OT ATTACK SURFACE INTELLIGENCE

See What Attackers See — Before They Act

ShiftSix maps your internet-exposed OT assets from the outside in. Real adversary context, not theoretical risk.

No AgentsNo Scan WindowsNo Network Changes
119 ransomware groups targeted 3,300 industrial organizations in 2025. +49% year-over-year. — Dragos 2026 OT Year in Review
Mapped to:NERC CIPIEC 62443NIST CSF 2.0NIS2IoTSF Member
10M+
OT Assets Enumerated
<24hr
To First Exposure Map
500+
ICS Device Fingerprints
HOW ATTACKS BEGIN

Attackers Don’t Hack In. They Buy Access.

Initial Access Brokers scan the internet for exposed OT assets, gain a foothold, and sell that access to ransomware operators and nation-states. The entry point is almost always an asset the organization didn’t know was exposed.

STEP 1 — RECONNAISSANCE

Automated scanners sweep the internet at 36,000 scans per second — probing for open Modbus, DNP3, and OPC UA ports. New assets are discovered within 5 minutes of going online. OT-focused groups like SYLVANITE specifically target edge devices from Ivanti, Fortinet, and F5 — the same VPN appliances protecting your OT perimeter.

145,000+ ICS services exposed across 175 countries. 46,000+ devices communicating over Modbus on the open internet.

— Censys 2024 · Dragos 2026
STEP 2 — INITIAL ACCESS

Access brokers exploit exposed VPNs, forgotten engineering workstations, and shadow OT connections that were never inventoried. 70% of access sold on dark web forums is VPN or RDP credentials — often from the same Fortinet and Ivanti appliances sitting at your OT perimeter. The average listing costs $2,047. Critical infrastructure commands premiums above $10,000.

76% of organizations have been attacked through an asset they didn’t know was internet-exposed. 38% of all breaches trace to unknown or unmanaged assets.

— ESG / Palo Alto · IBM 2024
STEP 3 — HANDOFF

Compromised access is sold to ransomware affiliates on forums like XSS and RAMP, or handed directly to nation-state Stage 2 operators like VOLTZITE. Dragos documented SYLVANITE handing off compromised OT environments to destructive actors within days. Mandiant measured the average handoff collapsing from 8+ hours in 2022 to 22 seconds in 2025.

119 ransomware groups targeted 3,300 industrial organizations in 2025. 50% of all ransomware attacks hit critical infrastructure sectors.

— Dragos 2026 · Industrial Cyber
STEP 4 — IMPACT

Ransomware deploys. Operations halt. The average breakout time from initial access to lateral movement is 29 minutes — fastest observed: 27 seconds. FrostyGoop connected directly to internet-exposed Modbus controllers from Moscow, cutting heat to 600 Ukrainian households. No prior network compromise needed — the device was simply exposed.

Unauthorized external access accounted for 50% of all OT incidents. Average industrial breach cost: $5.56M — 13% above the global average.

— SANS 2025 · IBM 2025

ShiftSix runs the same reconnaissance playbook as Initial Access Brokers
but we report to you, not to ransomware operators.

Organizations prioritizing CTEM are 3× less likely to suffer a breach. Gartner set the timeline for 2026 — that year is now.
— Gartner, Implement a CTEM Program, July 2022

Active Threat Landscape ·  Tracked by ShiftSix Researchers
— Ransomware (Industrial)
Qilin#1 Industrial 2025
138 incidents Q3 · Recruited RansomHub + LockBit affiliates
PlayRising 2025
75 incidents Q2 (~11%) · Doubled from Q1
AkiraPersistent
Top-4 industrial group · Manufacturing & construction focus
— Nation-State (ICS)
VOLTZITEChina / Volt Typhoon
Critical infrastructure pre-positioning · Living off the land
AZURITEChina / Flax Typhoon
IoT botnet infrastructure · Ethereal Panda (CrowdStrike)
SandwormRussia / GRU
INDUSTROYER2 (IEC-104) · FrostyGoop (Modbus TCP)*
XENOTIMERussia / TsNIIKhM
TRITON/TRISIS · Safety system (SIS) targeting · Only known life-safety ICS attack
CHERNOVITERussia / State-Sponsored*
PIPEDREAM framework · OPC UA, Modbus, CODESYS · Cross-industry ICS capability
PYROXENEIran / IRGC-CEC
Aviation, aerospace & defense targeting · Destructive wiper malware
HOW SHIFTSIX OPERATIONALIZES CTEM

What attackers see What matters most What gets fixed

From outside-in discovery to closed exposure — continuously and without touching your network.

Only 12.6% of organizations have full ICS Kill Chain visibility. ShiftSix gives you the outside-in perspective most teams are missing entirely.

— SANS 2025 ICS/OT Survey

BREAKS: RECONNAISSANCE
01

Discover Your Exposure

See what SYLVANITE’s scanners already see — before they sell it.

Passively identify every internet-exposed OT asset across your infrastructure. No agents, no sensors, no network changes. Results in hours, not months.

5 protocols · 175 countries · 0 packets sent

ModbusDNP3OPC UABACnetIEC 60870
Explore discovery →
BREAKS: INITIAL ACCESS & HANDOFF
02

Prioritize by Real Threat

Not every exposure becomes a $2,047 listing. Know which ones will.

Map each exposure against active threat actor TTPs and ICS-specific malware — not theoretical CVSS scores. 38% of OT CVSS scores contain errors. We skip the noise.

12 ICS malware families · 47 active threat actor TTPs

FrostyGoopPIPEDREAMTRITONVolt Typhoon
See threat correlation →
BREAKS: IMPACT
03

Close & Verify

Remove the exposure before it becomes a listing. Verify it stays gone.

