Podcast: Why Is manufacturing such a huge target for cyberattacks?

In this episode of Great Question: A Manufacturing Podcast, Jennifer Szkatulski of Immersive Labs explains why ransomware targets manufacturers and how to respond.
April 7, 2026
19 min read

Key Highlights

  • Manufacturing is a top ransomware target due to valuable data and pressure to maintain uptime.
  • IT system breaches can disrupt OT operations, causing costly downtime across supply chains.
  • Continuous cyber readiness—benchmarking, exercising, improving—is key to resilience.
  • Cybersecurity requires a full-business approach, not just IT, with easy incident reporting critical.
Listen on Apple buttonListen on Spotify buttonListen on iHeartRadio buttonListen on Podbean button

In this episode of Great Question: A Manufacturing Podcast, Jennifer Szkatulski of Immersive Labs talks with Smart Industry's Sarah Mattalian about why manufacturers are prime targets for cyberattacks, particularly ransomware, and the far-reaching impact on operations and supply chains. She breaks down how attacks occur—from phishing and credential theft to system infiltration—and how even IT breaches can disrupt production environments. The conversation also highlights emerging risks tied to AI, insider vulnerabilities, and interconnected supplier networks.

Below is an excerpt from the podcast:

Sarah Mattalian: Before working at Immersive as lead cyber resilience advisor, Jen has served as an attacker, defender, and advisor at various organizations, including the National Security Agency and IBM. During her 15 plus years in the cybersecurity industry, she has contributed to over 30 patents and publications across cybersecurity, AI, quantum computing, and emerging technologies. As an ethical certified ICS cybersecurity professional, and nine-year DEF con goon. She helps organizations amplify their cyber resilience through gamified exercising, upskilling, and strategy programming. Jen, I'll let you take it from here.

Jennifer Szkatulski: Thank you. I'm excited to be here today. Manufacturing is a very important element of my life as I'm a consumer of things that you make, store, and move. So I'm excited to share what I can about how to make sure organizations in the manufacturing industry are secure and resilient.

SM: Great, thanks again for joining today. I wanted to start off by asking about the material you covered at the workshop, which covered topics of business continuity, attacks frameworks, and OT fundamentals. Why is manufacturing such a huge target for cyber attacks, specifically ransomware, and what are some of the impacts on manufacturing companies?

JS: As you mentioned, manufacturing is one of the top targeted industries by attackers. The reason for that is they have a lot of great rich data, intellectual property, contract data, employee data, salaries. There's a lot of information there that is very attractive to attackers. And because the manufacturing industry is so reliant upon operations, uptime, delivering things in a timely manner, it's a really great opportunity for attackers to capitalize on that, specifically with ransomware, because there is such a deep desire to keep those operations running that a lot of organizations are often in the position where they are willing to pay. 

So if a criminal threat group, if their primary motive is for financial gains, manufacturing is really attractive to them. It's really difficult. There are a lot of difficult challenges in the manufacturing industry versus other industries and make it harder to secure those systems as well. So really, the impact is something that is far more expansive in manufacturing than some other industries as well. The ecosystem, the supply chain ecosystem, if you think of the impact of manufacturing industry, there's so many opportunities for an attacker to attack one organization. and impact multiple at the same time. So it's a really attractive target.

SM: So let's get into a little bit. In terms of cyber attacks, can you kind of describe from start to finish how they occur? What does the process look like? And can we also kind of game out an attack scenario?

JS: Yeah, so it depends a bit on the motivation of the attacker. But ultimately, it comes down to this. They want to get initial access into the system first. So if you can imagine, you're sitting at your computer working, you receive an e-mail, and it's a phishing e-mail. e-mail. You might not know that right away. Phishing emails can be very, very deceptive and very hard to detect. Sometimes you receive an e-mail, you think it's legitimate. Maybe it's an e-mail. This is a terrible one, but maybe it's an e-mail saying here, log in for your gift card for all the great work you did last month and you enter your credentials. Stolen credentials is a really great way for attackers to get into a system, so a phishing e-mail might capture credentials or that phishing e-mail might have you click on a link that installs some sort of malware. 

Once an attacker is in the system, they're going to look around. They're going to try to move around in your system, so they'll see what software you have, what hardware you have. They might actually use your own software against you. PowerShell or some other they call living off the land, so they're using your tools against you. If you have VPN connectivity, they'll be able to pull in additional tools, perhaps. So ultimately, they get that initial access, and then they try to move around in your system, understand it, and get more access. 

Once they do that, it really just comes down to what they want to do with that. Do they want to drop ransomware? Do they want to exfiltrate data, get some information from your system, intellectual property, et cetera? And then they'll either, if their goal is to get money from you, maybe export you, remove all their tools at the end, hide their tracks and leave. So it's a really interesting scenario where they are able to get in using credentials, phishing emails, et cetera, move around, get higher privileges, and then install their malware to achieve their goal.

SM: And so I also see that you've had on the dock Stryker as an example. Was that what you kind of just discussed or is there kind of more to that?

JS: Stryker is a great example here because it really shows how an attacker can get into a system, cause damage, interrupt operations. And they did that the same way. So they compromised an administrative account. So an administrative account has a lot of privileges. They can do a lot of things, right? And once they did that, they were able to look around, like I mentioned before, and see what tools were available to them to either implement their damage or to pull in more of their tools to do that. 

They used this to remotely wipe a lot of devices and potentially access that sensitive data. They did this using those legitimate tools, tools that were on or software that was on those systems, and they were able to carry out that operations. So Stryker being a manufacturing organization creating medical devices, this impacted their operations. I want to point out that this was their IT side. They didn't attack the OT side. They didn't attack the operations, the devices that make the things. They attacked the system where people work day-to-day. And that was enough to disable their ability to deploy software to see the health of those devices and they had to that impacted operations that impacted their ability to make the things that they make. 

So Stryker is a really great example of how an attacker was able to get that initial access, move around, use the software in the environment and. wiped devices essentially to shut them out.

SM: And when did that attack occur?

JS: So that actually is funny because that occurred early last month or mid last month. I was actually in the hospital at the time that this was occurring or as it was ending. And it was funny to hear it didn't really affect where I was in the hospital, but you could hear people talking about it because devices are really important and oftentimes there's a shortage of devices and hospitals or a limited amount. And so anytime there's a disruption in being able to receive more of the equipment that they need, it impacts even at the front lines level. So that was last March and I got a front seat to how that slightly impacted from a patient side.

Contributors:

About the Author

Sarah Mattalian

Sarah Mattalian is a staff writer for EndeavorB2B's Manufacturing Group.

Sign up for our eNewsletters
Get the latest news and updates