{"id":10620,"date":"2022-01-31T19:33:40","date_gmt":"2022-01-31T18:33:40","guid":{"rendered":"https:\/\/www.show.it\/ot-data-stolen-by-ransomware-gangs-can-facilitate-cyber-physical-attacks\/"},"modified":"2022-01-31T19:33:40","modified_gmt":"2022-01-31T18:33:40","slug":"ot-data-stolen-by-ransomware-gangs-can-facilitate-cyber-physical-attacks","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/ot-data-stolen-by-ransomware-gangs-can-facilitate-cyber-physical-attacks\/","title":{"rendered":"OT Data Stolen by Ransomware Gangs Can Facilitate Cyber-Physical Attacks"},"content":{"rendered":"<p><strong><span><span>Many of the ransomware attacks on industrial and critical infrastructure organizations result in the exposure of operational technology (OT) data that could be useful to threat actors, including to conduct cyber-physical attacks, according to Mandiant.<\/span><\/span><\/strong><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/ot-data-stolen-ransomware-gangs-can-facilitate-cyber-physical-attacks\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=yIl2AUoC8zA\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=6nu7cXLZt8M:_7kZB2kyXrY:-BTjWOF_DHI\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=dnMXMwOfBR0\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=6nu7cXLZt8M:_7kZB2kyXrY:V_sGLiPBpWU\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=qj6IDK7rITs\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=6nu7cXLZt8M:_7kZB2kyXrY:gIN9vFwOqvQ\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:TzevzKxY174\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=TzevzKxY174\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=6nu7cXLZt8M:_7kZB2kyXrY:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=6nu7cXLZt8M:_7kZB2kyXrY:F7zBnMyn0Lo\" border=\"0\"><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Many of the ransomware attacks on industrial and critical infrastructure organizations result in the exposure of operational technology (OT) data that could be useful to threat actors, including to conduct cyber-physical attacks, according to Mandiant. read more<\/p>\n","protected":false},"author":2,"featured_media":10621,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[43,11],"tags":[],"class_list":["post-10620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ics-ot","category-news-industry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/10620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=10620"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/10620\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/10621"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=10620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=10620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=10620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}