Your Maintenance Window Is an Open Invitation to Attackers

Scheduled downtime is your most predictable security gap—and attackers already know your calendar.

The entry point wasn't a sophisticated exploit. Not a zero-day, not a nation-state campaign, at least not at first contact. It was a maintenance window, a USB drive and a contractor who didn't know his laptop was already compromised.

The Security Fog That Opens Every Maintenance Window

The contractor arrived with a USB drive and a work order. Standard stuff: a firmware update for the plant's control system, scheduled during the quarterly maintenance window. He plugged in, ran his update, packed up and left. Three weeks later, the facility was still trying to restart production.

When a change window opens, something predictable happens to your security posture: it contracts. Monitoring tools get powered down or tuned to suppress the flood of legitimate reconfiguration traffic. Firewall rules get temporarily relaxed so vendors can connect. Safety Instrumented Systems (SIS) get taken offline for servicing. Break-glass credentials come out.

According to a 2025 analysis by ShieldWorkz, this creates what practitioners call a "security fog"—a period where monitoring is blinded by legitimate activity and malicious actions can be initiated without triggering alarms. ShieldWorkz describes the correct posture as a "surgical theater" mindset, a principle aligned with IEC 62443, which calls for heightened security governance and controls throughout the maintenance lifecycle. Most organizations don't come close to that standard.

Three components converge: increased human intervention, relaxed operational controls and temporary bypass of standard defenses. Any one of these creates risk. All three simultaneously, on a scheduled and predictable timeline, create something worse: an invitation. Pen tests conducted outside these windows never see this configuration, which means the security controls your last assessment validated may look nothing like what exists during a maintenance event.

Attackers Know Your Schedule Before You Announce It

One uncomfortable truth about change windows: they are highly visible to patient adversaries.

Public utilities publish planned outage windows on customer-facing websites. Regulatory bodies require maintenance reporting. LinkedIn profiles map exactly which engineers and contractors handle which systems. Tools like Shodan can passively query more than 100,000 internet-connected industrial devices, gathering device banners, operating systems and facility identifiers without ever touching a target system.

Sophisticated actors don't need to guess when your defenses drop. Mandiant's M-Trends 2025 report found the global median dwell time rose to 11 days, but in cases where external parties discovered the breach, that median extended to 26 days. During that period, attackers learn your operational rhythms from the inside. VOLTZITE demonstrated this at U.S. electric and water utilities in 2025, mapping engineering workstations and process shutdown conditions for months before acting.

How TRITON, Stuxnet, and VOLTZITE Exploited the Open Window

The TRITON/TRISIS attack on a Saudi petrochemical refinery in 2017 is the clearest example of change window exploitation. Attackers leveraged the fact that SIS controllers must connect to engineering workstations during maintenance and programming activities. That temporary connectivity—required by the engineering process itself—was the attack path. The malware targeted the facility's last line of automated defense against catastrophic accidents and attempted to disable it.

Stuxnet followed the same logic a decade earlier, entering the air-gapped Natanz nuclear facility through maintenance contractor USB drives. The air gap was only bridged during maintenance visits. That was enough.

Dragos' 2026 OT cybersecurity report documented 42-day average dwell times for ransomware in OT environments—significantly longer than the enterprise-wide average. Attackers arrive during a change window when access is expanded and monitoring is reduced, establish persistence and wait. The disruption comes later, at a time of their choosing.

Claroty Chief Strategy Officer Grant Geyer described the pattern in February 2025: "There's some emergency. There's a maintenance issue or production is down, and they need to connect their automation OEM to do troubleshooting or firmware upgrade. And so they will download TeamViewer or some other off-the-shelf remote access tool and implement it quickly, without multifactor authentication in place, so it's an open channel out to the Internet." That open channel, created under operational pressure, is the shadow current that wasn't there the day before.

Temporary Access That Never Leaves

Vendor access provisioned for a maintenance window frequently outlasts it. A March 2026 analysis found 42% of manufacturing companies reported a vendor-access breach in 2025, and 46% called remote access their weakest security link.

Break-glass accounts compound the issue. These emergency override credentials bypass MFA by design. Organizations routinely fail to rotate them after maintenance events "due to manual labor, lapses in policy, or other business excuses," according to the Identity Defined Security Alliance. An account with credentials unchanged since the last maintenance window is not an emergency access tool. It's a standing invitation.

