Loading...
Loading...
How nCrypt delivered an integrated IT, OT and IT/OT-boundary assessment across three plants for a Bursa-listed Malaysian manufacturer following a high-profile ransomware event at a regional peer. Client identifying details have been anonymised under the engagement non-disclosure agreement.
The client is a Bursa-listed Malaysian manufacturer operating three plants across Peninsular Malaysia, supplying tier-one customers in the automotive and consumer electronics sectors. Combined annual revenue sits in the higher nine-figure range in Malaysian Ringgit, and a single day of unplanned plant downtime carries a quantifiable revenue and contract-penalty impact in the low millions.
The technology estate is split between a central enterprise IT function based at the corporate headquarters and three plant-side technology teams, each focused on operational continuity rather than cybersecurity. The plant networks combine modern PLC and SCADA equipment with a long tail of legacy controllers and engineering workstations accumulated over more than two decades of plant operation.
The engagement was triggered by a ransomware event at a regional manufacturing peer that had taken plant operations offline for several weeks. The board moved quickly to commission an independent assessment of the group's own exposure to a similar event, with explicit emphasis on the IT/OT boundary that had historically received limited security attention.
Until the board commissioned this engagement, the plant networks had never been systematically assessed under an adversary model. Cybersecurity attention had been concentrated on the corporate IT estate at headquarters, with the plants treated as operational silos under the responsibility of the manufacturing function.
The IT/OT boundary was the immediate concern. Each plant had been integrated into the corporate network at a different point over the previous decade, leaving inconsistent segmentation, mixed Active Directory trust models and a number of vendor remote-access arrangements that had been put in place for short-term support engagements and never withdrawn.
On the OT side, the legacy challenge was substantial. Several engineering workstations ran end-of-support operating systems with no realistic patching path, several PLC programming environments had been left logged in to support faster shift handover, and removable-media use on the plant floor was widespread and untracked.
The binding operational constraint was that no testing could risk a production stop. A halted production line carried a quantifiable cost in the low millions per day, and even brief unplanned downtime would have triggered contract penalties from tier-one customers. The engagement had to produce adversary-quality evidence without ever interacting with a live production process in a way that could affect output.
nCrypt structured the engagement around a three-layer methodology. The passive layer ran throughout the field window and combined network capture, configuration review, asset-inventory reconciliation and walkdown observation. This produced the bulk of the engagement's evidence base without ever touching a production process actively.
The active IT-side layer covered the corporate estate and the IT/OT boundary using standard internal pentest techniques, including Active Directory privilege-graph analysis, segmentation testing from the user VLAN inwards, and adversary-emulation of ransomware-relevant tradecraft against a representative slice of the office estate. All active testing was scoped to stop at the plant boundary unless the plant team had explicitly authorised crossing it.
The active OT-side layer was constrained to representative test rigs and to scheduled maintenance windows agreed with the plant operations leads. Where active testing against live OT was unavoidable, it was conducted on a single device at a time, with an immediate rollback procedure rehearsed in advance and a plant engineer on the comms channel throughout.
The deliverable pack was structured for two audiences. The board pack quantified downtime risk in commercial language and supported the cyber-insurance renewal cycle that was running in parallel. The technical pack provided the central IT function and the three plant teams with prioritised remediation guidance mapped to IEC 62443 zone-and-conduit objectives, with explicit guidance on where compensating controls could be substituted for patching on legacy systems.
Two of three plants had effectively flat layer-three connectivity between the corporate user VLAN and the plant-floor PLC network, with no firewall enforcement at the IT/OT boundary. A compromised office workstation could reach engineering workstations and PLC programming interfaces directly.
Plant engineering workstations were joined to the same Active Directory forest as the office estate, with no tier-zero separation. Standard office-admin credentials could log on interactively to engineering workstations, including those running PLC programming software.
The historian and SCADA application server at the largest plant ran on an end-of-support Windows Server build with no compensating segmentation. Patch management was constrained by the application vendor's support matrix rather than by genuine technical limitation.
An equipment vendor maintained an always-on cellular modem connection into the plant network for remote support, with no bastion, no logging and no credential rotation. The modem was discovered through external attack-surface enumeration rather than from the plant's own asset inventory.
Removable media use on the plant floor was technically permitted on engineering workstations and was not centrally tracked. Initial access via removable media has been a recurring vector in ransomware events affecting regional manufacturing peers.
The engagement produced a quantified attack-surface reduction of roughly two thirds across the three plants, measured against a defined baseline of exposed services, reachable assets and privileged credentials inventoried at the start of the field window. The IT/OT boundary at each plant was rebuilt around firewalled zones aligned to the Purdue model, with vendor remote access consolidated through a logged bastion and quarterly access review.
The board pack quantified daily downtime risk for each plant and was used directly in the cyber-insurance renewal cycle that closed shortly after the engagement, producing a roughly twenty-five per cent reduction in the group's premium against comparable cover. The CFO has cited this outcome as a worked example of cybersecurity spend with a measurable balance-sheet return.
Eighteen months after the original engagement, none of the three plants has experienced a material security event. nCrypt is engaged on an annual reassessment cycle and provides incident-response retainer cover at all three sites, with quarterly tabletop exercises rotating across the leadership team and the plant operations leads.
Share your scope. We'll respond within 24 hours.
Share your scope. We'll respond within 24 hours.
Get an integrated IT, OT and IT/OT-boundary assessment scoped to your plant estate, with a board-ready quantified risk picture.