TroutTrout
Language||
Request a Demo
Back to Blog
RansomwareManufacturingOT Security

Ransomware Targeting Manufacturing in 2026: A 49% Increase and What to Do About It

Trout Team6 min read

The Numbers

The Dragos 2026 OT Cybersecurity Year in Review reports the following on ransomware targeting industrial organizations:

  • The number of ransomware groups going after industrial sectors jumped 49% year-over-year
  • 119 distinct groups are now actively hitting industrial targets
  • Together they produced more than 3,300 confirmed victims during the reporting period
  • Manufacturing bore over two-thirds of those attacks — the single largest share by far
  • 26 OT-focused threat groups now tracked by Dragos, with 11 active in 2025

These are not projections. This is observed incident data from the largest OT-focused threat intelligence organization in the industry.

Why Manufacturing Is the #1 Target

Ransomware operators are rational economic actors. They target organizations most likely to pay, most quickly. Manufacturing fits that profile perfectly.

FactorWhy It Helps AttackersImpact on Payment Likelihood
Low downtime toleranceProduction lines generate revenue per hour. Every hour down is direct financial loss.High — cost of downtime often exceeds ransom demand within days
Flat OT networksMost factory networks have minimal segmentation between IT and OT, or between OT zonesHigh — single point of entry leads to full-network encryption
Legacy systemsPLCs, HMIs, and SCADA systems running Windows XP/7 or proprietary OS cannot be patchedHigh — known vulnerabilities remain permanently exploitable
Vendor remote accessMaintenance vendors need regular access, often through persistent VPN tunnels or TeamViewerHigh — provides ready-made lateral movement paths
Weak backup practicesOT configurations, PLC logic, and HMI projects are rarely backed up systematicallyHigh — recovery without paying is slow or impossible
Insurance coverageMany manufacturers carry cyber insurance that covers ransom paymentsHigh — reduces perceived cost of paying

The Attack Pattern

Ransomware targeting manufacturing follows a consistent pattern, regardless of the specific group:

Phase 1: IT Compromise (Day 0)

  • Phishing email with malicious attachment or link
  • Exploitation of internet-facing VPN or remote access appliance
  • Purchased access from an initial access broker (Dragos 2026 identifies SYLVANITE as an OT-focused initial access broker)

Phase 2: IT Lateral Movement (Days 1-7)

  • Credential harvesting (Mimikatz, LSASS dump)
  • Domain controller compromise
  • Identification of IT-to-OT network paths
  • Deployment of persistence mechanisms

Phase 3: OT Impact (Day 7+)

This is where manufacturing-targeted ransomware diverges from standard IT ransomware. The impact takes one or more of these forms:

  • Direct OT encryption — Ransomware encrypts HMI workstations, engineering stations, and historian servers, blinding operators
  • Process disruption — Encryption of IT systems that OT depends on (DNS, Active Directory, MES) causes cascading OT failures
  • Safety system compromise — In the worst case, ransomware or associated tooling disables safety instrumented systems

Ransomware Impact by Industrial Sector

SectorShare of Industrial Ransomware VictimsPrimary Attack VectorAverage Recovery Time
Manufacturing65%+Phishing, VPN exploit, initial access broker5-14 days
Energy~10%Remote access compromise, supply chain7-21 days
Water/Wastewater~5%Exposed remote access, weak credentials3-10 days
Transportation~5%IT compromise with OT spillover7-14 days
Other Industrial~15%MixedVaries

Source: Derived from Dragos 2026 OT Cybersecurity Year in Review incident data

Manufacturing's dominance as a target is not accidental. It is the sector where the economics of ransomware work best for the attacker.

What Actually Stops Ransomware from Reaching OT

Not every security control is equal. Here are the controls that matter most, ranked by their effectiveness at preventing ransomware from impacting OT operations.

RankControlWhat It DoesWhy It Matters
1IT/OT network segmentationPrevents ransomware from crossing from IT networks into OT networksBlocks the Phase 2 → Phase 3 transition entirely
2Microsegmentation within OTLimits lateral movement within OT zones so a single compromised device cannot reach all othersContains blast radius even if OT is breached
3Controlled vendor accessReplaces persistent VPN tunnels with per-session, authenticated, least-privilege accessEliminates the most common lateral movement path into OT
4Offline OT backupsMaintains tested, air-gapped backups of PLC logic, HMI projects, and SCADA configurationsEnables recovery without paying ransom
5Continuous OT monitoringBaselines normal OT network traffic and alerts on anomaliesDetects attacker activity during the reconnaissance phase before encryption
6MFA on all remote accessRequires multi-factor authentication for every remote sessionBlocks credential-based initial access
7Endpoint hardening on OT workstationsApplication allowlisting, USB restrictions, local admin removal on HMIs and engineering stationsPrevents ransomware execution on the devices operators use daily

Controls 1-3 are architectural. They require network changes, not just software deployment. They are also the controls that make the largest difference, because they address the structural reasons ransomware spreads so effectively in manufacturing environments.

Five Things to Do This Week

1. Map Your IT-to-OT Network Paths

You cannot segment what you have not mapped. Identify every network path between IT and OT: firewalls, dual-homed workstations, shared VLANs, vendor VPN tunnels, and any "temporary" connections that became permanent.

2. Enforce Segmentation at the IT/OT Boundary

At minimum, deploy a firewall or network access control appliance between IT and OT with a default-deny policy. Only allow traffic that is explicitly required and documented.

3. Replace Persistent Vendor Access with Per-Session Access

Every persistent VPN tunnel to a vendor is a standing invitation. Replace them with zero-trust access that authenticates each session, limits the scope of access, and terminates automatically.

4. Back Up OT Configurations Offline

Export PLC logic, HMI projects, historian configurations, and SCADA setups to offline storage. Test restoration. Do this weekly. If ransomware encrypts your engineering workstations, these backups are the difference between a week of recovery and a month.

5. Run a Tabletop Exercise

Simulate a ransomware attack that crosses from IT to OT. Identify who makes the decisions, what information they need, and where the gaps are. Do this before the real event forces you to discover the gaps under pressure.

A 49% surge in ransomware groups focused on industrial targets is not a trend that will reverse on its own. Manufacturing is the top target because the economics favor the attacker. Change the economics: segment your networks so ransomware cannot spread, control access so attackers cannot enter, and maintain backups so you never have to consider paying. For a framework to justify the investment internally, see our guide to building the business case for OT network segmentation.

Have a question? Ask Trout AI.

Get instant answers about our products, pricing, compliance coverage, and deployment options.