Honeywell Cyber Threat Report 2025

The Honeywell 2025 Cyber Threat Report highlights increased ransomware incidents, notably by the CL0P group, and a surge in USB-carried Trojan and worm attacks like Win32.Worm.Ramnit. It emphasizes evolving operational technology risks across sectors such as water, transportation, and agriculture, alongside detailed recommendations for enhanced industrial cybersecurity practices. #CL0P #Win32WormRamnit #HoneywellAMIR #HoneywellSMX

Keypoints

  • The report typically includes sections like Executive Summary, Threat Report Updates, Data and Methodology, Key Findings, Product and Community Intelligence, and Recommendations for cybersecurity teams.
  • Data derives from Honeywell cybersecurity solutions analyzing billions of logs and millions of files globally from October 2024 to March 2025.
  • Key statistics reveal a 46% increase in ransomware extortion incidents with 2,472 additional victims in early 2025 and a 3,000% rise in Win32.Worm.Ramnit infections targeting industrial credentials.
  • Ransomware groups such as CL0P dominate activity, and 55% of SEC-reported incidents targeted operational technology (OT) environments impacting manufacturing, water, and transportation sectors.
  • Regional risks emphasize high threat levels within the European Union, urging policy improvements, cyber crisis management, and skills development.
  • Sector targeting trends show exponential increases in attacks on agriculture and public services, with incidents disrupting water utilities, transit systems, and airlines globally.
  • Threat types include user access abuses, ransomware exploiting phishing and social engineering, and security system compromises such as patch and update manipulations.
  • Honeywell Advanced Monitoring and Incident Response (AMIR) identified 107 unique incidents including USB plug-and-play events (25% of top incidents) and unauthorized account privilege changes.
  • Honeywell Secure Media Exchange (SMX) scanned over 31 million files detecting 1,826 unique threats, including rising Trojans and worms requiring continuous automated updates.
  • Recommendations stress developing policies, training employees, enforcing USB security, deploying multi-factor authentication, network segmentation, Zero Trust Architecture, regular software updates, encryption, backups, vulnerability assessments, and alignment with industry standards like NIST 800-82 and IEC 62443.
  • Honeywell solutions including AMIR, SMX, Cyber Insights, Cyber Watch, and Professional Cybersecurity Services provide multi-layered protection through monitoring, threat intelligence, and managed services tailored for industrial control systems.
Honeywell-Cyber-Threat-Report-2025
Source: Awesome Annual Security Reports - The reports in this collection are limited to content which does not require a paid subscription, membership, or service contract. (https://github.com/jacobdjwilson/awesome-annual-security-reports/)

Download Report from Github