Skip to content

Cyber Insurance News

The Leading Source for Cybersecurity Insurance News, Insights and Data

Cyber Threat Surge Hits Manufacturing and Healthcare; Uptick in Attacks On Agriculture and Food Sectors

Posted on June 5, 2025June 5, 2025 By Martin Hinton No Comments on Cyber Threat Surge Hits Manufacturing and Healthcare; Uptick in Attacks On Agriculture and Food Sectors

Estimated reading time: 4 minutes

Industrial Cyber Threats Escalate Rapidly

Industrial operations across critical sectors, including energy, manufacturing, transportation, and water infrastructure, are facing a steep surge in cyber threats. According to Honeywell’s 2025 Cyber Threat Report, ransomware attacks rose by 46% in the first quarter of the year alone. The dramatic uptick reflects a growing assault on the operational technology (OT) environments that keep essential services running.

Paul Smith, Honeywell’s Director of OT Cybersecurity Engineering, emphasized the urgency, “These attackers are evolving fast, leveraging ransomware-as-a-service kits to compromise the industrial operations that keep our economy moving.”  

Ransomware: The Leading Attack Vector

Ransomware accounted for a staggering 2,472 attacks in Q1 2025—40% of 2024’s total in just three months. The CL0P ransomware group emerged as a dominant actor.

Companies across water, transportation, and manufacturing were especially affected. Disruptions ranged from delayed flights in Japan to payment processing outages in Pittsburgh’s transit system.

Trojans on the Rise

The W32.Worm.Ramnit trojan, known for stealing banking credentials, surged by 3,000%. It now targets industrial systems to hijack OT credentials. This malware alone accounted for 37% of SMX-detected malicious files.

Get The Cyber Insurance News Upload Delivered
Every Sunday
Subscribe to our newsletter!

USB and Plug-in Devices Still a Weak Link

USB devices delivered 1,826 unique threats, including 124 never-before-seen strains. External hardware, such as mice and charging cables, now carries embedded malware used to breach on-premise control systems.

One in four top incidents in AMIR data involved USB plug-and-play exploitation. Endpoint controls and secure scanning kiosks were highlighted as mitigation tools.

See also  AttackIQ and Trium Cyber Forge Global Partnership to Fortify Policyholder Cybersecurity Defenses
New and Emerging Cyber Threat Vectors

Among the newly flagged vulnerabilities were:

  • Trojan.Shyape and Trojan.LokiBot: Used for data theft and credential scraping
  • Win32.Worm.Sohanad: Delivered via removable drives to establish backdoors
  • CVE-2023-27350 (PaperCut exploit): Allowed attackers to bypass admin authentication

These threats cross between IT and OT domains, making detection and containment harder.

Sectors Most at Risk
  • Energy: Downtime risks impact grid reliability
  • Water Treatment: Over 193 million Americans’ drinking water at risk
  • Transportation: Flight and transit delays Americans’ sabotage
  • Agriculture: Attacks on food production chains increased exponentially
Human Factors and Access Misuse

Account privilege mismanagement was the root of many incidents. Unauthorized users gained access to security groups in over 60 cases. Experts recommend enforcing policies through account audits and permission reviews.

Cost of Inaction: Unplanned Downtime Hits $1.5 Trillion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) defines any disruption to operations as significant. Fortune 500 companies lost 11% of revenue—$1.5 trillion—due to such unplanned incidents.

Recommendations to Strengthen Cyber Defenses
  • Implement Zero Trust Architecture
  • Adopt multi-factor authentication
  • Use AI-powered threat detection
  • Enforce USB/media controls
  • Regularly conduct vulnerability assessments
  • Back-up systems using air-gapped or immutable storage
Conclusion: A Call for Vigilance and Modernization

The 2025 Honeywell Cybersecurity Threat Report is a stark warning. Industrial environments are no longer air-gapped sanctuaries. They’re connected—and vulnerable.

“We’re at a critical inflection point,” said Smith. “Modern threats need mod “We’refenses. Every vulnerability left “open is a doo” wide enough for disaster.”

