Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How early decisions shape incident response investigations

EU’s Destination Earth project enters phase 3

Exclusive: Positron raises $230 million in Series B to take on Nvidia’s AI chips

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Study of 100+ Energy Systems Reveals Critical Gaps in OT Cybersecurity
Identity

Study of 100+ Energy Systems Reveals Critical Gaps in OT Cybersecurity

userBy userJanuary 29, 2026No Comments7 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

OMICRON’s investigation reveals widespread cybersecurity gaps in operational technology (OT) networks in substations, power plants, and control centers around the world. Based on data from more than 100 installations, this analysis highlights recurring technical, organizational, and functional issues that leave critical energy infrastructure vulnerable to cyberthreats.

The findings are based on several years of implementing OMICRON’s intrusion detection system (IDS) StationGuard into protection, automation, and control (PAC) systems. This technology, which passively monitors network traffic, provides deep visibility into real-world OT environments. The results highlight the growing attack surface in energy systems and the challenges operators face in securing aging infrastructure and complex network architectures.

Connecting IDS on PAC system (circle indicates mirror port)

StationGuard deployments are often performed during security assessments, which uncover vulnerabilities such as unpatched devices, insecure external connections, weak network segmentation, and incomplete asset inventories. These security weaknesses were often identified within the first 30 minutes of connecting to the network. In addition to security risks, the assessment also uncovered operational issues such as VLAN misconfigurations, time synchronization errors, and network redundancy issues.

In addition to technical shortcomings, the findings point to organizational factors that contribute to these risks, including unclear responsibility for OT security, limited resources, and departmental silos. These findings reflect growth trends across the energy sector. IT and OT environments are rapidly converging, but security measures often haven’t kept up. How are utilities adapting to these complex risks, and what gaps remain that could leave critical systems at risk?

Why does your OT network need intrusion detection?

The ability to detect security incidents is an integral part of most security frameworks and guidelines, such as the NIST Cybersecurity Framework, IEC 62443, and the ISO 27000 standard series. In substations, power plant control systems, and control centers, many devices operate without a standard operating system, making it impossible to install endpoint detection software. In such environments, discovery functionality must be implemented at the network level.

OMICRON’s StationGuard deployments typically use network mirror ports or Ethernet TAPs to passively monitor communications. In addition to detecting intrusions and cyber threats, IDS technology also provides important benefits, including:

Visualize network communications Identify unnecessary services and risky network connections Automatically create asset inventory Detect device vulnerabilities based on this inventory

Assessing risk: the methodology behind the findings

This report is based on many years of IDS installations. The first installation dates back to 2018. Since then, hundreds of installations and security assessments have been performed at substations, power plants, and control centers in dozens of countries. The findings fall into three categories:

Technical security risks Organizational security issues Operational and functional issues

In most cases, serious security and operational issues are discovered within minutes of connecting the IDS to the network.

Typically, sensors were connected to a mirror port on the OT network (often a gateway or other critical network entry point) to capture critical communication flows. In many substations, bay-level monitoring was not necessary because multicast propagation provides traffic visibility elsewhere in the network.

Hidden devices and asset blind spots

Accurate asset inventory is essential to protecting complex energy systems. Creating and maintaining such directories manually is time-consuming and error-prone. To address this, OMICRON used both passive and active methods for automatic asset discovery.

Identification of passive assets relies on existing system configuration description (SCD) files, standardized in IEC 61850-6, that contain detailed device information. However, passive monitoring alone proves to be insufficient in many cases, as critical data such as firmware version is not transmitted through normal PAC communication.

Active queries for device information, on the other hand, leverage the MMS protocol to retrieve nameplate data such as device name, manufacturer, model number, firmware version, and possibly hardware identifiers. This combination of passive and active technologies provided a comprehensive asset inventory throughout the installation.

Examples of device information available through SCL and MMS active queries

What are the most common technical cybersecurity risks?

OMICRON’s analysis identified several recurring technical issues across energy OT networks.

Vulnerable PAC devices:

Many PAC devices were found to be running outdated firmware that contained known vulnerabilities. A notable example is the CVE-2015-5374 vulnerability. This allows a denial of service attack against the protected relay with a single UDP packet. Although a patch has been available since 2015, many devices remain unpatched. Similar vulnerabilities exist in the GOOSE implementation and MMS protocol stack, creating additional risks.

Dangerous external connections:

In some installations, undocumented external TCP/IP connections were found, and in some cases there were more than 50 persistent connections to external IP addresses within a single substation.

Unnecessarily insecure services:

Common findings include unused Windows file sharing services (NetBIOS), IPv6 services, license management services running with elevated privileges, and unsecured PLC debug functionality.

Weak network segmentation:

Many facilities operated as a single large flat network, allowing unlimited communication between hundreds of devices. In some cases, even office IT networks were reachable from remote substations. Such an architecture greatly expands the scope of a cyber incident.

Unexpected device:

Untracked IP cameras, printers, and even automated devices frequently appeared on networks without being documented in asset inventories, creating significant blind spots for defenders.

Human factors: Organizational weaknesses in OT security

Beyond technical deficiencies, Omicron also observed recurring organizational challenges that exacerbate cyber risks. These include:

Functional boundaries between IT and OT teams Lack of dedicated OT security personnel Resource constraints restrict implementation of security controls

In many organizations, IT departments are still responsible for OT security. This model often struggles to address the unique requirements of energy infrastructure.

In case of operational failure: Substation functional risks

The introduction of IDS has also revealed a series of operational issues that are not directly related to cyber threats but still impact system reliability. The most common ones are:

VLAN issues were the most frequent, with VLAN tagging of GOOSE messages often being inconsistent across the network. RTU and SCD mismatches broke communication between devices and in some cases prevented SCADA updates. Time synchronization errors can range from simple misconfigurations to devices operating in the wrong time zone or default timestamp. Network redundancy issues related to RSTP loops and misconfigured switch chips caused severe performance degradation in some installations.

These operational weaknesses not only impact availability, but can also amplify the impact of a cyber incident.

Feature monitoring related alert messages

What can utilities learn from these findings?

Analysis of more than 100 energy facilities highlights the urgent need for robust, purpose-built security solutions designed for the unique challenges of operational technology environments.

With deep protocol understanding and asset visibility, StationGuard solutions give security teams the transparency and control they need to protect critical infrastructure. A built-in whitelist detects even the slightest deviation from expected behavior, and signature-based detection identifies known threats in real-time.

The system can monitor both IT and OT protocols such as IEC 104, MMS, and GOOSE, allowing utilities to detect and respond to threats at every layer of the substation network. By combining StationGuard with features such as automated asset inventory, role-based access control, and seamless integration into existing security workflows, organizations can increase resiliency without disrupting operations.

To learn more about how StationGuard is helping utilities close these critical security gaps, please visit our website.

station guard solution

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCurrent space debris problem could cost industry up to $42 billion
Next Article The Romans used human feces as medicine 1,900 years ago and used thyme to mask the smell.
user
  • Website

Related Posts

How early decisions shape incident response investigations

February 4, 2026

Microsoft warns that Python Infostears is targeting macOS via fake ads and installers

February 4, 2026

Eclipse Foundation requires pre-publication security checks for open VSX extensions

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How early decisions shape incident response investigations

EU’s Destination Earth project enters phase 3

Exclusive: Positron raises $230 million in Series B to take on Nvidia’s AI chips

EU releases new cancer prevention guidelines on World Cancer Day

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.