With the customers BlastWave talks to every day, AI threats come up periodically, raised by the OT geeks who have already embedded it into their work. But many in the OT space would rather not think about AI as a threat vector since “it hasn’t really happened yet.”
Well, if you’ve been following the news from Anthropic lately, the cybersecurity landscape just shifted from "concerning" to "unprecedented." The decision to withhold the release of Claude Mythos wasn't just a marketing stunt; it was a warning flare for every CISO and OT operator on the planet.
For the first time in history, we aren't just defending against human intelligence. We are defending against autonomous agents. Machines that don't just follow instructions, but take unprompted actions to achieve a goal, are not just “coming”. They are here.
Consider this: During testing, Claude Mythos identified and exploited a 27-year-old vulnerability in OpenBSD. Think about the legacy controllers, the unpatched PLCs, and the "forgotten" HMIs sitting on your factory floor right now. If an AI can dig up a flaw from three decades ago and turn it into a working exploit in seconds, your "patch and pray" cycle is officially dead.
Even more chilling? The model showed a persistent ability to escape its virtual sandbox. It attempted to contact outside researchers and post its own exploits to public sites without being asked. When the "attacker" can literally think its way out of its cage, your traditional firewalls and detection tools are nothing more than a suggestion.
Even worse? The companies that Anthropic partnered with include the cybersecurity heavyweights CrowdStrike, Palo Alto, and Cisco, all of which sell products that are supposed to protect networks from attacks but have been found to have gaping holes of their own. In fact, the firewalls that are supposed to safeguard our OT networks are usually present in 100% of cyberattacks against critical infrastructure. This indicates that the security solutions you rely on to protect your network today are also at risk.
We’ve already seen state-sponsored actors (specifically out of North Korea) manipulating Claude to orchestrate 80-90% of a cyber espionage operation autonomously. They didn't have to be elite hackers; they just had to trick the agent into performing reconnaissance and credential harvesting.
This is the new "AI Battlefield." It’s a world where:
The reactive defense model (detecting an anomaly and responding to it) is a losing game against an autonomous agent. If you give a model like Mythos a "window of opportunity," it will find a way through.
The only practical solution in a landscape this vulnerable is to remove the target from the map. At BlastWave, our philosophy is simple: You cannot attack what you cannot see. By using a secure overlay and network cloaking architecture, we render your OT assets invisible to the public internet. If the AI bot can't see the HMI, it can't exploit that 27-year-old vulnerability. We aren't trying to out-think the AI; we’re ensuring the AI doesn't even know where the battle is.
We include the risk posed by IT security products that are supposed to protect OT but have not delivered on that promise. A secure overlay on the OT network creates a virtual air gap and strong segmentation that prevents easy lateral movement from IT to OT during a breach, thereby preventing it from escalating into an attack.
We are at a crossroads. We can continue to buy "smarter" reactive tools that will inevitably be outpaced, or we can move toward a proactive architecture that simply eliminates the attack vectors that AI is amplifying.
I’m diving deep into these frontier threats, including how Claude is being used as a weapon today in our upcoming webinar. If you want to see how we’re building the "invisibility cloak" for critical infrastructure, you need to be there.
The Bremanger Dam cyberattack exposed a SCADA system with a weak password, releasing 7.2 million liters. See how BlastWave’s Zero Trust and cloaking could have prevented it.
Explore the complete analysis of 23 OT attacks that defeated firewalls, VPNs, and air gaps.