Credential shadow currents persist long after maintenance teams have left. And the third-party access provisioned for vendor visits is often the least-governed channel in the environment, making change windows the point where credential risk and third-party risk converge.

How to Treat Every Maintenance Window as a Security Event

Change windows can't be eliminated—operations require them. The question is whether you treat each one as a security event, not just an operational one.

Post-maintenance threat hunting is a starting point: scan workstations for anomalous services, hunt PLCs for persistence indicators and increase detection sensitivity for Modbus, DNP3 and PROFINET anomalies after work concludes.

Just-in-time (JIT) access for vendors addresses the persistence problem directly. Access that expires when the work order closes doesn't become a permanent backdoor. Gartner projects organizations applying least privilege approaches to remote privileged access management will reduce their risk exposure by more than 50% by 2026.

Taking "golden image" backups of PLCs, SCADA servers and engineering workstations before maintenance starts gives you a verified baseline to compare against afterward. This matters especially for legacy systems, which often can't be patched between maintenance cycles and represent the highest-value targets when a window opens.

The Shadow Current That Remains

Change windows create express channels: temporary paths with reduced friction, expanded access and limited visibility. Attackers don't need the full window to achieve their objective. They often just need to deploy a backdoor and wait.

The 42-day dwell time tells you what "later" means. Entry happens during the window. The damage happens when operations are running and your team least expects it. Some shadow current paths opened during maintenance never fully close.

But there's a root cause beneath all of the gaps this series has explored: compliance audits, pen test scope, change window blind spots—they all share the same origin. Your organizational structure creates the very silos that shadow currents exploit: the gaps between IT and OT teams, security and operations, corporate and plant.

Your Next Maintenance Window Is Already on the Attacker's Calendar. Is It on Yours?

⚠️ Entry Happens During the Window. The Damage Comes 42 Days Later.

Maintenance windows don't just pause operations—they pause your defenses. Monitoring goes dark, firewall rules relax, break-glass credentials come out. Attackers don't need to break in. They wait for you to open the door on a schedule they already know.

42
day average ransomware dwell time in OT environments (Dragos 2026)
26
day median dwell time when breach is discovered by an external party (Mandiant)
42%
of manufacturing companies reported a vendor-access breach in 2025
50%+
risk reduction projected from JIT privileged remote access by 2026 (Gartner)

Five Ways Attackers Exploit the Maintenance Window

Click each card to see how the attack path was used

🏭

TRITON/TRISIS — Safety System Sabotage

Saudi petrochemical refinery, 2017

Click to explore

SIS controllers must connect to engineering workstations during maintenance—by design. Attackers used that required connectivity as their attack path, deploying malware to disable the facility's last automated defense against catastrophic accidents. The window wasn't exploited. It was the exploit.

💾

Stuxnet — The Air Gap Wasn't Enough

Natanz nuclear facility — air gap breached by USB

Click to explore

The Natanz facility was air-gapped—completely isolated from the internet. But maintenance contractors still needed to connect. Stuxnet traveled in on USB drives during those visits. The air gap held every day except maintenance days. That was the only window needed.

VOLTZITE — Patient Reconnaissance

U.S. electric and water utilities, 2025

Click to explore

VOLTZITE spent months inside U.S. utilities mapping engineering workstations and process shutdown conditions before acting. Mandiant found breaches discovered by external parties averaged 26-day dwell times. VOLTZITE used that window to learn operational rhythms—including exactly when maintenance would drop the defenses.

🔑

Break-Glass Credentials — Standing Invitations

Emergency access that bypasses MFA—and never gets rotated

Click to explore

Break-glass accounts are designed to bypass MFA for emergencies. Organizations routinely fail to rotate them after maintenance due to "manual labor, lapses in policy, or other business excuses" (IDSA). Credentials unchanged since last maintenance aren't emergency tools—they're permanent backdoors left open after the window closed.

📡

Shadow Access Tools — The Open Channel

TeamViewer deployed under pressure, left running forever

Click to explore

When production is down and an OEM needs in now, teams deploy TeamViewer or similar tools without MFA. Claroty's Grant Geyer described it as "an open channel out to the Internet." That channel wasn't there before the emergency. After maintenance ends, it often still is.

🌫️ The Security Fog: What Happens When a Maintenance Window Opens

Three simultaneous vulnerabilities on a publicly known schedule

Monitoring Goes Dark: Detection tools are powered down or tuned to suppress the flood of legitimate reconfiguration traffic. The very alerts that would catch malicious activity are silenced to prevent false positives during planned changes. ShieldWorkz calls this the "security fog"—malicious actions can be initiated without triggering alarms.

Firewall Rules Relax: Vendors need connectivity to do their work. Rules get temporarily loosened. Remote access channels open. Ports that are normally closed become available. Every accommodation creates a potential entry point that didn't exist the day before.

Safety Systems Come Offline: SIS units require connection to engineering workstations during maintenance. That necessary, temporary connectivity is precisely what TRITON exploited. The access required by the maintenance process is the access attackers target.

Break-Glass Credentials Surface: Emergency access accounts bypass MFA by design. They come out during maintenance, go back in the vault afterward—but their credentials often aren't rotated. IEC 62443 calls for heightened governance throughout the maintenance lifecycle. Most organizations apply less, not more, during these windows.

📅 Why Attackers Know Your Maintenance Schedule

Your calendar is more public than you think

Public Utility Filings: Public utilities are required to publish planned outage windows on customer-facing websites and report maintenance to regulatory bodies. The schedule is visible before the work order is even signed.

LinkedIn Intelligence: Profiles map exactly which engineers and contractors handle which systems. A patient attacker can identify the maintenance crew, their certifications, the vendors they work with and the systems they service—all from open-source data before sending a single packet.

Shodan Passive Reconnaissance: Tools like Shodan passively query more than 100,000 internet-connected industrial devices, gathering device banners, operating systems and facility identifiers without ever touching a target system. Firmware version banners often reveal maintenance cycles.

Inside the Perimeter First: VOLTZITE and similar threat actors don't rely on external intelligence alone. They establish footholds during non-maintenance periods and learn operational rhythms from the inside—including exactly when monitoring will be suppressed and access will be expanded.

🛡️ Treating the Maintenance Window as a Security Event

Post-maintenance hunting, JIT access and golden images—the minimum standard

Post-Maintenance Threat Hunting: After every change window closes, scan workstations for anomalous services, hunt PLCs for persistence indicators and increase detection sensitivity for Modbus, DNP3 and PROFINET anomalies. The window may be closed—the backdoor may not be.

Just-in-Time (JIT) Vendor Access: Access that expires when the work order closes doesn't become a permanent channel. JIT provisioning eliminates the standing invitation problem entirely. Gartner projects organizations applying least privilege approaches to remote privileged access management will reduce risk exposure by more than 50% by 2026.

Golden Image Backups: Take verified backups of PLCs, SCADA servers and engineering workstations before maintenance begins. Compare against that baseline afterward. For legacy systems that can't be patched between cycles, a known-good image is often the only way to detect tampering after a change event.

Break-Glass Rotation Policy: Every break-glass account used during a maintenance window must be rotated before the next window opens—not "when we get to it." The Identity Defined Security Alliance is clear: organizations that fail to rotate are operating with standing credentials, not emergency credentials.

Closing the Maintenance Window Shadow Current

Hunt After Every Window

Post-maintenance threat hunting is the minimum standard. The 42-day OT dwell time means attackers who entered during your last maintenance window are still there. Scan for anomalous services, hunt PLCs for persistence, and increase detection sensitivity for industrial protocol anomalies after every change event.

Time-Box All Vendor Access

Just-in-time access that expires when the work order closes doesn't become a permanent backdoor. 46% of manufacturers call remote access their weakest security link—because access provisioned for a window frequently outlasts it. JIT provisioning is how you close the channel when the work is done.

Baseline Before, Verify After

Golden image backups of PLCs, SCADA servers and engineering workstations give you a verified pre-maintenance baseline to compare against afterward. For legacy systems that can't be patched between cycles, a known-good image is often the only way to detect what changed during the window.

Your Next Maintenance Window Is Already on the Attacker's Calendar. Is It on Yours?

Scroll to Top