Back to Resources
Field Note January 2026 7 min read

Living Off the Land in OT Environments

Attackers increasingly abuse legitimate OT tools for lateral movement and reconnaissance. We show what to monitor and how to defend.

C

Cascadia OT Security

OT & ICS Security

VENDORINTEGRATORFACILITYOPERATORASSETRISK · HIGHRISK · HIGHRISK · HIGHRISK · MEDRISK · LOWSUPPLY CHAIN5 HANDOFFS

Living-off-the-land attacks in OT use legitimate engineering tools to move laterally, escalate privileges, and gather intelligence. Because these tools are authorized, expected, and often unmonitored, they become the path of least resistance for attackers who have already breached your perimeter.

In OT networks, the legitimate tools are different from IT environments. Engineering software like Wonderware, FactoryTalk, and vendor-specific IDE suites have remote access capabilities that were designed for maintenance and troubleshooting, not security. An attacker with a stolen engineering account or a compromised engineering workstation can use these tools to interact with control systems without triggering detection.

Common Living-Off-the-Land Techniques in OT

We have observed attackers using legitimate SCADA software to enumerate connected devices, modify tags, and read memory from PLCs. Some have used vendor remote access tools meant for authorized support to establish persistent backdoors. Others have leveraged the credentials baked into engineering tools to bridge IT and OT network segments.

The challenge for defenders is that logging these tools is inconsistent. Many were built before security logging was standard. Even when logging is available, the volume of legitimate activity makes anomalies difficult to spot without machine learning or careful baselining.

Detection and Hardening Strategies

Moving Forward

Living-off-the-land attacks are difficult to prevent but not impossible to detect. The key is treating your engineering tools as you would any other potential attack vector. If you'd like to discuss engineering tool hardening or behavioral monitoring for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call