ブログ
/
/
February 11, 2021

Detecting IoT Threats in Control Systems

Discover how Darktrace uncovers pre-existing threats in Industrial IoT systems. Learn about advanced detection techniques in industrial control systems.
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
David Masson
VP, Field CISO
Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
11
Feb 2021

Industrial IoT (IIoT) devices are a pressing concern for security teams. Companies invest large sums of money to keep cyber-criminals out of industrial systems, but what happens when the hacker is already inside? Gateways and legacy security tools generally sit at the border of an organization and are designed to stop external threats, but are less effective once the threat is already inside. During this period, cyber-criminals carry out further reconnaissance, tamper with PLC settings, and subtly disrupt the production process.

Darktrace recently detected a series of pre-existing infections in Industrial IoT (IIoT) devices at a manufacturing firm in the EMEA region. The organization already had Darktrace in place in one area of the environment, but after seeing how the AI could successfully detect zero-day vulnerabilities and threats, they expanded the deployment, allowing Darktrace to actively monitor and defend interactions among its 5,000 devices, and dramatically improving visibility.

An unknown emerging threat was identified by Darktrace’s Industrial Immune System on multiple machines within hours of Darktrace being active in the environment. By casting light on this previously unknown threat, Darktrace enabled the customer to perform full incident response and threat investigation, before the attacker was able to cause any serious damage to the company.

Though it is unclear how long the devices had been infected, it is likely to have been first introduced manually via an infected USB. The affected endpoints were being used as part of a continuous production process and could not be installed with endpoint protection.

The Industrial Immune System, however, easily detects infections across the digital estate, regardless of the type of environment or technology. Darktrace AI does not rely on signature-based methods but instead continuously updates its understanding of what constitutes ‘normal’ in an industrial environment. This self-learning approach allows the AI to contain zero-days that have never been seen before in the wild, as well as detecting the new appearance of pre-existing attacks.

Industrial IoT attacked

Only a few hours after Darktrace AI had begun defending the wider connections and interactions across the manufacturing firm, the Industrial Immune System detected a highly unusual network scan. A timeline of events, from first scan to full incident response results and conclusions, is shown below:

Figure 1: Timeline of incident response across 28 hours

Darktrace’s AI recognized that the device was exploiting an SMBv1 protocol in order to attempt lateral movement. In addition to anonymous SMBv1 authentication, Darktrace detected the device abusing default vendor credentials for device enumeration.

The device made a large number of unusual connections, including connections to internal endpoints which the company had previously been unaware of. As these occurred, the Threat Visualizer, Darktrace’s user interface, provided a graphical visualization of the incident, illuminating the unusual activity’s spread from the infected device across the infrastructure in question.

Figure 2: The Darktrace Threat Visualizer

Darktrace’s Immune System identified that the infected Industrial IoT device was making an unusually large number of internal connections, suggesting an effort to perform reconnaissance.

Darktrace’s Cyber AI Analyst launched an immediate investigation into the alert, surfacing an incident summary at machine speed with all the information the security team needed to act.

Figure 3: An example of an AI Analyst Report on a network scan

The Cyber AI Analyst further identified two other devices behaving in a similar way, and these were removed from the network by the customer in response. When investigated by the security team, these devices were shown to be infected with the Yalove and Renocide worms, and the Autoit trojan-dropper. Open source intelligence suggests these infections are often spread via removable media such as USB drives.

Using Darktrace’s Advanced Search function, the customer was able to investigate related model breaches to build a list of similar indicators of compromise (IoCs), including failed external connections to www.whatismyip[.]com and DYNDNS IP addresses on HTTP port 80.

Recurring infections: How to deal with a persistent attack

In total, Darktrace was used to identify 13 infected production devices. The customer contacted the equipment owner, whose response confirmed that they had seen similar attacks on other networks in the past, including recurring infections.

Recurring infections imply one of two things: either, that the malware has a persistence mechanism, where it uses a range of techniques to remain undetected on the exploited machine and achieve persistent access to the system. Alternatively, a recurring infection could mean that the IoT manufacturer was not able to find all infected devices when they were first alerted to the compromise, and thus did not shut down the attack in its entirety.

As the infected machines are owned by a third party, they could not be immediately remediated. Darktrace AI, however, contained this threat with minimal business disruption. The customer was able to leave the infected devices active, which were still needed for production, confident that Darktrace would alert them if the infection spread or changed in behavior.

