Back to Resources
Field Note February 2026 7 min read

Nation-State Activity in US Industrial: What Is Public and What You Should Know

CISA and NSA have disclosed sophisticated state-sponsored attacks on US industrial targets. We summarize what is known and what the patterns tell us about targeting.

C

Cascadia OT Security

Founder · Managing Principal · CISSP · GICSP

WAORIDSeattlePortlandHillsboroSalemEugeneKennewickSpokaneBoiseTacomaPNW COVERAGEPORTLAND METRO

Nation-state actors are conducting long-term reconnaissance on US industrial targets, particularly utilities and critical manufacturing. CISA and NSA have released joint advisories detailing targeted intrusions, persistence mechanisms, and supply chain compromise techniques. The pattern suggests preparation rather than immediate attack, but the implication is clear: your facility may be on a targeting list.

Over the past three years, we have seen public disclosures of state-sponsored activity targeting power generation, oil and gas, water utilities, and chemical manufacturing. These campaigns are not espionage-only. They involve hands-on-keyboard access to engineering environments, modification of security tools, and establishment of backdoors that could facilitate disruptive attacks if political conditions change.

Common Targeting Vectors and Techniques

Nation-state actors typically establish initial access through supply chain compromise, targeting vendors and integrators rather than directly attacking industrial sites. Once inside IT networks, they move slowly and deliberately, extracting network diagrams and credentials before lateral movement to OT systems.

Persistence is a priority. Rather than conducting immediate attacks, these actors establish multiple backdoors, configure C2 communications to appear as legitimate traffic, and in some cases modifiy monitoring tools to blind defenders. The goal is readiness—the ability to escalate to disruptive operations on short notice.

Detection and Readiness Measures

Your Risk Posture Today

You should assume that sophisticated threat actors have conducted reconnaissance against your facility and your industry sector. The question is not whether you are targeted, but whether you are prepared to detect and respond to intrusion before it becomes disruptive. If you'd like to discuss nation-state threat modeling or readiness assessment for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call