CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Palo Alto Unit 42 Archived Mar 16, 2026 ✓ Full text saved

Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage. The post Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security appeared first on Unit 42 .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Why OT Defenses Often Start Too Late Industrial organizations are facing a growing paradox in cybersecurity. While operational technology (OT) environments are increasingly connected, most security strategies still assume threats will only materialize once attackers reach the plant floor. In reality, attacks that disrupt industrial operations rarely begin in OT environments. They originate upstream, progress over time and frequently exploit the persistent assumption of isolation. This shift fundamentally changes how defenders must think about visibility, detection and response across Information Technology (IT) and OT domains. Recent joint research by Palo Alto Networks OT Threat Research Lab, Siemens Cybersecurity Lab and the Idaho National Laboratory challenges several long-held assumptions about how OT attacks originate, evolve and can be stopped. By analyzing global OT network telemetry alongside decades of historical incident data, the research shows that defenders often have far more time and visibility than commonly believed — if they know where to look. This blog explores how focusing on the network edge, predictive threat behavior and an edge-driven OT security operations model can transform time from a liability into a strategic advantage. Our full findings are detailed in our joint whitepaper, “Intelligence-Driven Active Defense: Securing Operational Technology Environments.” Threats That Disrupt OT Operations Are Rarely OT-Centric One of the most persistent myths in industrial security is that OT attacks are fundamentally different from IT attacks. While industrial systems do have unique safety and availability requirements, the paths adversaries use to reach them are often familiar. Across manufacturing, energy and other critical infrastructure incidents, production shutdowns frequently originate from common IT compromises that occur well before attackers ever interact with industrial systems. This boundary — the network edge between IT and OT — is where attackers often expose themselves through anomalous access patterns, protocol misuse or reconnaissance activity. Understanding this shift reframes OT defense. The question is no longer whether threats will reach OT systems, but whether defenders can detect and disrupt them before they do. The Edge Is Where Time Still Exists In some technology contexts, the term “edge” could refer to digital transformation, analytics or industrial IoT architectures. In OT security, however, the edge is best understood as a strategic control point: the network and security layer where external connectivity, IT systems and OT environments converge. Our joint research shows that this convergence layer plays a far more critical role in OT incidents than commonly assumed. Internet-exposed OT assets continue to expand, with a 332% increase between 2023-2024 in unique, exposed OT devices and services and nearly 20 million OT-related assets observable on the public internet. Exposure increases risk, but it does not equate to successful disruption. In many cases, it instead creates opportunities for earlier detection and more effective defense. The data reveals a more consistent pattern: approximately 70% of attacks impacting OT operations originate within IT environments. Across incidents, adversaries frequently begin with familiar enterprise-focused techniques such as credential abuse, brute force attempts and exploitation of IT-facing services. They then progress across shared identity systems, remote access pathways and management infrastructure before executing OT-specific actions.This progression is what makes the edge strategically decisive. Adversaries rarely move directly from initial compromise to operational impact. They must traverse multiple control layers, generating detectable signals through authentication anomalies, session deviations, protocol misuse and reconnaissance activity. Time exists at the edge because adversaries must cross it. The edge is therefore not simply where networks connect. It is where defenders retain their greatest advantage: the opportunity to detect and disrupt threats before safety-critical OT functions are affected. But the edge is not only important because attackers must traverse it. Its true strategic value lies in something even more powerful: the remarkable consistency of adversary behavior. Predictable Adversary Behavior Creates a Window for Defense Analysis of more than two decades of OT incidents reveals a striking reality: adversaries rarely operate with the randomness often attributed to them. Across observed incidents, 82.8% of adversary activity occurred during extended precursor phases, long before operational disruption. On