Back to Resources
Field Note February 2026 7 min read

Industroyer to Pipedream: A Decade of OT Malware Evolution

From Industroyer's breaker operations to Pipedream's modular architecture, we trace the evolution of OT-specific malware and what each generation taught attackers.

C

Cascadia OT Security

Founder · Managing Principal · CISSP · GICSP

T+0Initial AccessT+12hDiscoveryT+3dLateral MoveT+14dOT PivotT+84dDetonationDWELL TIME · 84 DAYSATTACK TIMELINET+84d DETONATE

OT malware has evolved from crude, destructive tools into sophisticated, purpose-built frameworks. Industroyer broke circuit breakers in Ukraine in 2015. Pipedream, discovered in 2023, demonstrated reconnaissance-grade modularity designed for long-term reconnaissance, not one-shot sabotage. The gap between them represents a decade of operational learning by well-resourced threat actors.

Each generation of OT malware teaches us something critical. Stuxnet showed that physics-level manipulation was possible. Industroyer demonstrated that electrical grid equipment could be remotely operated. NotPetya proved that OT systems could be collateral damage in an IT-focused attack. Black Energy and Pipedream revealed that modularity and persistence matter more than immediate impact.

The Shift from Disruption to Reconnaissance

Early OT malware was noisy. It sent commands directly to control devices, often crashing them in the process. Modern OT malware is quiet. It lives in engineering workstations and PLCs, learning network topology and device behavior for months before any command is issued.

Pipedream exemplified this shift. It was discovered because researchers found it in a staging environment—not because it caused an outage. The attacker had not yet decided to execute. This suggests a model where multiple backdoored facilities are maintained in a dormant state until a strategic moment arrives.

Defensive Lessons from Each Generation

Planning Your Detection Strategy

Modern OT malware detection cannot rely on signatures or sandboxing. Instead, focus on behavioral anomalies: unexpected command sequences, unusual inter-device communication, and credential usage patterns that deviate from baselines. You are not looking for a malware executable; you are looking for orchestrated control device behavior that does not match your standard operations.

If you'd like to discuss threat modeling or detection tuning based on this evolutionary perspective, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call