Back to Resources
Field Note March 2026 7 min read

TRITON and the Safety System Problem

TRITON proved that attackers can weaponize safety systems. Seven years later, most industrial facilities still lack real-time safety system monitoring.

C

Cascadia OT Security

OT & ICS Security

VENDORINTEGRATORFACILITYOPERATORASSETRISK · HIGHRISK · HIGHRISK · HIGHRISK · MEDRISK · LOWSUPPLY CHAIN5 HANDOFFS

In 2017, TRITON malware successfully modified a safety instrumented system at a petrochemical facility. It was the first publicly confirmed attack on an SIS, and it should have triggered urgent industry-wide remediation. It did not. Today, most manufacturers have no real-time visibility into whether their safety systems are executing their intended logic.

Safety systems occupy a unique position in industrial networks. They are built to be resilient, hardened against accidental failure, and often air-gapped from corporate IT. That same isolation, however, creates a detection blind spot. If TRITON or a derivative gains access, there may be no alarms, no logs, and no early warning before a physical event occurs.

Why Safety Systems Remain Vulnerable

Most safety controllers use proprietary engineering tools that are tightly guarded by OEMs. Reverse-engineering an SIS to create detection signatures is slow and expensive. As a result, security teams often rely on network-level monitoring and access controls rather than application-level integrity checking.

The problem deepens when you consider maintenance. Authorized engineers genuinely need the ability to modify safety logic—sometimes without formal change control if the modification is deemed a quick fix during an emergency. This operational reality makes it difficult to distinguish authorized changes from intrusions.

Detection and Verification Approaches

The Operational Reality

Safety system hardening requires collaboration between engineering, operations, and security. It also requires accepting that some production flexibility must be sacrificed to prevent catastrophic risk. Many organizations have not made that trade-off consciously, and that is the real vulnerability.

If you'd like to discuss safety system visibility and detection for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call