Declining Cybersecurity Landscape in ICS Environments
The latest findings by Kaspersky reveal a notable decline in the percentage of industrial control system (ICS) computers successfully blocking malicious activities over the past three years. As of Q4 2025, only 19.7% were protected, reflecting a consistent decrease in security efficacy.
The analysis indicates a worrying trend in cybersecurity within ICS environments, particularly highlighting the increasing risk posed by sophisticated malicious platforms. The decline in blocked malicious objects was recorded across various regions, with notable figures ranging from 8.5% in Northern Europe to 27.3% in Africa. While there were slight increases in areas such as Southern Europe and South Asia, the overall trend points to diminished protective measures against threats. Variations in regional data are illustrated in the accompanying images, showing the stark differences in threat exposure globally.
A significant upward trend is associated with the Backdoor.MSIL.XWorm, which emerged as a prominent threat in Q4 2025. This self-propagating malware exploited phishing schemes specifically targeting human resources professionals by masquerading as job applications. The cyber attacks occurred in waves, primarily affecting regions like Russia, Western Europe, and North America, but notably intensified in Southern Europe. The infection cycle appears to leverage both emails and compromised removable media, particularly in areas where such storage devices remain prevalent.
Defensive Context
Organizations in critical infrastructure sectors, particularly those involved in industrial operations, should be increasingly vigilant. As the statistics demonstrate, ICS environments are facing a persistent and rising threat level from malicious software. This threat landscape shift is most pertinent to sectors with historically lenient cybersecurity measures, such as biometrics, where the potential for exploitation is heightened due to less stringent controls.
The most affected sectors include those with high internet accessibility and minimal organizational security measures. The implications are significant for industries that rely heavily on ICS, as the upward trend of specific malware types, as well as the decreasing efficacy of existing protective mechanisms, can lead to crippling operational disruptions.
Why This Matters
The implications of these findings extend beyond data statistics; they emphasize a real-world risk for industries dependent on ICS frameworks. Organizations with fewer resources or outdated security practices are especially vulnerable. The increasing sophistication of phishing tactics and the emergence of adaptable malware like Backdoor.MSIL.XWorm necessitate immediate attention from cybersecurity defenders.
Defender Considerations
Based on the report data, immediate action could involve increased monitoring and scrutiny of email filtering systems, particularly those handling attachments. The highlighted rise in threats from email clients suggests a need for enhanced practices around managing email security to avoid similar exploitations. Further, regions with unaddressed gaps in security responses should prioritize proactive threat detection mechanisms, particularly regarding removable media usage and phishing attack identification.
Key Technical References
- Backdoor.MSIL.XWorm
- Curriculum-vitae-catalina phishing campaign
- Various malware families: total of 10,142 detected in Q4 2025.
Overall, the observed downward trend in malicious object blocking underscores the necessity for enhanced strategies and immediate actions to counteract growing cyber threats.



