Blog - swIDch

How Unsophisticated Hacks Shattered The Air Gap Illusion

Written by Admin | Mar 30 2026

 

The most enduring comfort in industrial security has always been the concept of physical isolation. For decades plant managers believed that because their Operational Technology networks were separated from the corporate IT environment they were fundamentally safe from digital warfare. Recent global infrastructure research has shattered this illusion completely revealing that over 70 percent of industrial control systems now possess some form of internet facing connection. The hard truth is that modern industrial environments are heavily interconnected and the traditional air gap simply no longer exists.

Threat groups and state sponsored hacktivists are no longer attempting to breach complex corporate firewalls to pivot into production networks. They are taking a much more direct route. Geopolitically motivated adversaries are now directly targeting exposed Cyber Physical Systems to achieve maximum disruption. By scanning the internet for accessible Human Machine Interfaces and Supervisory Control and Data Acquisition systems—often identifying thousands of exposed nodes within a matter of hours—these actors are bypassing traditional IT security layers entirely and striking at the very heart of critical infrastructure.


Nation States Are Exploiting Basic Remote Access Tools

What makes this current wave of attacks so alarming is the lack of sophistication required to execute them. Industry analysis reveals that nearly 80 percent of the most devastating operational takeovers are not the result of highly complex zero day exploits or advanced malware. Instead adversaries are weaponising the basic remote access tools and default settings that facility operators themselves have left exposed.

The recent compromise of a major municipal water facility where attackers simply logged into an exposed cellular router using a factory default password proves just how catastrophic these basic oversights have become. To maintain continuous operations and allow for rapid troubleshooting organisations frequently grant remote access to third party vendors and maintenance engineers. However this access is rarely managed with the rigorous oversight required for industrial environments. Workarounds are created default passwords are left unchanged and temporary access portals remain open on the internet long after a specific maintenance task has been completed. Hackers do not need to be technical geniuses to cause a nationwide blackout when the digital front door has been left wide open.


The Hidden Danger Of Unmanaged Third Party Connections

This reliance on unsophisticated hacks highlights a severe failure in access governance. When a third party engineer finishes a diagnostic check the physical work may be done but their digital access often remains active. With the average industrial facility managing over 50 different third party vendor connections at any given time, this orphaned access turns yesterday's trusted maintenance path into tomorrow's most critical vulnerability.

If an attacker manages to acquire these legitimate credentials from a compromised vendor they can log directly into an exposed SCADA system without triggering a single security alarm. Passive monitoring tools will simply register a trusted user logging in from a known remote access tool. In a landscape where threat actors are actively hunting for these exact blind spots leaving static credentials and unmanaged remote connections exposed is an open invitation to catastrophic operational failure.


Neutralising Direct Access Threats With Dynamic Identity

To defend against direct attacks on cyber physical systems the industrial sector must completely rethink how it authenticates remote and third party users. If adversaries are exploiting static passwords and exposed access portals the only effective defence is to ensure that those entry points require an identity that is constantly shifting and impossible to steal.

By implementing dynamic identity organisations can instantly neutralise the threat of unsophisticated hacks. When the authentication code required to access a critical interface changes continuously and is valid for only one specific session a leaked password or an exposed remote desktop protocol becomes entirely useless to an attacker. Securing the modern industrial landscape demands that we stop relying on the illusion of an air gap and start ensuring that every single access request is actively governed and dynamically verified at the threshold.

 

--------------------

 

swIDch will continue its quest to innovate and pioneer next-generation authentication solutions. To stay up-to-date with the latest trends sign up to our newsletter and check out our latest solutions.