Back to Resources
Field Note December 2025 7 min read

When Commodity Malware Reaches OT: Collateral Damage and Cascading Failures

Malware designed for IT systems sometimes affects OT networks, causing unexpected impacts. We examine propagation mechanisms and defensive strategies.

C

Cascadia OT Security

OT & ICS Security

AUTHMFAAUDITCRYPTOKEYSVAULTACCESS CONTROLHARDEN

NotPetya demonstrated that malware designed for IT systems can cause severe collateral damage in OT networks. Although NotPetya was not designed to attack control systems, its worm-like propagation brought industrial facilities to a standstill. Eight years later, the risk remains largely unmitigated. OT networks connected to IT networks will be affected by IT malware, even if control systems are not direct targets.

Commodity malware—including ransomware, worms, and information stealers—can impact OT networks through several mechanisms. Network-based worms propagate indiscriminately across segmented networks. Shared authentication mechanisms allow malware to pivot from IT to OT. Supply chain compromises deliver malware to both IT and OT systems simultaneously.

Propagation Mechanisms in Mixed Environments

When IT and OT networks are insufficiently segmented, IT-targeted malware reaches OT systems through shared subnets, compromised jump hosts, or integrated management systems. Engineering workstations running commodity antivirus can become vectors if the antivirus itself is compromised or misconfigured.

Some commodity malware includes worm capabilities that exploit known vulnerabilities in SMB, RDP, or other protocols common across both IT and OT networks. Air-gapping and network segmentation are the primary defenses, but most facilities have intentionally blurred these boundaries for operational convenience.

Detection and Isolation Measures

Strategic Redundancy

Commodity malware impact on OT systems is often unavoidable if networks are integrated. The defense strategy shifts to detection speed and isolation capability. If you'd like to discuss network segmentation, credential isolation, or integration security for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call