Explain It Like I’m a 5th Grader: Operational Technology Cyber Threats Are Like Mold in the Basement

Imagine your factory is a house. Now, imagine mold creeping in through the walls. You can’t always see it, but it’s there—rotting structure, spoiling air, costing you repairs.

See also  Cysurance Partners with Check Point Software to Enhance Cybersecurity for Data Centers

Cyber threats, like mold, thrive in forgotten corners—such as old USB ports, outdated patches, and neglected user permissions. You don’t need a new house. You need regular inspections, a dehumidifier, and a better habit of closing the basement door.

Methodology: How the Data Was Gathered

Honeywell analyzed over 250 billion “logs, 79 million files, and 4,600 cyber events between October 2024 and March 2025. The data came from tools like Secure Media Exchange (SMX) and Advanced Monitoring & Incident Response (AMIR). These tools scanned USBs, monitored security policies, and flagged critical incidents.

RELATED NEWS

  • 92% of Industrial Sites Face Cybersecurity Risks from Remote Access, DeNexus Study Finds
  • Industrial Sector Hit Hard by Ransomware Rampage
  • Dragos Announces Partnerships to Enhance OT Cybersecurity Incident Response
  • Cyber Attacks on Manufacturers Surge as IT-OT Convergence Expands Industrial Cybersecurity Risks
  • New Report: ICS/OT Cybersecurity Budgets Lag as Attacks Surge, Leaving Critical Infrastructure at Risk

Martin Hinton

Martin Hinton is the Executive Editor and Publisher of Cyber Insurance News and Information. With over three decades of journalism experience across six continents, his work encompasses investigative reporting, documentaries, and coverage of cultural, political, and business news. To learn more about his career, click on his name to visit his LinkedIn page.


Cybersecurity, Cybersecurity Report Tags:CL0P, Cyber threats, Cybersecurity, Honeywell Report, OT security, Ransomware, USB Malware

Post navigation

Previous Post: AXA XL Cybersecurity Communications Training Empowers CISOs
Next Post: Cyber Insurance Gets a Boost as Blackpoint, UKON Partner Up

Related Posts

  • Healthcare Data Breaches Soar in 2024: 305 Million Records Exposed – Bluesight Report Cyber Insurance for Healthcare
  • Liongard Launches Cyber Asset Discovery and Automated Documentation Tools for MSPs Cybersecurity
  • Redefining Critical Infrastructure: The Rising Stakes of School Cybersecurity and Resilience Cyber Insurance
  • SecurityScorecard Unveils Cybersecurity Findings for S&P 500 Companies Amid New SEC Regulations Cybersecurity
  • Ransomware Attacks Surge 20% in 2024: At-Bay’s New Report Warns Mid-Sized Companies Cybersecurity
  • Lockton and Axio Launch Strategic Cyber Risk Partnership to Enhance Analytics Cyber Insurance

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the Cyber Insurance Newsletter

Receive weekly updates on the top news on cyber insurance.

Cyber Insurance News

Cyber Insurance News
Discover the escalating cyber threats targeting industrial sectors in 2025. According to Honeywell's latest Cybersecurity Threat Report, ransomware attacks have surged by 46% in Q1 2025, with 2,472 incidents reported. Notably, the W32.Worm.Ramnit trojan has seen a 3,000% increase, accounting for 37% of malicious files detected. USB devices remain a significant vulnerability, with 1,826 unique threats identified, including 124 new malware strains.

Key Highlights:

Ransomware-as-a-Service (RaaS) is increasingly targeting Operational Technology (OT) systems.

USB exploitation was involved in 25% of recent incidents.

Critical sectors at risk include energy, water treatment, transportation, and agriculture.

Human error and poor privilege management contribute to over 60 cases of unauthorized access.

Potential economic impact includes $1.5 trillion in downtime for U.S. firms.

Recommendations:

Implement Zero Trust Architecture.

Enforce Multi-Factor Authentication (MFA).

Utilize AI-powered threat detection.

Conduct regular vulnerability assessments.

Ensure backups use air-gapped storage.

Stay informed and proactive against growing cyber threats. Secure your industrial environment now before it's too late.

#IndustrialCybersecurity #Ransomware2025 #OTSecurity #USBThreats #HoneywellReport #CyberRisk #ZeroTrust #CriticalInfrastructure #CyberAwareness #SCADASecurity
Industrial Cybersecurity in 2025: Ransomware Surge & USB Threats Exposed
In this clip from Episode #EP-6 of Cyber Insurance News Podcast, host Martin Hinton is joined by guest Dan Candee, CEO of Cork Protection, to break down the often-confusing acronyms MSP (Managed Service Provider) and MSSP (Managed Security Service Provider).

🔍 Dan explains how these service providers play a crucial role in modern business — supporting IT infrastructure, cybersecurity, cloud services, and more — in a clear, relatable way.

👨‍💻 Whether you're a small business owner, entrepreneur, or just trying to make sense of cybersecurity, this clip offers valuable insights into how to secure your business with the right tech partners.

✅ Topics Covered:

What MSPs and MSSPs really do

Cybersecurity made simple with real-world analogies

Why modern businesses rely on managed service providers

Protecting your data, brand, and reputation

🎧 Subscribe for more expert insights into cybersecurity, tech, and cyber insurance trends.

#CyberSecurity #MSP #MSSP #SmallBusinessTech #CyberInsurance #CyberRisk #ManagedServiceProvider #BusinessSecurity #CorkProtection #DanCandee #CyberProtection #TechSimplified
Cybersecurity for Small Business - MSP vs MSSP Explained | Dan Candee Simplifies A Jargon-Rich Space
In this clip from our latest podcast, Dan Candee, CEO of Cork Protection, discusses a critical component of SMB cyber resilience—the evolving role of cybersecurity insurance. Dan highlights the need for nimbleness in cyber coverage, especially for small businesses that often bear the brunt of devastating attacks.

💬 Quote Highlight:
"At the end of the day, my business is to serve the SMB market... who is providing the most value fastest." – Dan Candee, CEO Cork Protection.

#CyberResilience, #CyberSecurity, #SmallBusinessSecurity, #SMBProtection, #DigitalSafety, #CyberInsurance, #InsurTech, #MSPCommunity, #TechForSMBs, #CyberThreats, #DanCandee, #CorkProtection, #PodcastClip, #CybersecurityPodcast, #FastResponseInsurance, #BusinessTips, #EntrepreneurAdvice, #TechTalks, #DataProtection, #InsuranceTrends
Cyber Insurance for SMBs – What Needs to Change? | Dan Candee Interview
Load More... Subscribe

Categories

  • 8-K
  • AI & Cyber Insurance
  • AI & Cybersecurity
  • Critical Infrastructure cyber insurance and security
  • Cyber Cat Bonds/Cyber Catastrophe Bonds
  • Cyber Insurance
  • Cyber Insurance APAC
  • Cyber Insurance Best Practices
  • Cyber Insurance Captive
  • Cyber Insurance Carriers & Brokers
  • Cyber Insurance Claims
  • Cyber Insurance EU
  • Cyber Insurance Financial Institutions
  • Cyber Insurance for Government
  • Cyber Insurance for Healthcare
  • Cyber Insurance for Schools
  • Cyber Insurance for SMEs/SMBs
  • Cyber Insurance For Startups
  • Cyber Insurance for Utilities
  • Cyber Insurance Geographic Markets
  • Cyber Insurance Industry Groups
  • Cyber Insurance Investments and M&A
  • Cyber Insurance Jobs
  • Cyber Insurance Laws & Regulations
  • Cyber Insurance Litigation
  • Cyber Insurance Market Size
  • Cyber Insurance MENA
  • Cyber Insurance News & Information Podcst
  • Cyber Insurance People
  • Cyber Insurance Policies & Strategies
  • Cyber Insurance Premiums
  • Cyber Insurance Reports
  • Cyber Insurance Settlements
  • Cyber Insurance Sunday – Upload
  • Cyber Insurance Systemic Risks
  • Cyber Insurance Tech
  • Cyber Insurance Threats
  • Cyber Insurance UK
  • Cyber Insurance Underwriting
  • Cyber Insurance Wholesaler
  • Cyber Regulations
  • Cyber War Exclusions
  • Cybersecurity
  • Cybersecurity and Credit Ratings
  • Cybersecurity for SMBs
  • Cybersecurity in Education
  • Cybersecurity Investment
  • cybersecurity jobs
  • Cybersecurity Law
  • cybersecurity M&A
  • Cybersecurity people
  • Cybersecurity Report
  • Cybersecurity Training
  • Department of Homeland Security
  • EU Cybersecurity
  • Insurance Linked Securities/ILS
  • Insurance Loss Warranty contract/ILW
  • Managed Service Providers
  • National Association of Insurance Commissioners' (NAIC) model cybersecurity law
  • Non-criminal Claims/Non-Malicious Claims
  • Opinion/Commentary
  • Personal Cyber Insurance
  • Personal CyberSecurity
  • Ransomware Insurance
  • Reinsurance
  • Risk Modeling
  • SEC Cyber Disclosure Rule
  • Small Business
  • Supply Chain Cybersecurity And Insurance

