NEXUS successfully demonstrated a path from the corporate IT network to the OT process control network, achieving read access to PLC configuration data and SCADA process values. No production processes were disrupted and all testing remained within agreed scope and rules of engagement.
The primary attack path exploited an inadequately segmented IT/OT boundary, default credentials on a remote access gateway, and an unpatched engineering workstation used as a pivot point.
The following documents the primary attack path demonstrated during the engagement. Each step is evidence-backed in the full report.
| Step | Technique (MITRE) | Action | Outcome |
|---|---|---|---|
| 01 | T0817 — Drive-by Compromise | Initial access via phishing simulation to IT workstation within scope | Local admin access established |
| 02 | T0822 — Exploitation of Remote Services | Lateral movement from IT to IT/OT DMZ via unpatched RDP service | Access to jump server |
| 03 | T0859 — Valid Accounts | Default credentials on remote access gateway accepted. Access to OT network segment established. | OT network presence |
| 04 | T0846 — Remote System Discovery | Passive discovery of OT assets from gained network position | [N] PLCs, HMIs identified |
| 05 | T0877 — I/O Image | Read of PLC process values via unauthenticated Modbus TCP | Live process data accessed |
| Priority | Finding | Recommended Fix | Effort |
|---|---|---|---|
| Critical | IT/OT boundary inadequately enforced | Implement industrial DMZ. Restrict all IT-to-OT traffic to explicitly approved paths. | Medium |
| High | Default credentials on remote access gateway | Change all credentials immediately. Implement MFA. Deploy session recording. | Low |
| High | Unauthenticated Modbus TCP | Implement Modbus TCP authentication where vendor supports. Otherwise restrict via firewall ACL. | Medium |