By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
Computing

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

News Room
Last updated: 2026/01/29 at 7:21 AM
News Room Published 29 January 2026
Share
Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
SHARE

A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and control centers worldwide. Drawing on data from more than 100 installations, the analysis highlights recurring technical, organizational, and functional issues that leave critical energy infrastructure vulnerable to cyber threats.

The findings are based on several years of deploying OMICRON’s intrusion detection system (IDS) StationGuard in protection, automation, and control (PAC) systems. The technology, which monitors network traffic passively, has provided deep visibility into real-world OT environments. The results underscore the growing attack surface in energy systems and the challenges operators face in securing aging infrastructure and complex network architectures.

Connection of an IDS in PAC systems (circles indicate mirror ports)

StationGuard deployments, often carried out during security assessments, revealed vulnerabilities such as unpatched devices, insecure external connections, weak network segmentation, and incomplete asset inventories. In many cases, these security weaknesses were identified within the first 30 minutes of connecting to the network. Beyond security risks, the assessments also uncovered operational issues like VLAN misconfigurations, time synchronization errors, and network redundancy problems.

In addition to technical shortcomings, the findings point to organizational factors that contribute to these risks — including unclear responsibilities for OT security, limited resources, and departmental silos. These findings reflect a growing trend across the energy sector: IT and OT environments are converging rapidly, yet security measures often fail to keep pace. How are utilities adapting to these complex risks, and what gaps remain that could leave critical systems exposed?

Why OT Networks Need Intrusion Detection

The ability to detect security incidents is an integral part of most security frameworks and guidelines, including the NIST Cybersecurity Framework, IEC 62443, and the ISO 27000 standard series. In substations, power plant control systems, and control centers, many devices operate without standard operating systems, making it impossible to install endpoint detection software. In such environments, detection capabilities must be implemented at the network level.

OMICRON’s StationGuard deployments typically use network mirror ports or Ethernet TAPs to passively monitor communication. Besides detecting intrusions and cyber threats, the IDS technology provides key benefits, including:

  • Visualization of network communication
  • Identification of unnecessary services and risky network connections
  • Automatic asset inventory creation
  • Detection of device vulnerabilities based on this inventory

Assessing Risks: Methodology Behind the Findings

The report is based on years of IDS installations. The first installation dates back to 2018. Since then, several hundred installations and security assessments have been conducted at substations, power plants, and control centers in dozens of countries. The findings are grouped into three categories:

  1. Technical security risks
  2. Organizational security issues
  3. Operational and functional problems

In most cases, critical security and operational issues were detected within minutes of connecting the IDS to the network.

Typically, sensors were connected to mirror ports on OT networks, often at gateways and other critical network entry points, to capture key communication flows. In many substations, bay-level monitoring was not required, as multicast propagation made the traffic visible elsewhere in the network.

Hidden Devices and Asset Blind Spots

Accurate asset inventories are essential for securing complex energy systems. Creating and maintaining such directories manually is time-consuming and error-prone. To address this, OMICRON used both passive and active methods for automated asset discovery.

Passive asset identification relies on existing system configuration description (SCD) files, standardized under IEC 61850-6, which contain detailed device information. However, passive monitoring alone proved insufficient in many cases, as essential data such as firmware versions are not transmitted in normal PAC communication.

Active querying of device information, on the other hand, leverages the MMS protocol to retrieve nameplate data such as device names, manufacturers, model numbers, firmware versions, and sometimes even hardware identifiers. This combination of passive and active techniques provided a comprehensive asset inventory across installations.

Example of device information retrievable via SCL and MMS active querying

Which Technical Cybersecurity Risks Are Most Common?

OMICRON’s analysis identified several recurring technical issues across energy OT networks:

  • Vulnerable PAC devices:

    Many PAC devices were found to be operating with outdated firmware containing known vulnerabilities. A notable example is the CVE-2015-5374 vulnerability, which allows a denial-of-service attack on protective relays with a single UDP packet. Although patches have been available since 2015, numerous devices remain unpatched. Similar vulnerabilities in GOOSE implementations and MMS protocol stacks pose additional risks.

  • Risky external connections:

    In several installations, undocumented external TCP/IP connections were found, in some cases exceeding 50 persistent connections to external IP addresses in a single substation.

