<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — OT / ICS</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed-ot-ics.xml" rel="self" type="application/rss+xml"/><description>Items affecting operational-technology / industrial-control-system environments — energy, water, manufacturing, transport, and any item tagged ot-ics.</description><language>en</language><lastBuildDate>Sun, 10 May 2026 19:33:31 +0000</lastBuildDate><item><title>UPDATE: Polish water OT intrusions — ABW annual report names five facilities; APT28 / APT29 / UNC1151 formally attributed; NIS2 enforcement context</title><link>https://ctipilot.ch/briefs/2026-05-09/update-polish-water-ot-intrusions-abw-annual-report-names-five-facilities-apt28/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/update-polish-water-ot-intrusions-abw-annual-report-names-five-facilities-apt28/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>nation-state</category><category>ot-ics</category><category>russia-nexus</category><category>actively-exploited</category><category>europe</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p>
<p>Poland&#39;s Internal Security Agency (ABW) published its 2025 Annual Report on 2026-05-07, providing materially expanded detail beyond the initial reporting. The report names five municipal water facilities targeted in intrusion attempts during H2 2025 and Q1 2026: <strong>Jabłonna Lacka</strong>, <strong>Szczytno</strong>, <strong>Małdyty</strong>, <strong>Tolkmicko</strong>, and <strong>Sierakowo</strong>. All are smaller municipalities (populations 1,500–26,000) with limited IT security staff, consistent with the observed targeting pattern. ABW formally attributes the intrusion campaign to <strong>APT28</strong> (Russian GRU) for the initial-access and persistence phase, <strong>APT29</strong> (Russian SVR) for the intelligence-collection overlay observed at Jabłonna Lacka, and <strong>UNC1151</strong> (Belarusian GRU-affiliated, historically associated with Ghostwriter information operations) for a disinformation component: fabricated leak documents purporting to show contamination data. This represents more granular tri-attribution than the &quot;pro-Russian hacktivist&quot; framing used in initial reporting.</p>
<p>NIS2 Directive context: Poland transposed NIS2 into national law effective 2026-02-01 (Ustawa z dnia 28 listopada 2025 r. o krajowym systemie cyberbezpieczeństwa). Water distribution operators above the 50-employee threshold are now classified as Essential Entities under NIS2, subject to mandatory incident notification to CSIRT GOV (ABW) within 24/72 hours. ABW&#39;s annual report explicitly notes that the five named facilities fell below the NIS2 threshold at the time of intrusion, highlighting the coverage gap for small municipal operators. ABW is recommending legislative action to extend NIS2 obligations to critical-function entities regardless of headcount.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a" target="_blank" rel="noopener noreferrer">CISA AA24-207A — Russian GRU targeting critical infrastructure (background reference)</a></span></aside>]]></content:encoded></item><item><title>Pro-Russian hacktivists modify OT pump settings at five Polish water treatment facilities</title><link>https://ctipilot.ch/briefs/2026-05-08/pro-russian-hacktivists-modify-ot-pump-settings-at-five-polish-water-treatment-f/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-08/pro-russian-hacktivists-modify-ot-pump-settings-at-five-polish-water-treatment-f/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>nation-state</category><category>hacktivism</category><category>ot-ics</category><category>actively-exploited</category><category>russia-nexus</category><category>europe</category><description><![CDATA[<p>Poland&#39;s Internal Security Agency (ABW) disclosed that pro-Russian hacktivist actors penetrated the operational technology (OT) networks of five water treatment facilities and modified pump control parameters. At least one facility activated manual override procedures to prevent potential service disruption; no compromise of drinking water quality or supply loss was confirmed. ABW attributed the activity to actors operating in support of Russian geopolitical objectives but stopped short of formal state attribution. The attack pattern — IT/OT flat network exploitation leading to HMI manipulation — is consistent with prior campaigns attributed to <strong>NoName057(16)</strong> and <strong>Cyber Army of Russia Reborn</strong> in Central and Eastern European infrastructure. Polish water sector authorities and critical-infrastructure operators have been placed on heightened alert. The ABW advisory is a single-source national CERT/authority disclosure.</p>]]></description><content:encoded><![CDATA[<p>Poland&#39;s Internal Security Agency (ABW) disclosed that pro-Russian hacktivist actors penetrated the operational technology (OT) networks of five water treatment facilities and modified pump control parameters. At least one facility activated manual override procedures to prevent potential service disruption; no compromise of drinking water quality or supply loss was confirmed. ABW attributed the activity to actors operating in support of Russian geopolitical objectives but stopped short of formal state attribution. The attack pattern — IT/OT flat network exploitation leading to HMI manipulation — is consistent with prior campaigns attributed to <strong>NoName057(16)</strong> and <strong>Cyber Army of Russia Reborn</strong> in Central and Eastern European infrastructure. Polish water sector authorities and critical-infrastructure operators have been placed on heightened alert. The ABW advisory is a single-source national CERT/authority disclosure.</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://abw.gov.pl/pl/cyberbezpieczenstwo/" target="_blank" rel="noopener noreferrer">ABW — Cybersecurity Alert, Polish Water Sector OT Intrusion</a></span></aside>]]></content:encoded></item><item><title>Dragos 2025 OT Cybersecurity Year in Review: 81% of IR engagements found flat IT/OT network architecture</title><link>https://ctipilot.ch/briefs/2026-05-08/dragos-2025-ot-cybersecurity-year-in-review-81-of-ir-engagements-found-flat-it-o/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-08/dragos-2025-ot-cybersecurity-year-in-review-81-of-ir-engagements-found-flat-it-o/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>ot-ics</category><category>global</category><description><![CDATA[<p>Dragos released its <em>2025 OT Cybersecurity Year in Review — Frontlines IR Edition</em> synthesising findings from industrial incident response engagements. Key statistics: <strong>81% of engagements identified no meaningful IT/OT network segmentation</strong>, with operational networks reachable directly from enterprise IT; initial access via internet-exposed remote access tools (internet-facing HMI, unprotected VPN termination, or engineering workstation RDP) was the dominant entry vector in 62% of cases; and 34% of confirmed OT intrusions progressed to the operational process level before detection. The report documents NIS2 Annex-I compliance gaps, noting that many essential OT-operating entities have not completed required asset inventory reviews, which the report identifies as the most common control weakness. The IEC 62443 zoning and conduit model is highlighted as the primary reference architecture for remediation. Relevant to Swiss organisations operating under NCSC sector-specific ICS guidance (SARI framework).</p>]]></description><content:encoded><![CDATA[<p>Dragos released its <em>2025 OT Cybersecurity Year in Review — Frontlines IR Edition</em> synthesising findings from industrial incident response engagements. Key statistics: <strong>81% of engagements identified no meaningful IT/OT network segmentation</strong>, with operational networks reachable directly from enterprise IT; initial access via internet-exposed remote access tools (internet-facing HMI, unprotected VPN termination, or engineering workstation RDP) was the dominant entry vector in 62% of cases; and 34% of confirmed OT intrusions progressed to the operational process level before detection. The report documents NIS2 Annex-I compliance gaps, noting that many essential OT-operating entities have not completed required asset inventory reviews, which the report identifies as the most common control weakness. The IEC 62443 zoning and conduit model is highlighted as the primary reference architecture for remediation. Relevant to Swiss organisations operating under NCSC sector-specific ICS guidance (SARI framework).</p><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.dragos.com/year-in-review/" target="_blank" rel="noopener noreferrer">Dragos — 2025 OT Cybersecurity Year in Review</a></span></aside>]]></content:encoded></item></channel></rss>