Industrial IoT: Shining a light on pre-existing threats

The mass adoption of Industrial IoT devices has made industrial environments more complex and more vulnerable than ever. This blog demonstrates the prevalent threat that attackers are already on the inside, and the importance for security teams to expand visibility over their full industrial system. In this case, the customer was able to use Darktrace’s AI to illuminate a previous blind spot and contain a persistent attack, while minimizing disruption to operations. Crucially, this ‘unknown known’ threat was detected without any prior knowledge of the devices, their supplier, or patch history, and without using malware signatures or IoCs.

The customer was made aware of the infection via the Darktrace SOC service. Yet the same outcome could have been obtained with other workflows provided by Darktrace, such as email alerting, notifications through the Darktrace mobile app, seamlessly integrating Darktrace with a SIEM solution, or alerting via an internal SOC.

Cyber AI Analyst enabled the customer to perform immediate incident response. While waiting for a reinstallation date with the equipment owner, the customer could keep the production devices online, knowing Darktrace would be monitoring the outstanding risk. In an industrial setting, trade-offs like this are often necessary to sustain production. Darktrace helps organizations maintain the vigilance they need to do this securely, and when remediation does become possible, Darktrace can be used to reliably locate the full extent of the infection.

Thanks to Darktrace analyst Oakley Cox for his insights on the above threat find.

Find out more about the Industrial Immune System

Darktrace model detections:

  • Device / Suspicious Network Scan Activity [Enhanced Monitoring]
  • Device / ICMP Address Scan
  • ICS / Anomalous IT to ICS Connection
  • Anomalous Connection / SMB Enumeration
  • Device / Network Scan

Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
David Masson
VP, Field CISO

More in this series

No items found.

Blog

/

Email

/

December 18, 2025

Why organizations are moving to label-free, behavioral DLP for outbound email

Default blog imageDefault blog image

Why outbound email DLP needs reinventing

In 2025, the global average cost of a data breach fell slightly — but remains substantial at USD 4.44 million (IBM Cost of a Data Breach Report 2025). The headline figure hides a painful reality: many of these breaches stem not from sophisticated hacks, but from simple human error: mis-sent emails, accidental forwarding, or replying with the wrong attachment. Because outbound email is a common channel for sensitive data leaving an organization, the risk posed by everyday mistakes is enormous.

In 2025, 53% of data breaches involved customer PII, making it the most commonly compromised asset (IBM Cost of a Data Breach Report 2025). This makes “protection at the moment of send” essential. A single unintended disclosure can trigger compliance violations, regulatory scrutiny, and erosion of customer trust –consequences that are disproportionate to the marginal human errors that cause them.

Traditional DLP has long attempted to mitigate these impacts, but it relies heavily on perfect labelling and rigid pattern-matching. In reality, data loss rarely presents itself as a neat, well-structured pattern waiting to be caught – it looks like everyday communication, just slightly out of context.

How data loss actually happens

Most data loss comes from frustratingly familiar scenarios. A mistyped name in auto-complete sends sensitive data to the wrong “Alex.” A user forwards a document to a personal Gmail account “just this once.” Someone shares an attachment with a new or unknown correspondent without realizing how sensitive it is.

Traditional, content-centric DLP rarely catches these moments. Labels are missing or wrong. Regexes break the moment the data shifts formats. And static rules can’t interpret the context that actually matters – the sender-recipient relationship, the communication history, or whether this behavior is typical for the user.

It’s the everyday mistakes that hurt the most. The classic example: the Friday 5:58 p.m. mis-send, when auto-complete selects Martin, a former contractor, instead of Marta in Finance.

What traditional DLP approaches offer (and where gaps remain)

Most email DLP today follows two patterns, each useful but incomplete.

  • Policy- and label-centric DLP works when labels are correct — but content is often unlabeled or mislabeled, and maintaining classification adds friction. Gaps appear exactly where users move fastest
  • Rule and signature-based approaches catch known patterns but miss nuance: human error, new workflows, and “unknown unknowns” that don’t match a rule

The takeaway: Protection must combine content + behavior + explainability at send time, without depending on perfect labels.

Your technology primer: The three pillars that make outbound DLP effective

1) Label-free (vs. data classification)

Protects all content, not just what’s labeled. Label-free analysis removes classification overhead and closes gaps from missing or incorrect tags. By evaluating content and context at send time, it also catches misdelivery and other payload-free errors.

  • No labeling burden; no regex/rule maintenance
  • Works when tags are missing, wrong, or stale
  • Detects misdirected sends even when labels look right

2) Behavioral (vs. rules, signatures, threat intelligence)

Understands user behavior, not just static patterns. Behavioral analysis learns what’s normal for each person, surfacing human error and subtle exfiltration that rules can’t. It also incorporates account signals and inbound intel, extending across email and Teams.

