Pentests Don't Map Shadow Currents. Attackers Do.
Why penetration testing misses the cross-domain paths that matter most
Your pentest came back clean. Your auditors are satisfied. Your compliance checkboxes are filled. And somewhere in your environment, a shadow current is already flowing.
Why Penetration Tests Miss the Attacks That Actually Matter
Pentests check visible channels. The attack paths that matter flow through cracks tested on different days by different teams, or never tested at all. As we've traced throughout this series, shadow currents don't exploit single vulnerabilities -- they chain small gaps together across domains. Pentesting finds the gaps. It rarely maps the chains.
This isn't a criticism of penetration testing. It's a structural reality that every security team relying on annual assessments needs to understand clearly.
What pentests Actually Do Well
Before examining the gaps, credit where it's due. A well-executed pentest delivers real value: it finds vulnerabilities within defined scope, validates specific security controls, satisfies regulatory requirements from PCI DSS to HIPAA, and produces documented findings that drive remediation. The global penetration testing market reached $2.74 billion in 2025 and is growing fast, reflecting genuine organizational investment in security validation.
pentests work. They just don't work the way attackers work.
The Scope Problem Attackers Don't Have
Every pentest begins with rules of engagement: here's what you test, here's the time window, here are the systems in scope. Production environments, legacy systems, third-party integrations and high-uptime industrial systems are commonly excluded. The rules exist for good operational reasons. But they create a fundamental asymmetry.
Attackers won't politely respect scope boundaries. They'll breach corporate infrastructure to access application data through the path of least resistance. Testers follow pre-defined paths. Attackers discover their own.
The result is security drift: a growing gap between what's been tested and what's actually running. According to Pentera's 2025 State of Penetration Testing report, 96% of organizations make changes to their IT environment at least quarterly. Most test annually. Every deployment, configuration change and new cloud workload between tests represents exposure your pentest never saw. Horizon3.ai's research found that over 40% of organizations report their pentest results are invalid by the time the report is delivered.
Third-party access paths compound this further. As we traced in Blog 9, vendor and partner connections create shadow current channels that span organizational boundaries -- and pentest scopes rarely include them. Temporary remote access, contractor connections and air gaps are exactly the kind of paths that look absent on test day but exist in practice.
Tested Separately, Exploited Together
IT environments get tested by IT security teams using IT security tools. OT environments get tested separately, during maintenance windows, with specialized tools, by specialists who understand Modbus and Profinet protocols. And the boundary between them -- the path most attackers actually use -- often never gets tested at all.
This is the IT to OT shadow current we mapped in Blog 3 -- the strongest channel in most industrial environments, and the one most consistently left out of scope. According to Dragos' OT Cybersecurity Year in Review, approximately 70% of OT-related incidents originate from within the IT environment. Yet IT and OT remain almost universally tested as separate domains.
The Colonial Pipeline attack illustrates what this costs. The 2021 breach entered through a compromised password for an inactive VPN account that wasn't running MFA. Dormant accounts frequently fall outside pentest scope because testers work from current asset inventories that don't include deprecated access points. The attacker didn't need to touch OT systems directly. Colonial shut down 5,500 miles of pipeline because, lacking visibility into OT security status, they couldn't determine what the attackers had accessed. CISA's post-incident analysis identified the core problem: no clear, enforceable boundary between IT and OT networks.
An inactive credential. A scope gap. A cross-domain path. That's how shadow currents flow.
The Timing Gap That Creates Open Windows
Even if scope were perfect, timing wouldn't be. The fastest 25% of intrusions reached data exfiltration in 72 minutes in 2025, down from 285 minutes the previous year, according to Unit 42 research. Annual pentesting produces a compliance document. It provides no defense against a threat that completes its entire kill chain before your security team's morning standup.
Attackers operate continuously. They don't wait for your testing window.
What Shadow Currents Flow Through
When you examine what major breaches actually exploited, a pattern emerges. The Change Healthcare 2024 attack used stolen credentials to move laterally through connected systems. SolarWinds used supply chain trust relationships to bypass defenses at organizations whose individual systems had passed security reviews. According to Verizon's 2025 DBIR, 22% of breaches began with stolen credentials. These aren't vulnerabilities within a single system. They're paths between systems.
XM Cyber's State of Exposure Management 2024 analysis of more than 40 million exposures found that 80% of organizational risk comes from misconfigurations, not CVEs. Less than 1% came from CVEs. Traditional pentests focus on vulnerability exploitation. The actual attack surface has shifted toward trust relationships, credential flows and lateral movement across domain boundaries.
Continuous Attack Path Analysis: The Other Half of the Picture
This is where continuous validation closes the gap. pentesting finds vulnerabilities in view. Shadow current mapping finds the flows between them. You need both.
Gartner projects that by 2026, organizations prioritizing security investments based on a continuous threat exposure management (CTEM) program will realize a two-thirds reduction in breaches. Forrester's Total Economic Impact research found a 90% reduction in likelihood of severe breach for organizations with proper CTEM implementation, with ROI reaching 400%.
PhishCloud's Cyber Fusion Center delivers continuous situational awareness across IT and OT domains simultaneously, correlating signals in real time across the same boundaries attackers actually cross. Where a pentest captures a moment, the CFC captures the flow.
