State actors have moved from sporadic probes to systematic positioning inside critical infrastructure networks. This is not espionage for the sake of data. It is pre-positioning: long term access, stealthy footholds, and the ability to switch from intelligence collection to disruption at will.
The pattern is clear. Chinese state-sponsored groups have been identified embedding persistent access across telecommunications, energy, transportation, and water networks with the explicit goal of maintaining options to disrupt in a crisis. These intrusions are subtle, often hiding in legitimate administrative tools and poorly monitored edge devices.
Russian military cyber actors have continued operations against critical infrastructure globally, using destructive malware and tailored campaigns to target energy and logistics systems. Their tactics focus on blending destructive capability with plausible deniability and exploiting gaps between IT and operational technology defenders.
Iran-linked actors and proxies have demonstrated a parallel focus on operational technology in the water sector and other utilities, exploiting default credentials and unpatched PLCs to create disruption pathways. U.S. agencies and regulators have documented real incidents and elevated enforcement and guidance for water systems as a direct response to those intrusions.
North Korea remains a different but relevant vector. Pyongyang’s cyber program is now a clear revenue engine through large-scale cryptocurrency thefts and laundering, which also funds and sustains its broader offensive cyber operations. That financial axis buys capability and deniability and keeps their operators well resourced. Recent allied statements publicly identified major 2024 thefts tied to DPRK actors.
Why does this matter to U.S. homeland resilience? Because most critical systems are built on commercial hardware, years of technical debt, and network architectures designed for availability instead of threat resistance. Edge routers, vendor-supplied remote management tools, and industrial controllers are high-payoff targets. Adversaries have noticed. They will keep probing until defenders make them pay for each meter of access.
Immediate, practical steps for owners and operators:
- Reduce the attack surface on internet-facing OT and management interfaces. Move remote access behind jump hosts and MFA. Backup segmented control networks to immutable media. Change all default credentials now.
- Prioritize patching and end-of-life remediation for edge devices and telecom gear. Many of these devices are the choke points adversaries exploit to move lateral and persist.
- Centralize logging for IT and OT, retain logs offsite, and hunt for living-off-the-land techniques and subtle configuration changes. Assume long dwell time; hunt accordingly.
Strategic and policy moves that must follow immediately:
- Fund sector-specific OT exercises that include nation-state playbooks. Tabletop exercises are cheap. Full-scale red team drills against real OT environments are expensive but essential. Budget accordingly.
- Enforce basic cybersecurity standards across small utilities. The water sector example shows that lack of basic hygiene is what turns reconnaissance into real risk. Regulators must act where voluntary measures have failed.
- Treat resilience at the supply chain level. Swap single-vendor dependencies where they concentrate risk. Insist on firmware transparency and secure update channels for devices that control physical processes.
- Expand public-private intelligence sharing with legal protections and rapid playbooks for containment and recovery. Speed matters. When nation-state teams find a path, minutes count.
This is not a future problem. The posture of multiple nation-states demonstrates deliberate, capability-driven campaigns against the systems that keep hospitals powered, water flowing, trains running, and communications alive. The remedy is blunt: harden the basics, prioritize OT visibility, invest in targeted exercises, and fund enforcement where neglect leaves communities exposed. Do that now, and you reduce the odds that a crisis becomes a catastrophe.