Daniel Kapellmann Zafra, Corey Hidelbrandt, Nathan Brubaker, and Keith Lunden of Mandiant write:
Data leaks have always been a concern for organizations. The exposure of sensitive information can result in damage to reputation, legal penalties, loss of intellectual property, and even impact the privacy of employees and customers. However, there is little research about the challenges posed to industrial organizations when threat actors disclose sensitive details about their OT security, production, operations, or technology.
In 2021, Mandiant Threat Intelligence continued observing ransomware operators attempting to extort thousands of victims by disclosing terabytes of stolen information on shaming sites. This trend, which we refer to as “Multifaceted Extortion,” impacted over 1,300 organizations from critical infrastructure and industrial production sectors in just one year.
[…]
We Found a Substantial Amount of OT Documentation
Finding sensitive OT documentation across such a large volume of files is not simple, but it is possible. Our findings included data from organizations across different sectors and regions. Although each of the leaks contained full information about the victim, we redacted their names and other proprietary information. We provide some examples of our findings below, but interested readers can sign up for a Mandiant Threat Intelligence Free account to view a version of this report that includes a more detailed appendix of our findings.
Table 1: Selection of findings
Read more at Mandiant.