EXPOSURE BRIEF

The Air Gap Is a Diagram, Not a Defense

40% of organizations have OT assets insecurely connected to the internet. Over 180,000 ICS devices are exposed globally. The air gap exists on the diagram — the internet tells a different story.

Introduction

Ask any critical infrastructure operator whether their OT network is connected to the internet, and most will say no. They will point to a network diagram showing a clear boundary — IT on one side, OT on the other, a firewall or DMZ in between. The diagram says air-gapped. The internet says otherwise.

The numbers tell a different story:

  • 180,000+ unique IPs hosting ICS/OT services are visible on the public internet — a 12% year-over-year increase that reversed a previously declining trend, according to Bitsight's ICS exposure research. Censys independently identified over 148,000 exposed ICS services across 175 countries — and both numbers are still climbing
  • 40% of organizations have a subset of OT assets insecurely connected to the internet, based on Claroty Team82's analysis of nearly one million OT devices across 270 organizations
  • Fewer than 10% of OT networks worldwide have any form of network monitoring, per Dragos

These are not lab environments or research honeypots. These are production PLCs, HMIs, RTUs, and engineering workstations running in water plants, power substations, manufacturing facilities, and building management systems. Visible to anyone who scans for them.

The air gap is a diagram. The internet is the ground truth.

How OT Devices End Up on the Internet

No OT engineer deliberately puts a PLC on the public internet. These exposures show up through patterns that are predictable, repeatable, and well-documented in incident reports.

1. Remote Access Gone Wrong

The shift to remote operations — accelerated during and after the pandemic — created massive OT exposure. Vendors and integrators need remote access to maintain equipment. Plant operators need to monitor processes from home. The solutions deployed often bypass the air gap entirely:

  • VPN concentrators with split tunneling that routes OT traffic through IT networks with internet egress
  • Remote desktop services (RDP) exposed directly to the internet with OT network access behind them
  • Vendor-provisioned cellular modems on PLCs and RTUs that create direct internet connectivity, invisible to the IT team
  • Cloud-connected HMI applications that relay data from OT devices through internet-facing APIs

This is how it plays out in practice: In 2023, China-nexus threat group Volt Typhoon compromised Littleton Electric Light and Water Departments in Massachusetts through a public-facing FortiGate 300D firewall. They stayed inside for over 300 days, harvesting credentials and moving laterally through infrastructure that was designed to be segmented. The "air-gapped" OT environment was reachable through the compromised perimeter device (detailed in case studies below), as reported by The Record.

2. Flat Network Architecture

The Purdue model — the layered reference architecture that segments enterprise IT from supervisory control from the physical process — has been the textbook answer for OT network design since the 1990s. In practice, a large share of OT environments never implemented it. The network was built to move data between machines, not to enforce security boundaries. A single subnet carries both corporate IT traffic and industrial control traffic, and when that subnet gets an internet connection — for email, ERP, vendor updates, cloud analytics — every device on it becomes potentially reachable from the outside.

This is especially common in:

  • Small water utilities — A utility serving 20,000 people might have a three-person IT staff, a single network, and a SCADA server sitting two hops from the office WiFi. The budget for proper segmentation does not exist, and the operational staff who built the network 15 years ago have since retired.
  • Manufacturing facilities — ERP systems need real-time production data from PLCs. The path of least resistance is a direct connection. Nobody installs a DMZ or data diode for a single data feed — until that feed becomes the network path an attacker uses to reach the shop floor.
  • Building automation — BACnet controllers, HVAC systems, and lighting management share infrastructure with corporate WiFi and guest networks. The building management team reports to facilities, not to IT or OT security, so the network architecture never gets reviewed.

The common thread: these networks were designed for operational convenience, not adversarial resilience. Segmentation was always something to add later, and later never came.

3. Misconfigured Firewalls and NAT

The firewall exists on the diagram. Whether it does what the diagram says is a different question.

