NorthGrid Power Report Reveals IT-OT Segmentation Failure Led to Blackout Attack

NorthGrid Power Incident Report Details Cyberattack That Caused December 2025 Outages

HIGH
February 16, 2026
5m read
Incident ResponseIndustrial Control SystemsCyberattack

Impact Scope

Affected Companies

NorthGrid Power

Industries Affected

EnergyCritical Infrastructure

Geographic Impact

United States (national)

Related Entities

Other

NorthGrid Power

Full Report

Executive Summary

NorthGrid Power, a major U.S. utility, has released a comprehensive post-incident report detailing the sophisticated cyberattack in December 2025 that led to controlled power outages. The report provides a candid analysis of the incident, attributing it to a highly capable threat actor. The initial intrusion was achieved via a spear-phishing attack against an IT employee. The attackers then dwelled in the IT network before pivoting to the operational technology (OT) environment by exploiting a firewall misconfiguration that improperly bridged the two domains. Within the OT network, the actor deployed custom malware to manipulate grid equipment. The report emphasizes the critical importance of robust IT/OT segmentation and serves as a vital learning tool for all critical infrastructure operators on preventing, detecting, and responding to such advanced threats.


Incident Timeline

  • Initial Access (Date Unspecified): An IT employee is compromised via a spear-phishing email, giving the attacker a foothold in the corporate IT network.
  • Dwell Time (Several Weeks): The attacker performs reconnaissance and moves laterally within the IT network, escalating privileges and identifying a path to the OT network.
  • IT-to-OT Pivot: The attacker exploits a misconfigured firewall rule to cross the IT/OT boundary.
  • OT Compromise: The attacker deploys custom malware onto systems within the OT network.
  • Impact (December 2025): The malware is used to manipulate circuit breakers at several substations, causing localized power outages.
  • Response: Grid operators detect the anomalies, switch to manual control, and prevent a wider blackout. Incident response procedures are initiated.

Technical Findings

  • Root Cause: The core failure was a lack of effective network segmentation between the IT and OT environments. A single misconfigured firewall rule created a pathway that allowed the attackers to pivot from a less secure corporate network to the highly sensitive grid control network.
  • Attack Chain:
    1. Initial Access (T1566.001 - Spearphishing Attachment): The classic entry point of a malicious email.
    2. Lateral Movement (T1021.001 - Remote Desktop Protocol): Attackers likely used legitimate credentials and tools to move through the IT network undetected.
    3. Exploiting Misconfiguration: The attackers discovered and used a firewall rule that allowed traffic from the IT segment to the OT segment, a critical policy violation.
    4. Impact (T0829 - Loss of Control): In the OT network, the custom malware interacted with industrial protocols to send malicious commands to grid equipment.

This incident is a textbook example of how a compromise in the seemingly less critical IT environment can cascade into a major operational and physical event if segmentation is not properly implemented and maintained.

Lessons Learned

NorthGrid Power's report highlighted several key lessons:

  • Segmentation is Paramount: A strong, enforced boundary between IT and OT is the most critical defense for an industrial operator.
  • Assume IT is Compromised: OT security posture should be designed with the assumption that the IT network is, or will be, compromised.
  • Need for OT-Specific Monitoring: Traditional IT security tools are often blind to OT protocols and activity. Specialized OT network monitoring is essential to detect malicious commands and anomalous behavior.
  • Response Playbooks are Crucial: The ability of grid operators to quickly revert to manual control was key to limiting the damage. This underscores the need for well-rehearsed incident response plans that include both cyber and physical responses.

Detection & Response Improvements

Based on the incident, improved detection strategies for similar organizations would include:

  1. IT/OT Boundary Monitoring: Deploy IDS/IPS and network traffic analysis tools specifically to monitor all traffic crossing the IT/OT boundary. Alert on any protocol or connection that is not explicitly whitelisted. This is a core tenet of Network Traffic Analysis.
  2. OT Network Visibility: Use OT-native monitoring solutions that can parse industrial protocols (e.g., Modbus, DNP3) to detect unauthorized or malicious commands being sent to controllers and other field devices.
  3. Threat Hunting: Proactively hunt for misconfigurations. Regularly audit firewall rules, access control lists, and network routes to ensure the integrity of the IT/OT boundary.

Mitigation Recommendations

NorthGrid Power outlined its remediation efforts, which serve as a model for other utilities:

  1. Complete Network Segregation (M1030 - Network Segmentation): Re-architect the network to create a true 'air gap' or a heavily fortified demilitarized zone (DMZ) between IT and OT, eliminating all direct communication paths.
  2. Unidirectional Gateways: For any data that must move from OT to IT (e.g., for monitoring), use unidirectional gateways (data diodes) that physically prevent any traffic from flowing back into the OT network.
  3. Enhanced OT Monitoring: Deploy a dedicated OT security monitoring platform to provide visibility into the control system network.
  4. Credential Management (M1026 - Privileged Account Management): Implement separate, unique credentials for the OT environment. No accounts should have access to both IT and OT systems.

Timeline of Events

1
December 1, 2025
Approximate date of the cyberattack that caused power outages.
2
February 15, 2026
NorthGrid Power releases its detailed post-incident report.
3
February 16, 2026
This article was published

MITRE ATT&CK Mitigations

The primary mitigation. Enforce strict, verifiable segmentation between IT and OT networks.

The primary mitigation for ICS environments. Enforce strict, verifiable segmentation between IT and OT networks.

Train employees to recognize and report phishing, which is often the first step in a blended IT/OT attack.

Audit

M1047enterprise

Regularly audit firewall rules and network configurations to ensure segmentation remains effective.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

incident reportICSOT securitycritical infrastructurenetwork segmentationpower grid

📢 Share This Article

Help others stay informed about cybersecurity threats