Deliver remediation guidance contextualized to your OT environment. Continuously verify exposures are removed from the live attack surface. Not quarterly — continuously.

Continuous verification — not quarterly, not annual

NERC CIPIEC 62443NIST CSF 2.0NIS2
View compliance mapping →
THREAT INTELLIGENCE

Know Who's Targeting You

A researcher-built threat briefing mapping active adversaries, IAB activity, and exposed assets specific to your sector. Delivered in 48 hours — no sales call required.

Active Threat Mapping

Ransomware groups — Qilin, Play, Akira — and nation-state campaigns like VOLT TYPHOON and FrostyGoop currently targeting your sector.

Exposure-to-Attack Correlation

Where your external attack surface overlaps with known IAB reconnaissance patterns and initial access playbooks.

Researcher-Led Recommendations

Actionable guidance from OT threat researchers — prioritized by real-world exploitability, not CVSS scores.

36hr avg delivery·Sector-specific·No sales call
ENERGYWATERMARITIMEMANUFACTURING
THREAT BRIEFING — ENERGY SECTOR Prepared: March 2026 ―――――――――――――――――――――――――――――――― ACTIVE CAMPAIGNS 3 Critical ▹ VOLT TYPHOON ● Active ▹ FrostyGoop ● Active ▹ Qilin Ransomware ● Active ―――――――――――――――――――――――――――――――― EXPOSED ASSETS 7 ▹ Modbus/TCP :502 2 hosts ▹ OPC UA :4840 1 host ▹ VPN (Fortinet) 4 hosts ―――――――――――――――――――――――――――――――― RECOMMENDATIONS 12 items ▹ Patch CVE-2024-21762 Critical ▹ Disable Modbus/TCP High ▹ Rotate VPN creds High

Request Your Briefing

Personalized to your sector. Delivered in 48 hours. No strings attached.

ShiftSix vs. OT Network Monitoring Platforms

Claroty and Dragos monitor traffic inside your OT network. ShiftSix shows you what attackers see from the outside — before they reach it. They are not competing approaches. They are complementary layers.

ShiftSixClarotyDragos
ApproachOutside-in (CTEM)Inside-out monitoringInside-out monitoring
Sensors or agents required NoneMultiple (sensors, agentless, active queries)Passive sensors (active collection optional)
Touches your OT network NeverPassive tap + active queriesPassive tap
Attacker-perspective visibility YesNoNo
CISA KEV correlation NativeNativeLimited
DeploymentSaaS — no hardwareSaaS + On-premSaaS + On-prem
Primary use casePre-breach exposure visibilityNetwork monitoring + exposure managementNetwork monitoring + vulnerability management

Already using Dragos or Claroty? ShiftSix is designed to complement your existing OT monitoring stack. We show you what is visible from the internet — before threats reach the network your monitoring tools protect.

FREQUENTLY ASKED QUESTIONS

Common Questions

What is Continuous Threat Exposure Management (CTEM)?

Continuous Threat Exposure Management (CTEM) is a cybersecurity framework defined by Gartner in 2022 that continuously scopes, discovers, prioritizes, validates, and mobilizes remediation of security exposures. Unlike point-in-time assessments, CTEM runs as an ongoing cycle — making it critical for OT and ICS environments where new exposures emerge daily. ShiftSix operationalizes CTEM into three steps: Enumerate, Correlate, and Close.

What is External Attack Surface Management (EASM)?

External Attack Surface Management (EASM) is the process of continuously discovering, inventorying, and monitoring all internet-facing assets an organization owns — including those in OT, ICS, and industrial edge environments — to identify and remediate exposures before attackers can exploit them. Unlike internal vulnerability management, EASM operates from the outside in, the same way an attacker would map your environment.

How is ShiftSix different from Claroty or Dragos?

Claroty and Dragos are OT network monitoring platforms that provide inside-out visibility into traffic and behavior within your industrial network. ShiftSix is an OT-native CTEM platform that provides outside-in exposure intelligence — mapping what attackers can reach from the internet before they ever reach your OT network. ShiftSix requires no agents, no scan windows, and never touches your OT network. It is designed to complement existing OT monitoring tools, not replace them.

How does ShiftSix map to regulatory and industry frameworks?

ShiftSix maps discovered external exposures against NERC CIP, IEC 62443, NIST CSF 2.0, NIS2, MITRE ATT&CK for ICS, and CISA ICS-CERT advisory frameworks — giving operators continuous compliance posture evidence alongside their exposure data. This reduces manual evidence-gathering overhead and accelerates audit readiness across multiple regulatory frameworks simultaneously.

Does ShiftSix require any changes to my OT network?

No. ShiftSix operates entirely from the outside in using passive reconnaissance — certificate transparency logs, service banner analysis, protocol fingerprinting, and DNS enumeration. We never send packets to your network, never require agents or sensors, and never need network access. Your OT operations continue completely uninterrupted. Most organizations receive their first exposure map within 24 hours.

Why should I care about external OT exposure specifically?

Because attackers start from the outside. Forty percent of organizations have vulnerable OT assets insecurely connected to the internet (Claroty 2025), and the average cost of an industrial breach is $5.56 million — 13% above the global average (IBM 2025). Unplanned OT downtime costs $125,000 per hour. External exposure is the first link in the kill chain, and it is the one most OT security programs overlook because their tools are designed for internal visibility.

Your OT Attack Surface Is Already Mapped. By Someone.

Every day your internet-exposed OT assets sit unmonitored, attackers are mapping them. Nation-state OT attacks nearly doubled in 2025. ShiftSix shows you exactly what they see — so you can close it before they exploit it.

Get your free exposure report in under 24 hours. No agents, no sensors, no sales call.

Get Threat Intelligence Updates

New attack surface research, TTP analysis, and OT/ICS threat briefings — delivered to your inbox.

Skip to content