  • Flags risk without predefined rules or IOCs
  • Catches misdelivery, unusual contacts, personal forwards, odd timing/volume
  • Blends identity and inbound context across channels

3) Proprietary DSLM (vs. generic LLM)

Optimized for precise, fast, explainable on-send decisions. A DSLM understands email/DLP semantics, avoids generative risks, and stays auditable and privacy-controlled, delivering intelligence reliably without slowing mail flow.

  • Low-latency, on-send enforcement
  • Non-generative for predictable, explainable outcomes
  • Governed model with strong privacy and auditability

The Darktrace approach to DLP

Darktrace / EMAIL – DLP stops misdelivery and sensitive data loss at send time using hold/notify/justify/release actions. It blends behavioral insight with content understanding across 35+ PII categories, protecting both labeled and unlabeled data. Every action is paired with clear explainability: AI narratives show exactly why an email was flagged, supporting analysts and helping end-users learn. Deployment aligns cleanly with existing SOC workflows through mail-flow connectors and optional Microsoft Purview label ingestion, without forcing duplicate policy-building.

Deployment is simple: Microsoft 365 routes outbound mail to Darktrace for real-time, inline decisions without regex or rule-heavy setup.

A buyer’s checklist for DLP solutions

When choosing your DLP solution, you want to be sure that it can deliver precise, explainable protection at the moment it matters – on send – without operational drag.  

To finish, we’ve compiled a handy list of questions you can ask before choosing an outbound DLP solution:

  • Can it operate label free when tags are missing or wrong? 
  • Does it truly learn per user behavior (no shortcuts)? 
  • Is there a domain specific model behind the content understanding (not a generic LLM)? 
  • Does it explain decisions to both analysts and end users? 
  • Will it integrate with your label program and SOC workflows rather than duplicate them? 

For a deep dive into Darktrace’s DLP solution, check out the full solution brief.

[related-resource]

Continue reading
About the author
Carlos Gray
Senior Product Marketing Manager, Email

Blog

/

Email

/

December 17, 2025

Beyond MFA: Detecting Adversary-in-the-Middle Attacks and Phishing with Darktrace

Default blog imageDefault blog image

What is an Adversary-in-the-middle (AiTM) attack?

Adversary-in-the-Middle (AiTM) attacks are a sophisticated technique often paired with phishing campaigns to steal user credentials. Unlike traditional phishing, which multi-factor authentication (MFA) increasingly mitigates, AiTM attacks leverage reverse proxy servers to intercept authentication tokens and session cookies. This allows attackers to bypass MFA entirely and hijack active sessions, stealthily maintaining access without repeated logins.

This blog examines a real-world incident detected during a Darktrace customer trial, highlighting how Darktrace / EMAILTM and Darktrace / IDENTITYTM identified the emerging compromise in a customer’s email and software-as-a-service (SaaS) environment, tracked its progression, and could have intervened at critical moments to contain the threat had Darktrace’s Autonomous Response capability been enabled.

What does an AiTM attack look like?

Inbound phishing email

Attacks typically begin with a phishing email, often originating from the compromised account of a known contact like a vendor or business partner. These emails will often contain malicious links or attachments leading to fake login pages designed to spoof legitimate login platforms, like Microsoft 365, designed to harvest user credentials.

Proxy-based credential theft and session hijacking

When a user clicks on a malicious link, they are redirected through an attacker-controlled proxy that impersonates legitimate services.  This proxy forwards login requests to Microsoft, making the login page appear legitimate. After the user successfully completes MFA, the attacker captures credentials and session tokens, enabling full account takeover without the need for reauthentication.

Follow-on attacks

Once inside, attackers will typically establish persistence through the creation of email rules or registering OAuth applications. From there, they often act on their objectives, exfiltrating sensitive data and launching additional business email compromise (BEC) campaigns. These campaigns can include fraudulent payment requests to external contacts or internal phishing designed to compromise more accounts and enable lateral movement across the organization.

Darktrace’s detection of an AiTM attack

At the end of September 2025, Darktrace detected one such example of an AiTM attack on the network of a customer trialling Darktrace / EMAIL and Darktrace / IDENTITY.

In this instance, the first indicator of compromise observed by Darktrace was the creation of a malicious email rule on one of the customer’s Office 365 accounts, suggesting the account had likely already been compromised before Darktrace was deployed for the trial.

