NorthGrid Power, a major U.S. utility, has released a comprehensive post-incident report detailing the sophisticated cyberattack in December 2025 that led to controlled power outages. The report provides a candid analysis of the incident, attributing it to a highly capable threat actor. The initial intrusion was achieved via a spear-phishing attack against an IT employee. The attackers then dwelled in the IT network before pivoting to the operational technology (OT) environment by exploiting a firewall misconfiguration that improperly bridged the two domains. Within the OT network, the actor deployed custom malware to manipulate grid equipment. The report emphasizes the critical importance of robust IT/OT segmentation and serves as a vital learning tool for all critical infrastructure operators on preventing, detecting, and responding to such advanced threats.
T1566.001 - Spearphishing Attachment): The classic entry point of a malicious email.T1021.001 - Remote Desktop Protocol): Attackers likely used legitimate credentials and tools to move through the IT network undetected.T0829 - Loss of Control): In the OT network, the custom malware interacted with industrial protocols to send malicious commands to grid equipment.This incident is a textbook example of how a compromise in the seemingly less critical IT environment can cascade into a major operational and physical event if segmentation is not properly implemented and maintained.
NorthGrid Power's report highlighted several key lessons:
Based on the incident, improved detection strategies for similar organizations would include:
NorthGrid Power outlined its remediation efforts, which serve as a model for other utilities:
M1030 - Network Segmentation): Re-architect the network to create a true 'air gap' or a heavily fortified demilitarized zone (DMZ) between IT and OT, eliminating all direct communication paths.M1026 - Privileged Account Management): Implement separate, unique credentials for the OT environment. No accounts should have access to both IT and OT systems.The primary mitigation. Enforce strict, verifiable segmentation between IT and OT networks.
The primary mitigation for ICS environments. Enforce strict, verifiable segmentation between IT and OT networks.
Train employees to recognize and report phishing, which is often the first step in a blended IT/OT attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats