Friday, May 1, 2026
Independent Technology Journalism  ·  Est. 2026
Cybersecurity

Critical Infrastructure Under Siege: Who's Actually Winning

A Substation in Ohio, a Cursor Blinking, and $14 Million Gone On a Tuesday morning in March 2026, operators at a regional electricity distribution company in northeastern Ohio noticed anomal...

Critical Infrastructure Under Siege: Who's Actually Winning

A Substation in Ohio, a Cursor Blinking, and $14 Million Gone

On a Tuesday morning in March 2026, operators at a regional electricity distribution company in northeastern Ohio noticed anomalous SCADA telemetry — voltage readings fluctuating on a segment of the grid that should have been idle. By the time the incident response team traced the intrusion to a compromised Schweitzer Engineering relay using a known vulnerability catalogued as CVE-2025-38841, attackers had already been resident in the operational technology (OT) network for eleven days. The total cost of remediation, lost capacity contracts, and regulatory fines: $14 million. No lights went out. That part was lucky.

That incident is not unique. It's increasingly ordinary. In 2026, attacks on critical infrastructure — energy, water, transportation, telecommunications — have climbed 43% year-over-year according to data compiled by Dragos, the OT-focused security firm that published its annual Industrial Cybersecurity Report in September. The scale is not a surprise to practitioners. But the sophistication, speed, and geopolitical coordination behind many of these campaigns absolutely is.

The OT/IT Convergence Problem Nobody Solved Cleanly

For decades, operational technology systems — the PLCs, RTUs, and industrial control systems that physically manage infrastructure — ran in isolation. Air-gapped. Serial protocols. No TCP/IP. Security through obscurity, which was never really security at all, but it was effective enough when the internet didn't touch your turbine.

That era ended gradually, then suddenly. Cloud monitoring, remote access requirements accelerated by COVID-era staffing models, and the push to integrate IT analytics with OT efficiency data have collapsed that wall. We now have environments where a Siemens S7-1500 PLC sits on the same network segment as a Windows 10 workstation running unpatched firmware. The attack surface didn't grow linearly. It exploded.

"The fundamental error was treating IT security frameworks as directly portable to OT environments," said Dr. Priya Rathod, principal researcher at Idaho National Laboratory's Cybercore Integration Center. "In IT, availability is third in the CIA triad. In OT, it's first. Patch a server Tuesday morning — fine. Take a water treatment controller offline to patch it — you've just potentially disrupted service to 40,000 people. The risk calculus is completely different."

"We keep designing OT security programs that assume downtime is acceptable. It isn't. That assumption is costing us real ground against adversaries who figured this out years ago." — Dr. Priya Rathod, Idaho National Laboratory

This tension has no clean resolution. Defenders have to operate within constraints that attackers simply don't face. And the adversaries — primarily state-linked groups attributed to China, Russia, and Iran by CISA's October 2026 advisory — are patient. They're not necessarily trying to blow things up today. They're pre-positioning. Establishing persistence now to activate during a geopolitical crisis later. That's a fundamentally different threat model than ransomware, and most incident response playbooks weren't written for it.

What the Standards Actually Require — and Where They Fall Short

The regulatory structure governing critical infrastructure protection in the U.S. is a patchwork. Energy sector entities subject to NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) standards face mandatory cybersecurity controls — NERC CIP-013 for supply chain risk management being one of the more recently enforced. Water utilities fall under America's Water Infrastructure Act and EPA guidance. Pipeline operators now answer to TSA's Security Directive Pipeline-2021-02D, updated in 2024 to include more prescriptive OT-specific requirements.

The problem isn't the absence of standards. It's the variance in enforcement rigor and the sheer complexity of compliance across sectors. A medium-sized municipal water authority operating on a $2.3 million annual IT budget cannot realistically achieve the same security posture as a major investor-owned utility. And compliance theater — checkbox exercises that satisfy auditors without materially reducing risk — remains depressingly common.

Marcus Velletti, director of critical infrastructure strategy at Claroty, put it bluntly when we spoke with him in October: "NERC CIP covers high-impact and medium-impact bulk electric system assets. There are hundreds of distribution-level utilities and co-ops that fall below that threshold and operate with essentially no mandatory cybersecurity requirements. Adversaries know this. They target the soft underbelly."

Sector Primary Governing Standard Mandatory OT Controls? Estimated Compliance Rate (2026)
Bulk Electric (large utilities) NERC CIP-002 through CIP-014 Yes ~84%
Natural Gas Pipelines TSA SD Pipeline-2021-02D Yes (since 2022) ~71%
Water & Wastewater AWIA / EPA Cybersecurity Plan Partial (no OT mandate) ~39%
Municipal Transit TSA Cybersecurity Roadmap Voluntary guidelines only ~28%

The water sector number — 39% — is the one that keeps practitioners awake. After the 2021 Oldsmar, Florida incident where an attacker remotely modified sodium hydroxide levels in a water treatment plant, there was genuine congressional momentum for stronger mandates. That momentum dissipated. And here we are five years later, still relying largely on voluntary frameworks in a sector that serves nearly every American.

Microsoft and Dragos Are Betting on AI-Driven OT Detection — With Caveats

The vendor response to this crisis has accelerated significantly. Microsoft's Defender for IoT — originally acquired through the CyberX purchase in 2020 — has been deeply integrated into the Azure cloud stack and now supports passive asset discovery and anomaly detection across more than 100 industrial protocols, including Modbus, DNP3, and IEC 61850. The platform uses ML-based behavioral baselines to flag deviations without requiring active scanning, which would be dangerous in live OT environments.

Keep reading
More from Verodate