Darktrace / IDENTITY observed the account creating a new email rule with a randomly generated name, likely to hide its presence from the legitimate account owner. The rule marked all inbound emails as read and deleted them, while ignoring any existing mail rules on the account. This rule was likely intended to conceal any replies to malicious emails the attacker had sent from the legitimate account owner and to facilitate further phishing attempts.

Darktrace’s detection of the anomalous email rule creation.
Figure 1: Darktrace’s detection of the anomalous email rule creation.

Internal and external phishing

Following the creation of the email rule, Darktrace / EMAIL observed a surge of suspicious activity on the user’s account. The account sent emails with subject lines referencing payment information to over 9,000 different external recipients within just one hour. Darktrace also identified that these emails contained a link to an unusual Google Drive endpoint, embedded in the text “download order and invoice”.

Darkrace’s detection of an unusual surge in outbound emails containing suspicious content, shortly following the creation of a new email rule.
Figure 2: Darkrace’s detection of an unusual surge in outbound emails containing suspicious content, shortly following the creation of a new email rule.
Darktrace / EMAIL’s detection of the compromised account sending over 9,000 external phishing emails, containing an unusual Google Drive link.
Figure 3: Darktrace / EMAIL’s detection of the compromised account sending over 9,000 external phishing emails, containing an unusual Google Drive link.

As Darktrace / EMAIL flagged the message with the ‘Compromise Indicators’ tag (Figure 2), it would have been held automatically if the customer had enabled default Data Loss Prevention (DLP) Action Flows in their email environment, preventing any external phishing attempts.

Figure 4: Darktrace / EMAIL’s preview of the email sent by the offending account.
Figure 4: Darktrace / EMAIL’s preview of the email sent by the offending account.

Darktrace analysis revealed that, after clicking the malicious link in the email, recipients would be redirected to a convincing landing page that closely mimicked the customer’s legitimate branding, including authentic imagery and logos, where prompted to download with a PDF named “invoice”.

Figure 5: Download and login prompts presented to recipients after following the malicious email link, shown here in safe view.

After clicking the “Download” button, users would be prompted to enter their company credentials on a page that was likely a credential-harvesting tool, designed to steal corporate login details and enable further compromise of SaaS and email accounts.

Darktrace’s Response

In this case, Darktrace’s Autonomous Response was not fully enabled across the customer’s email or SaaS environments, allowing the compromise to progress,  as observed by Darktrace here.

Despite this, Darktrace / EMAIL’s successful detection of the malicious Google Drive link in the internal phishing emails prompted it to suggest ‘Lock Link’, as a recommended action for the customer’s security team to manually apply. This action would have automatically placed the malicious link behind a warning or screening page blocking users from visiting it.

Autonomous Response suggesting locking the malicious Google Drive link sent in internal phishing emails.
Figure 6: Autonomous Response suggesting locking the malicious Google Drive link sent in internal phishing emails.

Furthermore, if active in the customer’s SaaS environment, Darktrace would likely have been able to mitigate the threat even earlier, at the point of the first unusual activity: the creation of a new email rule. Mitigative actions would have included forcing the user to log out, terminating any active sessions, and disabling the account.

Conclusion

AiTM attacks represent a significant evolution in credential theft techniques, enabling attackers to bypass MFA and hijack active sessions through reverse proxy infrastructure. In the real-world case we explored, Darktrace’s AI-driven detection identified multiple stages of the attack, from anomalous email rule creation to suspicious internal email activity, demonstrating how Autonomous Response could have contained the threat before escalation.

MFA is a critical security measure, but it is no longer a silver bullet. Attackers are increasingly targeting session tokens rather than passwords, exploiting trusted SaaS environments and internal communications to remain undetected. Behavioral AI provides a vital layer of defense by spotting subtle anomalies that traditional tools often miss

Security teams must move beyond static defenses and embrace adaptive, AI-driven solutions that can detect and respond in real time. Regularly review SaaS configurations, enforce conditional access policies, and deploy technologies that understand “normal” behavior to stop attackers before they succeed.

Credit to David Ison (Cyber Analyst), Bertille Pierron (Solutions Engineer), Ryan Traill (Analyst Content Lead)

Appendices

Models

SaaS / Anomalous New Email Rule

Tactic – Technique – Sub-Technique  

Phishing - T1566

Adversary-in-the-Middle - T1557

Continue reading
About the author
あなたのデータ × DarktraceのAI
唯一無二のDarktrace AIで、ネットワークセキュリティを次の次元へ