The most common failure mode is the "temporary" rule. A vendor needs remote access to troubleshoot a PLC. Someone opens a port, the vendor fixes the issue, and the rule stays in the firewall config for the next three years because nobody tracks who created it or why. Over time, these accumulate. A firewall with 200 rules, 40 of which are undocumented exceptions from past maintenance windows, is not providing the segmentation the architecture diagram shows.

NAT adds another layer of risk. A port-forward rule intended to expose a single management interface on a specific IP can, if misconfigured, expose an entire subnet. This is especially dangerous in OT environments where devices on the same subnet — PLCs, HMIs, historians — were never designed to be internet-reachable and have no authentication to fall back on.

Then there is the port coverage gap. Firewall policies at most organizations are written for IT traffic: HTTP, HTTPS, SSH, RDP, SQL. OT-specific ports — 502 (Modbus), 102 (S7), 47808 (BACnet), 44818 (EtherNet/IP), 20000 (DNP3) — often are not in the rule set at all because the firewall team does not know they exist. Traffic on those ports passes through unfiltered, and nobody notices because nobody is looking for it.

Cloud migration creates a newer variant of this problem. When organizations move historians, data lakes, or analytics platforms to the cloud, the data pipeline from OT devices to cloud services creates a network path that traverses the internet. If that path is not properly isolated, it becomes a bidirectional route — and the OT device that was sending telemetry to the cloud is now reachable from it.

4. Shadow OT

Perhaps the most dangerous pattern: devices that exist in the OT environment but were never provisioned by the OT team and do not appear in any asset inventory.

Every organization has them. A facilities manager installs a cellular-connected vibration sensor on a pump. An equipment vendor ships a PLC with a built-in 4G modem for remote diagnostics — enabled by default. A property management company deploys a smart building platform that connects BACnet controllers to a cloud dashboard. A test bench from a commissioning project three years ago is still powered on and connected.

None of these devices went through a security review. None of them appear in the IT asset inventory, the OT asset inventory, or the CMDB. The OT security team does not know they exist. The IT security team does not know they exist. But they are on the network — sometimes on the OT network directly — and many of them have internet connectivity by design.

Claroty's analysis of nearly one million OT devices found that 40% of organizations have OT assets insecurely connected to the internet. A meaningful share of those connections are not the result of a deliberate architecture decision. They are shadow devices that nobody approved and nobody monitors.

A real example: FrostyGoop, the ICS malware that cut heating to 600+ apartment buildings in Lviv, Ukraine in January 2024, got its initial foothold through a Mikrotik router that was not part of the formal OT architecture. From there, the attackers reached ENCO controllers via Modbus TCP and changed heating setpoints. The OT devices were not directly internet-facing, but someone had never accounted for the network path from the internet to the controllers. It existed, and it was exploitable. Dragos published a detailed analysis of the incident.

What External Scanning Actually Reveals

Remote access, flat networks, misconfigured firewalls, shadow devices — those are the mechanisms. They explain how OT devices end up on the internet. The next question is how many, and what an attacker actually sees when they find one.

When critical infrastructure networks are scanned from the outside, the findings consistently contradict the air gap assumption:

Protocol-by-Protocol Exposure

ProtocolInternet-Exposed DevicesPrimary Sectors
Modbus TCP54,770+Energy, Manufacturing, Water
BACnet12,000+Building Automation, Healthcare
Fox (Niagara)30,000+Building Automation
EtherNet/IP7,000+Manufacturing, Oil & Gas
S7 (Siemens)4,500+Manufacturing, Energy
DNP31,500+Electric Utilities, Water

Approximate device counts based on Censys and Shodan internet-wide scan data. Actual counts fluctuate as devices come online and offline. Cross-referenced with Bitsight ICS/OT exposure research.

These are not web interfaces or management consoles. These are the native industrial control protocols — most of them designed decades ago with no authentication whatsoever. Modbus accepts commands from any source. BACnet broadcasts device information to anyone who asks. DNP3 was built for serial links between trusted endpoints, not TCP connections from arbitrary IPs. Every protocol on this table was designed for a closed network. None of them are on one.