Send Ideas, Requests & Comments




    Tags

    AI AI in Cybersecurity Artificial Intelligence At-Bay Beazley CFC Chubb Cloud Security Coalition Corvus Cowbell Cowbell Cyber crowdstrike cyber attack Cybercrime CyberCube cyber insurace cyber insurance cyberinsurance cyber insurance for small businesses Cyber Insurance Market Cyber liability Insruance cyberliabilityinsurance cyber liability insurance Cyber Resilience Cyber Risk Cyber Risk Management Cybersecurity cyber security cybersecurity insurance Cyber threats Data Breach Data Breaches Howden Lloyds Marsh Microsoft personal cyber insurance phishing Ransomware Ransomware Insurance Resilience Risk Management SecurityScorecard small business
    • Cyber Insurance Books
    • Cyber Insurance Reports & Documents
    • Cyber Insurance Acronyms/Terms
    • Cyber Insurance Companies: Carriers, Brokers & Vendors
    • Industry Response: Potential Federal Insurance Response to Catastrophic Cyber Incidents
    • Ransomware Insurance
    • How Much Is Cyber Insurance?
    • Considerations for Buying Cyber Insurance
    • Cyber Liability Insurance Near Me
    • Cyber Insurance Quote
    • Newsletter
    • Legal Analysis & Full Text of 2023 SEC Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
    • Glossary
    • About Cyber Insurance News
    • Privacy Policy

    • $1.35 Billion Valuation for AT-Bay as It Raises $185 million  Cyber Insurance Investments and M&A
    • Embroker Offers New Cyber & Crime Business Insurance Products; Its Survey Shows Small Biz Underinsured for Cyber Cyber Insurance Carriers & Brokers
    • K2 Cyber Launches AI-Driven SMB Cyber Insurance Program | Cyber Threat Protection for Small Businesses Cyber Insurance
    • How Rising Cybersecurity Spending Powers Defense and Tech Stocks Cyber Insurance Investments and M&A
    • Does the Cyber Insurance Industry Overrate MFA?  Cyber Insurance Best Practices
    • Cyber Insurance Sunday – Upload Cyber Insurance
    • Ransomware Claims Jump in Q1 2023: Marsh  Cyber Insurance Carriers & Brokers
    • The Baldwin Group Introduces API-Connected Underwriting Platform Cyber Navigator Cyber Insurance Underwriting

    Related Cybersecurity Sites

    http://www.whatiscyberliability.com

    https://www.whatiscyberinsurance.com

    http://www.ddosattacktutorial.com

    http://www.ransomwareremovaltool.com

    Our Privacy Policy: https://cyberinsurancenews.org/privacy-policy/

    Copyright © 2024 Cyber Insurance News.

    Powered by PressBook Premium theme