Your next pentest will tell you what your environment looked like within a defined scope on a specific date. That's genuinely useful. But shadow currents don't stop at scope boundaries, and they don't wait for scheduled testing windows. Understanding both what pentests reveal and what they structurally cannot see is the starting point for real visibility into your attack surface.
Pentests miss shadow currents because they test at one point in time. But there's another temporal dimension worth examining: change windows. During maintenance, upgrades and routine operational changes, shadow currents that didn't exist yesterday suddenly open. That's what we'll explore in the next installment.
Shadow currents flow through paths pentests don't map. See what continuous visibility across your IT and OT environment actually looks like.
Get an OT Red Team AssessmentYour pentest was clean. The shadow current was already flowing.
Pentesting finds vulnerabilities. It rarely maps the chains attackers use to cross between them. Here's why -- and what closes the gap.
By the Numbers
The structural gap between pentesting and real attacker behavior
5 Gaps Pentests Leave Open
Click each card to see how attackers exploit what testers miss
The Scope Boundary
Click to explore
Pentests exclude production systems, legacy infrastructure, and third-party integrations for operational reasons. Attackers have no such rules. They move through whatever path offers least resistance -- including the systems that were never in scope.
The IT/OT Seam
Click to explore
IT teams test IT. OT specialists test OT. The boundary between them -- the path 70% of OT incidents actually use -- gets tested by neither. SANS ICS613 calls this "OT boundary pivoting." Most pentest scopes stop exactly where attackers accelerate.
The Timing Gap
Click to explore
The fastest 25% of intrusions reached full data exfiltration in 72 minutes in 2025. Annual pentesting produces a compliance snapshot. An attacker can complete an entire kill chain before your security team has their morning standup. Testing once a year is not a defense posture.
Dormant Credentials
Click to explore
Testers work from current asset inventories. Inactive VPN accounts, deprecated access points, and old contractor credentials don't appear on those lists. Colonial Pipeline's breach entered through exactly this gap -- an inactive VPN account with no MFA that no one thought to test.
Trust Path Exploitation
Click to explore
22% of breaches start with stolen credentials. SolarWinds exploited supply chain trust. Change Healthcare exploited lateral movement through connected systems. These aren't CVEs -- they're trusted relationships between systems. Pentests focus on vulnerabilities. Attackers focus on trust.
How It Plays Out in Practice
Click each case to see the shadow current at work
🚨 Colonial Pipeline: One Inactive Credential, 5,500 Miles of Pipeline
▼The 2021 Colonial Pipeline breach entered through a compromised password for an inactive VPN account with no MFA enabled. Dormant accounts routinely fall outside pentest scope -- testers use current asset inventories that don't include deprecated access points.
The attacker never touched OT systems directly. Colonial shut down 5,500 miles of pipeline anyway because they had no visibility into what the attacker had accessed across the IT/OT boundary. CISA's post-incident analysis pointed to the core failure: no clear, enforceable separation between IT and OT networks.
The shadow current: Inactive credential + scope gap + untested cross-domain path. A pentest that checked active systems found nothing wrong. The breach ran through what wasn't tested.
🔗 SolarWinds and Change Healthcare: When Trust Becomes the Attack Vector
▼SolarWinds didn't exploit a CVE. It exploited supply chain trust relationships -- the implicit trust that organizations extend to vendor software updates. Organizations whose individual systems had passed security reviews were compromised because the trust path between vendor and customer was never tested.
Change Healthcare's 2024 attack used stolen credentials for lateral movement through connected systems -- the detection blind spots that exist in every environment where trusted internal traffic blends with attacker movement. Verizon's 2025 DBIR confirms 22% of breaches start this way.
The pattern: Both attacks moved through trusted relationships between systems, not through vulnerabilities within them. XM Cyber's analysis of 40 million exposures confirms this: 80% of organizational risk is misconfigurations and trust paths, less than 1% is CVEs.
📈 CTEM: Closing the Gap pentests Can't Close Alone
▼Pentesting and continuous threat exposure management (CTEM) are not competing approaches -- they're complementary. Pentests deliver deep, validated findings within defined scope. CTEM covers the cross-domain flows, temporal gaps, and environment changes that point-in-time testing structurally cannot address.
Gartner projects that by 2026, organizations running CTEM programs will see a two-thirds reduction in breaches. Forrester's research puts the ROI at 400%, with a 90% reduction in likelihood of severe breach. IBM and Gartner both endorse the complementary model.
PhishCloud's Cyber Fusion Center delivers continuous situational awareness across IT and OT domains simultaneously -- correlating signals in real time across the same boundaries attackers actually cross. Where a pentest captures a moment, the CFC captures the flow.
Key Takeaways
The Structural Limit
Pentests are bounded by scope, time windows, and current asset inventories. Shadow currents flow through exactly what gets excluded -- deprecated credentials, IT/OT boundaries, third-party paths.
Where Attackers Actually Move
80% of risk is misconfigurations and trust relationships, not CVEs. 22% of breaches start with stolen credentials. Attackers move between systems. Pentests mostly test within them.
Both Halves of the Picture
Pentests find the gaps. Continuous validation maps the chains between them. You need both. CTEM programs show 2/3 fewer breaches and 400% ROI. The gap is closeable -- if you know it exists.
Shadow currents flow through paths pentests don't map. See what continuous visibility across your IT and OT environment actually looks like.
Get an OT Red Team Assessment