Why is Cybersecurity in Mining More Important Now than Ever? - The Race to Secure Critical Minerals
If you work in cybersecurity in mining, it is easy to forget why we do what we do. We are not in the cybersecurity business; we are not merely...
1 min read
Cherie Burgett : May 13, 2025 12:00:00 AM
At the Mining and Metals ISAC, we monitor cyber incidents and track trends within the mining and metals sector. Compared to last year, incidents have more than doubled Q1, with April and May continuing the trend. Why might this be? A few reasons could explain the spike in incident activity in our sector.
Third-party risks, new technology, and, of course, the newest big player is AI. More employees are using Generative AI in their daily work and life tasks.
The attacker disclosed the majority of reported incidents. Threat actors have used the name and shame tactic for several years to increase the pressure to pay. However, as Ransomware as a Service (RaaS) operations share tactics, many threat actors are skipping this part of the negotiation and going straight to posting the company information on their dark web blog sites. In some cases, before the company even knows they have been breached.
Critical Minerals have received a lot of attention in recent months, particularly with tariffs impacting trade. Sixty percent of the incidents tracked in the first quarter targeted companies in the US and Canada, accounting for a significant reason for the increase. As nations race to secure their access to critical minerals, Mining and metals become a strategic play for nation states, and a tempting target for hacktivists and financial opportunists.
While most incidents were found on the dark web, a few reported incidents can be attributed to better sharing within the ISAC community. We know more because we share more. Please continue to share your incidents, intelligence, and questions with the MM-ISAC so we can bring you the best available information and analysis for the metals and mining sectors.
If you work in cybersecurity in mining, it is easy to forget why we do what we do. We are not in the cybersecurity business; we are not merely...
This article will be the first of a series on how centuries-old techniques in interpretation – Hermeneutics can be used to interpret information to...
Threat intelligence can be extremely valuable for informing business decisions and strategies beyond detection and response, enabling agility in...