Attacks on Operational Technology From IBM X-Force and Dragos Data
In terms of initial infection vectors, X-Force incident response data indicates that vulnerability exploitation and stolen credentials are the most common entry points for adversaries.