average, attackers remained present for approximately 185 days prior to initiating impact-level activity. This extended dwell time fundamentally reshapes the OT security narrative. In this context, dwell time refers to the period between an adversary’s initial compromise and the point of disruptive or impact-level activity. It captures how long attackers remain active within an environment while conducting reconnaissance, credential abuse, lateral movement and staging activities prior to operational consequences. OT disruptions are not typically sudden events. They are the result of gradual progression — reconnaissance, credential abuse, lateral movement, staging — all of which produce detectable signals. While adversaries may differ in tooling, targets or intent, the structure of their behavior remains remarkably consistent. This consistency is what creates a defensive advantage. When early-stage behaviors are observed at the IT–OT edge, defenders are not reacting to an inevitable outcome — they are interrupting a progression already in motion. The implication is critical: exposure does not automatically translate to disruption. Rather than treating OT defense as a race against impact, organizations can treat it as a problem of earlier detection and intervention. Techniques such as attack-chain analysis and adversary progression modeling can further support this shift by helping defenders anticipate likely attacker pathways. But the central insight remains clear: Attackers spend far more time preparing than executing disruption. For defenders, this transforms time from a constraint into a strategic asset. From Passive Monitoring to Active Defense in OT Environments The extended dwell times and observable precursor behaviors described earlier create a critical opportunity for defenders. Yet many industrial security programs remain heavily focused on asset inventories and passive monitoring alone. While visibility is essential, it is insufficient by itself. Visibility without response capability does not prevent disruption. This is where OT SecOps becomes essential. OT SecOps (Operational Technology Security Operations) can be understood as the disciplined practice of detecting, analyzing and safely responding to cyber threats in industrial environments. Unlike traditional IT security operations, OT SecOps is designed around operational continuity, safety constraints and process integrity. Effective OT SecOps evolves through a progressive security maturity model aligned with established industrial security principles, such as IEC 62443 (an internationally recognized framework for securing industrial automation and control systems.): Architectural Defense establishes secure zones, conduits and segmentation, creating the structural foundation for control and containment. Passive Defense provides the telemetry needed to observe abnormal behavior across industrial protocols and network flows. Active Defense builds on this foundation by enabling pre-approved, OT-specific response actions at the edge, before process impact occurs. Active Defense capabilities can be implemented through multiple operational mechanisms, including structured response playbooks, threat hunting, containment strategies and OT-specific security operations models such as OT Security Operations Center (OT SOC). The OT SOC provides a coordinated framework for detection, analysis and controlled intervention, transforming architectural stability and passive visibility into operational defense. By aligning telemetry, analytics and response workflows, the OT SOC enables organizations to disrupt adversary progression while preserving operational continuity and safety constraints. Without architectural controls and passive visibility, OT SecOps cannot function effectively. Without Active Defense, detection remains reactive and late. IT–OT SOC Convergence Without Compromise While the OT SOC strengthens Active Defense within industrial environments, it cannot operate in isolation. The same research that highlights extended dwell times and precursor behaviors also shows that a majority of OT-impacting incidents originate within IT environments. This creates a structural reality for modern security operations: effective defense requires coordination across both domains. IT–OT SOC convergence is often misunderstood as consolidation, replacement or the absorption of OT security into traditional enterprise workflows. In practice, convergence does not imply collapse. IT–OT SOC convergence maintains clear separation of duties while enabling coordinated detection and response across zones and trust boundaries. IT teams often identify the early indicators of compromise, while OT teams apply operational context and execute domain-appropriate response actions. This model allows organizations to manage cyber risk holistically without forcing industrial environments into enterprise security frameworks that may overlook critical safety and availability requirements. The Key: Stopping Threats Early OT security has often been framed as a problem of isolation — keeping industrial systems separate from external threats. The reality is more complex. As connectivity increases, isolation alone is no longer sufficient, nor is it realistic. Our research shows that defenders are not as late as they think. Adversaries leave observable traces long before operational impact occurs, and these traces most often surface at the network edge. Time, in this context, becomes a measurable security variable rather than an uncontrollable constraint. Extended attacker dwell times create windows for detection, decision-making and controlled intervention. By combining edge-focused threat intelligence, predictive analysis and an OT-specific security operations model, organizations can turn time into a defensive advantage. For leaders, this means OT security strategy should focus on where threats can be detected and stopped early, not on how far control systems can be isolated. “Bring the fight to the edge” is not a slogan — it is a strategic shift. In OT environments, defense is about time, and the edge is where defenders still have it. Additional Resources Joint OT Threat Research White Paper – Palo Alto Networks, Siemens, Idaho National Laboratory * CyOTE™ and Attack Chain Estimator (ACE) ©2026 Battelle Energy Alliance, LLC ALL RIGHTS RESERVED Prepared by Battelle Energy Alliance, LLC Under Contract No. DE-AC07-05ID14517 With the U. S. Department of Energy Back to top TAGS Defense Operational Technology Threat detection Threat Research Center Next: VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) TABLE OF CONTENTS Why OT Defenses Often Start Too Late Threats That Disrupt OT Operations Are Rarely OT-Centric The Edge Is Where Time Still Exists Predictable Adversary Behavior Creates a Window for Defense From Passive Monitoring to Active Defense in OT Environments IT–OT SOC Convergence Without Compromise The Key: Stopping Threats Early Additional Resources RELATED ARTICLES The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild Multiple Vulnerabilities Discovered in a SCADA System Related General Resources INSIGHTS October 14, 2025 Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer BlackSuit ransomware Ignoble Scorpius Reconnaissance Read now INSIGHTS October 7, 2025 Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report Cloud Infrastructure Protection Cloud Security Unit 42 Incident Response Report Read now INSIGHTS September 26, 2025 Threat Insights: Active Exploitation of Cisco ASA Zero Days Cisco CVE-2025-20333 CVE-2025-20362 Read now INSIGHTS March 16, 2026 Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization Agonizing Serpens Agrius Curious Serpens Read now INSIGHTS March 12, 2026 Insights: Increased Risk of Wiper Attacks Hacktivism Wiper Read now INSIGHTS January 23, 2026 Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense Cyber Threat Alliance Unit 42 Read now INSIGHTS January 8, 2026 Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk GenAI Read now INSIGHTS December 16, 2025 Stay Secure: Why Cyber Hygiene Should Be Part of Your Personal Hygiene Cybersecurity MFA Patchwork Read now INSIGHTS December 2, 2025 The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen Cloud Security Defense Read now INSIGHTS October 14, 2025 Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer BlackSuit ransomware Ignoble Scorpius Reconnaissance Read now INSIGHTS October 7, 2025 Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report Cloud Infrastructure Protection Cloud Security Unit 42 Incident Response Report Read now INSIGHTS September 26, 2025 Threat Insights: Active Exploitation of Cisco ASA Zero Days Cisco CVE-2025-20333 CVE-2025-20362 Read now INSIGHTS March 16, 2026 Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization Agonizing Serpens Agrius Curious Serpens Read now INSIGHTS March 12, 2026 Insights: Increased Risk of Wiper Attacks Hacktivism Wiper Read now INSIGHTS January 23, 2026 Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense Cyber Threat Alliance Unit 42 Read now INSIGHTS January 8, 2026 Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk GenAI Read now INSIGHTS December 16, 2025 Stay Secure: Why Cyber Hygiene Should Be Part of Your Personal Hygiene Cybersecurity MFA Patchwork Read now INSIGHTS December 2, 2025 The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen Cloud Security Defense Read now INSIGHTS October 14, 2025 Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer BlackSuit ransomware Ignoble Scorpius Reconnaissance Read now INSIGHTS October 7, 2025 Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report Cloud Infrastructure Protection Cloud Security Unit 42 Incident Response Report Read now INSIGHTS September 26, 2025 Threat Insights: Active Exploitation of Cisco ASA Zero Days Cisco CVE-2025-20333 CVE-2025-20362 Read now
    💬 Team Notes
    Article Info
    Source
    Palo Alto Unit 42
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