I Need IT Support Now
Ag Hacking
Shane

72 Threat Actors Are Targeting Your Food Supply Chain – What Houston Businesses Need to Know

How Ransomware Groups Target Food and Agriculture Companies – Practical Cybersecurity Steps for Food Supply Chain Companies

72 Threat Actors Are Targeting Your Food Supply Chain - What Houston Businesses Need to Know - CinchOps Blog
Cybersecurity Alert

72 Threat Actors Are Targeting Your Food Supply Chain - What Houston Businesses Need to Know

New Food and Ag-ISAC report exposes nation-state groups and ransomware operators behind persistent attacks on food infrastructure.

TL;DR
The Food and Ag-ISAC's 2025 Cyber Threat Report identifies 72 active threat actors targeting food supply chains - with Russia behind 59.3% of adversary activity and ransomware incidents surging 82% year over year. Every business in the food chain needs to act now.

The Food and Ag-ISAC just dropped its 2025 Food and Agriculture Cyber Threat Report, and the numbers should get the attention of every business connected to the food supply chain in Houston and Katy, Texas. Out of more than 330 monitored adversaries, 72 are actively targeting food and agriculture companies right now - a mix of nation-state operators and financially motivated cybercriminals going after everything from seed genetics to cold storage logistics.

This matters to Houston businesses for a direct reason. Texas is a major hub for food processing, distribution, and agricultural technology. If you're a manufacturer, distributor, or logistics company that touches the food supply chain, you're already in the crosshairs of groups backed by Russia and China. And the attacks aren't slowing down - they're accelerating.

Why this report matters locally: CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.
🎯
The 72 Threat Actors Hunting Food Supply Chains
Nation-state espionage and ransomware gangs are working in parallel to exploit food and agriculture.

The Food and Ag-ISAC used its Predictive Adversary Scoring System (PASS) to evaluate over 330 threat actors and flag the 72 that pose the most immediate risk to food and agriculture operations. The scoring factors in activity level, frequency of sector targeting, technical capabilities, and demonstrated intent.

The geographic breakdown tells you everything about the geopolitical motivations behind these attacks:

  • Russia - 59.3% of observed adversary activity. The majority of Russian-linked threats come from ransomware operators who sit beyond the reach of Western law enforcement. Indictments rarely result in arrests. Russia also runs active nation-state groups with a specific focus on food and agriculture infrastructure.
  • China - 25.4% of observed adversary activity. China's interest in the sector is heavily focused on intellectual property theft - seed genetics, agricultural biotechnology, trade secrets from food processing operations. This is long-term strategic espionage, not smash-and-grab ransomware.
  • Remaining 15%+ from other nation-states and cybercriminal groups. Hacktivist groups account for about 4% of observed actors, while additional financially motivated cybercriminal groups make up the rest.
Food and Ag-ISAC adversary breakdown showing threat actor categories targeting food supply chains
Source: Food and Ag-ISAC, The 2025 Food and Agriculture Cyber Threat Report

Among the top PASS scorers: APT18, a China-linked nation-state actor, scored 75 out of 100. Akira, one of the most active ransomware groups in the sector, scored 73. Adversaries with scores this high represent persistent, high-capability threats that don't go away when you patch one vulnerability. They adapt and come back through a different door.

The report also breaks down the type of actors by category. Ransomware groups make up over half of all threat actors observed in the food and ag sector. Cybercriminal groups account for another 15%. The rest are nation-state operators and hacktivists - and the nation-state actors tend to be the quietest and most patient.

📈
An 82% Ransomware Surge - And It's Not Slowing Down
Ransomware volume across all sectors exploded in 2025, and food companies are caught in the crossfire.

In partnership with the IT-ISAC, the Food and Ag-ISAC tracked 6,377 ransomware incidents across all critical infrastructure sectors in 2025 - an 82% increase over the 3,508 cases recorded in 2024. Since they began monitoring in 2020, the joint initiative has now documented more than 15,265 ransomware attacks.

Food and agriculture specifically took 265 hits in 2025, representing 4.2% of total ransomware volume. The five groups leading the charge against the sector were Qilin, Akira, CL0P, Play, and Lynx - together responsible for nearly 50% of all recorded incidents targeting food and ag.

Ransomware Group Sector Targeting Notable Tactic
Qilin Top food/ag attacker in 2025 Opportunistic scanning for exposed systems
Akira PASS score 73 - persistent sector presence Extortion-only operations (skipping encryption)
CL0P 9.3% of attacks hit food/ag (2x the average) Mass exploitation of file transfer vulnerabilities
Play Broad cross-sector targeting Double extortion with data theft
Lynx Rising actor in 2025 Supply chain-focused intrusions

CL0P stands out as a partial exception to the typical "spray and pray" model. At 9.3% of its total attacks directed at food and ag, it's targeting the sector at more than double the average rate across all groups - which suggests some degree of intentional focus on food supply chain businesses.

