2025 was marked by a series of real-world OT and infrastructure incidents across Europe and North America. A dam gate in Norway was remotely opened through a cyber intrusion; major European airports were paralysed by a third-party service compromise; and public-sector operational networks in Canada and Poland came under direct pressure.
Across these events, a clear pattern emerged. Rather than attacking OT systems head-on, adversaries increasingly targeted the operational perimeter — the supplier pathways, connected IT systems and external services surrounding OT. Once these outer layers failed, disruption quickly spread into core operations.
In April 2025, the spillway gate at the Risevatnet Dam in Bremanger was remotely triggered following a confirmed cyber intrusion. No major flooding occurred, but the significance was unavoidable: a cyber operation reached the control layer of a critical asset and executed a physical action.
Confirmed findings included:
The incident demonstrated, perhaps more clearly than any other in 2025, how thin the barrier has become between attempted intrusions and real-world physical manipulation.
Several Canadian municipalities experienced cyber incidents that disrupted systems tied to public services, including those supporting water operations. Online services were taken offline; internal systems were isolated; and emergency procedures were activated.
Key observations:
The incident showed how rapidly an IT-side compromise can cascade into operational uncertainty. OT does not need to be touched directly for operations to be disrupted.
A widely reported incident affecting Land Rover once again highlighted the vulnerability of manufacturing operations. Although the intrusion began in IT systems, the operational impact was immediate:
2025 reinforced an uncomfortable but well-established reality: IT compromise is now a reliable route to OT disruption.
Poland experienced repeated cyber activity targeting public-service and transport systems. In several cases, attackers gained access to systems adjacent to operational decision-making, causing delays and service interruptions.
Findings included:
This incident illustrated how narrow the gap between IT and OT has become — and how easily that boundary can be tested without breaching the control layer itself.
2025 also saw multiple operational disruptions that did not originate in OT, but rapidly impacted OT-dependent services.
A compromise of a third-party provider for check-in and boarding systems disrupted operations across Heathrow, Brussels and Berlin Brandenburg. Passengers were unable to complete check-in for several hours.
This revealed:
The same pattern was observed across manufacturing, maritime logistics and energy:
Together, these incidents showed that attackers increasingly disrupt OT-dependent operations by striking the joints of the environment rather than the core.
Though not cyber-related, the large-scale blackout across Spain and Portugal highlighted the fragility of essential infrastructure. Grid strain and operational weaknesses triggered widespread outages affecting transport, communications and public services.
The lesson was clear: when resilience is low, the distinction between cyber failure and operational failure becomes irrelevant. OT security cannot be separated from the resilience of the infrastructure that supports it.
Across all incidents, one conclusion stands out: Attackers did not change their tools — they changed their route.
The pattern is unmistakable: The greatest weaknesses in OT security now sit at the boundaries — where OT, IT and external services intersect.
If these boundary layers remain vulnerable, internal hardening alone cannot prevent operational failure.
The events of 2025 were not dramatic in scale, but decisive in what they revealed about risk.
The opened spillway gate in Norway, the halted airports, the emergency procedures in Canada and Poland, and the Iberian blackout all point towards one unavoidable truth:
“We cannot secure OT if the systems around it remain exposed.”
This is where 2026’s OT security priorities must begin.
--------------------
swIDch will continue its quest to innovate and pioneer next-generation authentication solutions. To stay up-to-date with the latest trends sign up to our newsletter and check out our latest solutions.