","url":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/","name":"The global threat evolution of internet-exposed OT\/ICS - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg","datePublished":"2024-04-23T08:49:46+00:00","dateModified":"2025-06-26T15:56:21+00:00","description":"Forescout Research Vedere Labs tracks the evolution of cybersecurity threats to operational technology and industrial control systems OT\/ICS","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/cybersecurity-threat-evolution-of-otics-and-iot-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"The global threat evolution of internet-exposed OT\/ICS"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ICS-Better-Safe-Than-Sorry-Nav-v1-1200x628-1.jpg","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/86938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=86938"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/86938\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/88503"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=86938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=86938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=86938"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=86938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}