The context: The 2025 OT Cyber Threat Report, published by Waterfall Security and ICS STRIVE, compiles incidents from 2024 that had physical consequences for operational technology systems. These are not theoretical scenarios, they’re documented disruptions where cyberattacks led to real-world outcomes: shutdowns, damaged equipment, lost revenue, and national security concerns.
This year’s data confirms what process-oriented defenders have long suspected: the gap between cyber visibility and physical reality is widening. And the only way to close it is by monitoring what’s actually happening at Level 0.
While the number of attacks rose only slightly (76 in 2024 vs. 72 in 2023), the scale of impact expanded dramatically:
The report classifies most attacks as either ransomware (87%) or nation-state operations. But notably:
This aligns with two known weak points:
The report focuses on publicly disclosed incidents with confirmed physical outcomes. It does not (and cannot) track:
This is where traditional OT detection models fall short. If a company’s security stack doesn’t include direct visibility into process-level data – pressure, flow, voltage, actuation -they are relying on inference. And inference is not protection.
The report provides a conservative picture: one that undercounts the scale of the threat. It does, however, make a powerful argument for change:
The authors call for hardened, deterministic protections. But without continuous monitoring of Level 0 behavior, you cannot verify whether those protections are working.
Notable Examples of OT Cyber Incidents in 2025
Oil & Gas: RECOPE (Costa Rica) – A ransomware attack on Costa Rica’s state energy company forced the operator to switch to manual operations, disrupting cargo handling at land and sea terminals due to safety concerns.
Building Automation: Johnson Controls (USA) – A ransomware attack disrupted operations across Johnson Controls and its subsidiaries, including York and Tyco, impacting federal building security systems and prompting a DHS investigation.
Power: Fortum Oyj (Finland) – Finland’s largest power company reported persistent daily cyber intrusion attempts and drone sightings over critical infrastructure sites, indicating hybrid surveillance and intrusion tactics by likely nation-state actors.
Water: Tipton Municipal Utilities (USA) – A Russian-linked threat group (CARR/Sandworm) claimed to have remotely mis-operated a water treatment HMI; the utility remained operational but confirmed the breach occurred
The 2025 report makes clear that OT-targeted attacks are becoming more frequent, more scalable, and more advanced. But it also reinforces something the report doesn’t directly measure: attackers are succeeding not just because they break in -but because defenders don’t have visibility into what happens next.
If security architecture can’t see the physical process, it can’t protect it.