Top 10 threat actors targeting the food and agriculture sector ranked by PASS score
Source: Food and Ag-ISAC, The 2025 Food and Agriculture Cyber Threat Report
Cyber Takeaway

The bigger pattern here: most ransomware groups don't specifically select food companies as targets. They scan for exposed systems, buy access from brokers, and exploit any vulnerable organization they find. Food and agriculture businesses get swept up because they tend to run older systems, rely on just-in-time delivery models that create urgency to pay, and often lack the cybersecurity maturity of sectors like banking or defense.

⚔️
How These Threat Actors Get Inside Your Network
The most common attack techniques rely on tools your own systems already have installed.

The PASS analysis revealed clear patterns in how these 72 threat actors operate. The percentages below represent how frequently each tactic appears across the monitored adversaries:

  • Living off the Land (LOTL) - 90% of adversaries. Attackers use tools already present on your systems - PowerShell, Windows Management Instrumentation, remote desktop protocols. Because they're using legitimate software, traditional antivirus often misses the activity entirely.
  • Targeted spear-phishing - 83% of adversaries. Not the clumsy mass phishing emails of a few years ago. These are researched, customized messages targeting specific individuals inside your organization - often an accounts payable clerk, an operations manager, or someone with VPN credentials.
  • Custom malware development - 80% of adversaries. Threat actors are building purpose-built tools designed to bypass your specific security stack. Off-the-shelf security solutions alone won't catch these.
  • Stealthy exfiltration and persistence - 70% of adversaries. Once inside, they stay quiet. They establish persistence mechanisms that survive reboots and patches, then slowly siphon data out over weeks or months before anyone notices.
  • Data encryption for impact - 65% of adversaries. The classic ransomware play - encrypt everything and demand payment. But increasingly, groups are skipping encryption entirely and going straight to data theft with extortion threats.
  • Zero-day exploitation - 42% of adversaries. Nearly half of these groups have demonstrated the ability to exploit vulnerabilities that have no available patch. That's a high-capability indicator.
Sophistication of technique breakdown showing TTPs used by food and agriculture threat actors
Source: Food and Ag-ISAC, The 2025 Food and Agriculture Cyber Threat Report

The shift toward double extortion deserves special attention. Even if you have good backups and can restore your systems, the attackers still hold your stolen data. Client records, employee information, proprietary formulations, distribution contracts - all of it becomes a negotiation chip. We see this pattern at least twice a month with Houston-area businesses across different industries.

⚠️

The Living off the Land Problem

When 90% of threat actors are using your own system tools against you, traditional antivirus is not enough. You need behavioral monitoring that can detect unusual patterns in how legitimate tools are being used - not just signature-based scanning for known malware.

Learn about CinchOps cybersecurity monitoring →
💥
When Food Supply Chains Go Dark
Recent attacks have shut down manufacturing plants, disrupted grocery chains, and cost hundreds of millions in damages.

These aren't theoretical risks. The past two years have produced a steady stream of real incidents that show exactly what happens when a food supply chain company gets hit:

  • United Natural Foods (UNFI): A cyberattack caused roughly $400 million in supply chain disruption for one of the largest grocery wholesalers in North America. That single incident affected store shelves across multiple states.
  • Coca-Cola (2025): The Everest ransomware group claimed to have stolen over 23 million internal messages from the company's systems.
  • Ahold Delhaize (November 2024): A ransomware attack on one of the world's largest food retail groups disrupted supply chain and delivery operations across the U.S.
  • Stop & Shop (November 2024): A cybersecurity incident caused shortages of fresh produce, meat, and dairy products in several states.
  • Blue Yonder (November 2024): An attack on this supply chain technology provider cascaded to clients including Starbucks, Morrisons, and Sainsbury's - a textbook example of how hitting one supplier can take out hundreds of downstream operations.

The food and agriculture sector represents roughly one-fifth of the U.S. economy. When a food producer goes offline, the effects aren't contained to one company. Products don't get made. Trucks don't get loaded. Shelves don't get stocked. The just-in-time delivery model that makes the food supply chain efficient also makes it extremely fragile when any link gets disrupted.

SMB Takeaway: For small and mid-sized businesses in the Houston area - companies with 10-200 employees operating in manufacturing, distribution, or food processing - the lesson is clear. You don't have to be a Fortune 500 company to be worth attacking. Ransomware groups are opportunistic. They scan for exposed systems and don't care whether you're a 50-person food packaging company in Katy or a multinational conglomerate.
🔮
What the 2026 Threat Outlook Looks Like
The Food and Ag-ISAC's forward-looking assessment points to four trends that will make things harder.