What Exposed Devices Reveal

  • Device identification — Many devices will volunteer their vendor name, model number, firmware version, and sometimes even the facility name through standard protocol functions. Nobody is exploiting anything here. The protocol just tells you.
  • Operational data leakage — Readable registers and process values are visible to anyone who connects. Temperature setpoints, flow rates, valve states, alarm thresholds, all accessible without authentication.
  • Geographic and sector clustering — The exposures are not randomly distributed. They cluster by sector (water and wastewater, building automation, energy) and by geography. That pattern suggests systemic infrastructure problems, not one-off misconfigurations.

What Threat Actors Do with This Access

This is not theoretical. Forescout Vedere Labs deployed a network of 11 OT honeypots — industrial routers, PLCs, and similar devices — and recorded over 60 million inbound requests in 90 days. The vast majority was automated scanning and SNMP enumeration, but roughly 3.5 million were substantive attack events: brute-force attempts, exploit payloads, and malware delivery. Their findings:

  • 67% of attacks targeted OT perimeter devices (routers, firewalls), while 33% targeted exposed OT devices (PLCs, RTUs) directly
  • 72% of perimeter attacks came via SSH and Telnet (brute force)
  • 24% came via HTTP/HTTPS (exploit attempts and malware downloads)
  • Broadly-targeted botnets including RondoDox (59% of samples) and Redtail (21%) were observed hitting OT honeypots alongside general IoT targets

The takeaway: if your OT device is reachable from the internet, someone is already poking at it.

When the Air Gap Failed: Case Studies

Volt Typhoon at U.S. Utilities (2023–2025)

Volt Typhoon — the China-nexus group introduced earlier — compromised multiple U.S. critical infrastructure organizations through public-facing network appliances, per CISA's advisory. The Littleton case is worth examining specifically for the air gap question. This was a small municipal utility. They had a FortiGate firewall. They had network segmentation. On paper, the OT environment was separated from IT. In practice, the attackers lived inside the network for over 300 days, harvested Active Directory credentials, and had access paths to operational systems — all through a device that was supposed to enforce the boundary between IT and OT.

The segmentation existed on the diagram. The attacker never saw the diagram.

SYLVANITE at U.S. Electric and Water Utilities (2025)

SYLVANITE illustrates a different air gap failure mode: the security device as attack vector. Dragos identified this China-nexus group exploiting Ivanti Connect Secure VPN vulnerabilities at U.S. electric and water utilities. They extracted Active Directory credentials, established persistent access, and then handed off those footholds to VOLTZITE for deeper OT-focused intrusion.

The VPN appliance was deployed specifically to provide secure remote access — to enforce a controlled boundary between the internet and the internal network. Once compromised, it provided exactly the access it was designed to protect against. The air gap did not fail because it was missing. It failed because the device enforcing it became the entry point.

FrostyGoop in Ukraine (January 2024)

FrostyGoop is the shadow OT case study. The attackers compromised a Mikrotik router that was not part of the formal OT architecture — it did not appear on the network diagram, was not managed by the OT team, and was not covered by whatever segmentation controls existed. From that router, they reached ENCO controllers via Modbus TCP and manipulated heating system setpoints. Over 600 apartment buildings lost heat for nearly two days in winter.

The facility had an OT architecture. The Mikrotik router was not part of it. But the network path from the internet through that router to the controllers existed, and nobody knew about it until the heating stopped. This is what happens when the air gap is defined by the diagram rather than by what is actually on the network.

Why the Diagram Lies

The three case studies above each represent a different air gap failure mode — a compromised perimeter device, a weaponized VPN appliance, and an unmanaged router that nobody knew about. What they share is that in each case, the organization believed it had segmentation. The diagram said so. The compliance audit confirmed it. The architecture review did not flag a problem.

The fundamental issue is that OT security posture is almost always assessed from the inside: network diagrams, architecture reviews, firewall rule audits, compliance checklists. These tools answer the question "how did we design the network?" They do not answer a different and more important question: "what can an attacker see from the outside?"

A network diagram shows intent. An external scan shows reality. The distance between those two things is your actual attack surface.

