Cybercriminals Exploit Malicious Scripts and Phishing Tactics to Compromise Industrial Control Systems

In the first half of 2025, industrial automation systems have increasingly become prime targets for sophisticated cybercriminals. These adversaries are deploying malicious scripts and phishing pages to infiltrate Industrial Control Systems (ICS) computers, exploiting vulnerabilities such as outdated interfaces, weak authentication protocols, and obsolete software within operational technology environments.

Emerging Threat Vectors

Cyber attackers have shifted their focus to web-based attack vectors, delivering malicious JavaScript payloads through compromised websites and phishing emails that mimic legitimate vendor portals or internal dashboards. When users interact with these deceptive pages, the embedded scripts execute automatically, enabling attackers to deploy subsequent payloads aimed at extracting credentials, establishing persistent backdoors, and facilitating lateral movement within the network.

Prevalence and Regional Impact

Data from Securelist indicates that in the second quarter of 2025, 6.49% of ICS computers had malicious scripts and phishing pages blocked, a slight decrease from the previous quarter. Despite this modest decline, these web-based threats remain the most prevalent in industrial networks, surpassing traditional malware types like trojans and keyloggers.

Geographically, Africa and Southeast Asia experienced the highest rates of infection attempts, while Northern Europe reported the least. The reduction in blocked scripts may suggest improved defensive measures and a strategic shift by attackers toward more targeted, low-volume campaigns.

Exploitation of Industrial Protocols

Analysts have observed that many attacks leverage common industrial protocols, such as Modbus and OPC UA, embedding command sequences within seemingly benign script hosts. By disguising control commands as part of legitimate maintenance interfaces, attackers can manipulate Programmable Logic Controllers (PLCs) and Supervisory Control and Data Acquisition (SCADA) systems without triggering conventional antivirus alerts.

Attack Methodology

Attackers often employ a multi-stage approach:

1. Initial Loader Script: A JavaScript snippet fetches and executes a second-stage payload from a remote server.

2. Second-Stage Downloader: This component retrieves a lightweight reverse shell written in Node.js, which is then written to disk and registered as a system service to ensure persistence across reboots.

3. Command Injection: WebSocket hooks are injected into the browser process to tunnel PLC commands through existing network channels.

To evade detection, attackers obfuscate function names and encode payloads in Base64, decoding them only at runtime.

Real-World Implications

Several high-impact campaigns have demonstrated the potential consequences of these attacks:

– Chemical Processing Line Manipulation: Adversaries altered setpoints, causing temperature fluctuations that triggered emergency shutdowns.

– Safety Interlock Disabling: Attackers used phishing pages mimicking a well-known remote support portal to steal privileged accounts, subsequently deploying malicious scripts that disabled safety interlocks.

Mitigation Strategies

To counter these threats, organizations should implement the following measures:

– Deep-Inspection Proxies: Deploy proxies capable of analyzing web traffic to detect and block malicious scripts.

– Multi-Factor Authentication (MFA): Enforce MFA on all ICS-facing web interfaces to prevent unauthorized access.

– Content Security Policies (CSP): Implement strict CSPs to control the sources from which scripts can be executed.

– Regular Software Updates: Ensure all systems are updated to patch known vulnerabilities.

– User Training: Educate employees on recognizing phishing attempts and the importance of not interacting with suspicious emails or websites.

Conclusion

The increasing sophistication of cyber attacks targeting ICS computers underscores the critical need for robust cybersecurity measures within industrial environments. By understanding the tactics employed by threat actors and implementing comprehensive security strategies, organizations can better protect their critical infrastructure from these evolving threats.