  • Unnecessary insecure services:

    Common findings included unused Windows file sharing services (NetBIOS), IPv6 services, license management services running with elevated privileges, and unsecured PLC debugging functions.

  • Weak network segmentation:

    Many facilities operated as a single large flat network, allowing unrestricted communication between hundreds of devices. In some cases, even office IT networks were reachable from remote substations. Such architectures significantly increase the impact radius of cyber incidents.

  • Unexpected devices:

    Untracked IP cameras, printers, and even automation devices frequently appeared on networks without being documented in asset inventories, creating serious blind spots for defenders.

The Human Factor: Organizational Weaknesses in OT Security

Beyond technical flaws, OMICRON also observed recurring organizational challenges that exacerbate cyber risk. These include:

  • Departmental boundaries between IT and OT teams
  • Lack of dedicated OT security personnel
  • Resource constraints are limiting the implementation of security controls

In many organizations, IT departments remain responsible for OT security — a model that often struggles to address the unique requirements of energy infrastructure.

When Operations Fail: Functional Risks in Substations

The IDS deployments also revealed a range of operational problems unrelated to direct cyber threats but still affecting system reliability. The most common were:

  • VLAN issues were by far the most frequent, often involving inconsistent VLAN tagging of GOOSE messages across the network.
  • RTU and SCD mismatches led to broken communication between devices, preventing SCADA updates in several cases.
  • Time synchronization errors ranged from simple misconfigurations to devices operating with incorrect time zones or default timestamps.
  • Network redundancy issues involving RSTP loops and misconfigured switch chips caused severe performance degradation in some installations.

These operational weaknesses not only impact availability but can also amplify the consequences of cyber incidents.

Functional monitoring related alert messages

What Can Utilities Learn from These Findings?

The analysis of over 100 energy facilities highlights the urgent need for robust, purpose-built security solutions that are designed for the unique challenges of operational technology environments.

With its deep protocol understanding and asset visibility, the StationGuard Solution provides security teams with the transparency and control needed to protect critical infrastructure. Its built-in allowlisting detects even subtle deviations from expected behavior, while its signature-based detection identifies known threats in real time.

The system’s ability to monitor both IT and OT protocols — including IEC 104, MMS, GOOSE, and more — allows utilities to detect and respond to threats at every layer of their substation network. Combined with features like automated asset inventories, role-based access control, and seamless integration into existing security workflows, StationGuard enables organizations to strengthen resilience without disrupting operations.

To learn more about how StationGuard supports utilities in closing these critical security gaps, visit our website.

StationGuard Solution
Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article This thin and light gaming phone picks up where ASUS left off This thin and light gaming phone picks up where ASUS left off
Next Article AMD’s Latest Ryzen Is Still Gaming’s Best Chip AMD’s Latest Ryzen Is Still Gaming’s Best Chip
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

National Physical Laboratory to establish £10m AI measurement centre – UKTN
National Physical Laboratory to establish £10m AI measurement centre – UKTN
News
The “Syntax Repair” That Turned My Algorithm Into a Liar | HackerNoon
The “Syntax Repair” That Turned My Algorithm Into a Liar | HackerNoon
Computing
Amazon Discounts Anker’s Most Popular MagSafe-Compatible Chargers, Power Stations, and More
Amazon Discounts Anker’s Most Popular MagSafe-Compatible Chargers, Power Stations, and More
News
DuckDuckGo Asked Its Users How They Feel About AI Search. 90% Hate It
DuckDuckGo Asked Its Users How They Feel About AI Search. 90% Hate It
News

You Might also Like

The “Syntax Repair” That Turned My Algorithm Into a Liar | HackerNoon
Computing

The “Syntax Repair” That Turned My Algorithm Into a Liar | HackerNoon

1 Min Read
Seattle startup Sound Games raises .5M to rethink how premium games are sold
Computing

Seattle startup Sound Games raises $6.5M to rethink how premium games are sold

2 Min Read
The Complete Email Deliverability Checklist for 2026 (+Tools & Tips) | WordStream
Computing

The Complete Email Deliverability Checklist for 2026 (+Tools & Tips) | WordStream

20 Min Read
Never Write a Prompt Again: Introducing Recursive Prompting | HackerNoon
Computing

Never Write a Prompt Again: Introducing Recursive Prompting | HackerNoon

34 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?