The report doesn't just look backward. The Food and Ag-ISAC's 2026 outlook identifies several shifts that will increase pressure on the sector:

  • Ransomware group fragmentation. The big-brand ransomware operations (LockBit, BlackCat/ALPHV) that dominated 2023-2024 have splintered into smaller, more agile cells. These groups have shorter lifespans, making them harder for law enforcement to track and dismantle. When one goes down, three more pop up.
  • DDoS layered on top of ransomware. Attackers are adding distributed denial-of-service attacks to their playbook. Even if you can restore from backups and avoid paying the ransom, a sustained DDoS attack can keep your customer portals, logistics APIs, and ordering systems offline - forcing you back to the negotiating table.
  • Hypervisor and SaaS targeting. Expect continued attacks on VMware ESXi and other hypervisors, as well as SaaS providers used by food companies. One successful attack on the underlying infrastructure can take down hundreds of victim networks simultaneously.
  • AI-powered social engineering. Deepfake voice and video technology is already being used to impersonate executives and IT staff. In 2026, expect hyper-realistic voice clones of CEOs requesting urgent wire transfers or IT directors instructing employees to disable security controls.

The Farm and Food Cybersecurity Act (H.R. 7062) is working its way through Congress, which would direct CISA to deliver vulnerability assessments for the sector every two years and run annual cross-sector simulation exercises. That's a start, but legislation moves slowly. The threats documented in this report are active right now.

🛡️
How CinchOps Can Help
Practical cybersecurity for Houston-area businesses connected to food supply chains.

In 30+ years of managing IT systems for businesses across multiple industries, the pattern we see most often is companies that don't realize they're exposed until after an incident. The threats described in this report - living off the land techniques, targeted spear-phishing, data exfiltration - require proactive detection, not reactive response. CinchOps provides the managed IT support and cybersecurity monitoring that food supply chain businesses in Katy, Houston, Sugar Land, and Cypress need to stay ahead of these threats.

  • 24/7 Endpoint Detection and Response (EDR): Behavioral monitoring that catches living-off-the-land attacks - not just known malware signatures. When PowerShell starts behaving unusually at 2 AM, we see it.
  • Phishing Simulation and Security Awareness Training: 83% of these threat actors use spear-phishing. Your employees are the first line of defense, and we help make sure they know what to look for.
  • Vulnerability Assessment and Patch Management: Exposed systems are how 42% of these groups get in. We identify and close those gaps before the scanners find you.
  • Business Continuity and Disaster Recovery Planning: When a ransomware attack hits, the question is how fast you recover - not if. CinchOps builds business continuity plans that include air-gapped backups, tested recovery procedures, and defined SLAs.
  • Network Security and Segmentation: If an attacker gets into one system, microsegmentation prevents them from moving laterally through your entire network. This is especially important for businesses running OT/ICS systems alongside standard IT infrastructure.
  • Incident Response Planning: We build and test incident response plans before you need them - including tabletop exercises that simulate the exact scenarios this report describes.

The food supply chain is critical infrastructure. If your business touches it - whether you're a manufacturer, distributor, cold storage operator, or food processor - the threats in this report apply to you. Don't wait for an incident to find out where your gaps are.

Frequently Asked Questions

What is the Food and Ag-ISAC and why does its threat report matter?

The Food and Agriculture Information Sharing and Analysis Center is a threat intelligence organization founded in 2023 by major food companies including PepsiCo, Tyson Foods, and Cargill. Its 2025 Cyber Threat Report matters because it identifies 72 active threat actors targeting food supply chains and provides detailed analysis of their methods, origins, and targets - intelligence that helps businesses defend against specific, documented threats.

Are small food companies in Katy and Houston at risk from these threat actors?

Yes. The report confirms that most ransomware campaigns are opportunistic - attackers scan for exposed systems and exploit any vulnerable organization regardless of size. Small and mid-sized food companies in the Houston metro area often run older systems and lack dedicated cybersecurity staff, which makes them attractive targets. A managed IT services provider with cybersecurity expertise can close these gaps.

What is the most common attack method used against food and agriculture companies?

Living off the land (LOTL) techniques are used by 90% of the 72 identified threat actors. These attacks use legitimate tools already installed on your systems - PowerShell, WMI, remote desktop - making them extremely difficult for traditional antivirus to detect. Behavioral monitoring and endpoint detection and response (EDR) solutions are necessary to catch this type of activity.

How can a cybersecurity provider near me help protect against food supply chain attacks?

A local cybersecurity provider like CinchOps in Katy, Texas delivers ongoing monitoring, vulnerability management, employee training, and incident response planning tailored to your business. The combination of 24/7 EDR, regular patching, phishing awareness training, and tested backup procedures addresses the specific tactics these 72 threat actors use to breach food supply chain companies.

What should Houston-area food businesses do first to improve their cybersecurity?

Start with three actions: enable multi-factor authentication on all accounts, ensure all systems are patched and updated, and verify that your backups are air-gapped and regularly tested. These three steps address the most common initial access methods identified in the Food and Ag-ISAC report. A full security assessment will identify additional gaps specific to your environment.

100% Free

Know Your Business Security Score

Get a FREE comprehensive security assessment for your Houston area business. Understand vulnerabilities across your network, applications, DNS, and more.

📚
Discover More

Take Your IT to the Next Level!

Book A Consultation for a Free Managed IT Quote

281-269-6506