This gap persists because:

  • Internal tools cannot see what they are not connected to. A passive network monitor inside the OT network will never discover a cellular modem that bypasses the monitored network entirely. And remember, fewer than 10% of OT networks even have monitoring deployed, according to Dragos.
  • Compliance frameworks check controls, not outcomes. NERC CIP, IEC 62443, and NIST CSF all specify requirements for network segmentation and access control. None of them require external validation that those controls actually prevent internet exposure.
  • Point-in-time assessments go stale fast. A penetration test or architecture review captures a snapshot. Networks change daily as new devices are added, firewall rules get modified, and vendors connect remote access. Within weeks, the snapshot no longer reflects reality.
  • Vulnerability scanners do not speak OT. Claroty's research found that 12% of OT devices carry known exploited vulnerabilities, but the bigger issue is the devices that are exposed without any CVE involved, simply because the protocol accepts unauthenticated commands from anyone.

Test Your Own Air Gap

Before commissioning an external assessment, asset owners can perform basic checks using publicly available data:

  1. Certificate Transparency logs — Search crt.sh for your organization's domain. TLS certificates issued to internal hostnames (e.g., scada., hmi., plc-) that appear in public CT logs indicate services that were or are internet-facing.
  2. DNS reconnaissance — Check whether your organization's DNS records include entries for OT-related hostnames. Subdomains like scada.example.com or bms.example.com that resolve to public IPs are a clear indicator.
  3. Shodan/Censys queries — Search for your organization's ASN or IP ranges on Shodan or Censys and filter for OT-specific ports (502, 102, 47808, 44818, 20000, 4840). If results appear, your air gap has a hole.
  4. Passive DNS history — Services like SecurityTrails or PassiveTotal can reveal historical DNS resolutions that indicate when OT services were internet-facing, even if they have since been taken offline.

These are non-intrusive, passive checks. They do not touch your infrastructure. They simply reveal what is already publicly visible — the same information any threat actor can access.

Closing the Gap

The air gap question is the wrong question. The useful one is: "What is currently exposed, and how does that map to what threat actors are actually targeting?"

Answering that requires a shift from inside-out to outside-in.

Start with external discovery. Most organizations assess their OT security posture from inside the network — architecture reviews, firewall audits, vulnerability scans. These are useful but they cannot see what the internet sees. An external scan using OT-native protocol probes (not just TCP port enumeration) reveals devices that internal tools miss entirely: the cellular modem that bypasses the firewall, the cloud-connected HMI that routes through a third-party API, the test bench that was never decommissioned. If you only look from the inside, you only find what you already know about.

Correlate assets to ownership and context. An exposed Modbus device on its own is a finding. Knowing that it belongs to a water treatment facility, runs a specific firmware version, and sits in a region where VOLTZITE has been active — that is actionable intelligence. External discovery without asset context produces scan results. Asset context without external discovery produces a false sense of security. You need both.

Map exposures to active threats. Not all exposures carry the same risk. An exposed BACnet controller in a commercial office building and an exposed DNP3 RTU at an electric substation have very different threat profiles — because different actors are targeting different protocols in different sectors. FrostyGoop went after Modbus. PIPEDREAM included modules for Modbus, CODESYS, and OPC UA. VOLTZITE targeted VPN appliances at utilities specifically. Prioritization should follow the threat, not just the CVSS score.

Connect remediation to compliance. For electric sector operators, NERC CIP requires electronic security perimeters around BES Cyber Systems — an exposed OT device is a direct compliance gap, not just a security risk. For all sectors, IEC 62443 zone and conduit models address isolation of legacy protocols from untrusted networks. When fixing an exposure also closes a compliance finding, the business case gets easier and the fix actually happens.

The air gap may be on your diagram. The question is whether it is on the internet.


ShiftSix Security discovers what your network diagram does not show. Request a complimentary external exposure assessment to see your OT environment from the attacker's perspective.


Further Reading

See What Your Network Diagram Doesn't Show

ShiftSix discovers what's exposed from the outside — the attacker's view of your OT environment.

Request a Complimentary Assessment
Skip to content