Emerging Hacking Groups Gain Entry to Operational Technology Systems

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

New Threat Groups Target Operational Technology Environments

In a recent report released by Dragos, security researchers unveiled the emergence of three novel threat groups involved in providing access to or launching direct attacks on operational technology (OT) environments. This development raises significant concerns within cybersecurity circles.

One of the newly identified entities, referred to as Sylvanite, serves as an entry point for another group known as Voltzite, which has links to the notorious Volt Typhoon.

Notably, Volt Typhoon is a state-affiliated threat group that U.S. authorities have previously cautioned is focused on critical infrastructure sites across the United States, poised to execute disruptive operations in the event of military conflicts in the Asia-Pacific region.

According to Dragos researchers, Sylvanite operates distinctly, leveraging vulnerabilities in edge devices to establish initial access.

Robert Lee, co-founder and CEO of Dragos, emphasized during a recent media briefing, “This is not the team aiming for long-term control of OT systems—that role belongs to Voltzite. Rather, Sylvanite collaborates with or supports Voltzite by facilitating initial access.”

Sylvanite has been connected to a significant incident in May 2025, impacting a utility company in the U.S., where weaknesses in Ivanti Endpoint Manager Mobile were exploited, specifically CVE-2025-4427 and CVE-2025-44428, as detailed in the report.

Another group, known as Azurite, shares links with Flax Typhoon. This entity capitalizes on compromised small office/home office environments to infiltrate engineering workstations while employing living-off-the-land tactics to maintain access.

The third identified group, dubbed Pyroxene, resorts to social engineering strategies, including the creation of counterfeit LinkedIn profiles masquerading as recruiters. Since 2023, the group has extended its operations from the Middle East into North America and Western Europe, specifically targeting aerospace, defense, maritime, and other critical sectors.

In 2025, Pyroxene executed wiper malware attacks against several Israeli targets amid the 12-day military conflict with Iran. Researchers indicate that Pyroxene is strategically positioning itself for future campaigns that could critically impact industrial control systems.

Apart from these nascent threat groups, researchers have observed that existing organizations are also amplifying their activities.

For instance, Kamacite functions as the access facilitator for Electrum, a longstanding adversary linked to the 2015 cyberattacks on the Ukrainian power grid. Dragos reports that Kamacite has accelerated its attacks against industrial control system (ICS) supply chains in Europe since 2024.

Lee remarked, “No other team in the world possesses as much expertise in dismantling infrastructure as Electrum.” He further noted that as the cyber phase of the Ukraine conflict reaches its conclusion, experienced threat groups are pivoting to target industries in regions such as Europe and the United States.

Certain Measures Company Employees Should Undertake to Stay Away from Hackers

Electrum’s activities exemplified a significant threat when it was implicated in a December attack on the electrical grid in Poland, affecting multiple facilities, including wind farms and solar installations, as per insights from Dragos, which participated in the incident response efforts.

Source link: Cybersecuritydive.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading