.png)
To simulate a determined threat actor aiming to:
Disrupt manufacturing operations
Exfiltrate critical intellectual property
Test employee vigilance and internal detection capabilities
This engagement combined technical intrusion and human manipulation to mirror real-world attacks.
.png)
Red Team Attack Chain
Phase 1 Outcome:
Initial access was established in both IT and OT networks, and a physical security breach occurred without detection.
Phase 2 – Outcome:
The Red Team achieved full access to the organization’s crown jewels, including CAD blueprints and supply-chain data.
Phase 3 – Outcome:
The team demonstrated a clear attack path from a single phishing email all the way to production-level controllers.
.png)
Time to Initial Access: 1 Day
Time to Domain Admin: 4 Days
Detection by SOC: 0 (undetected)
Human Factor Failure: 3 of 7 engineers clicked the phishing link
Physical Security Gap: Unauthorized entry to OT floor
Network Segmentation: Ineffective IT/OT separation enabling lateral movement
These findings underscored how a sophisticated adversary could move from IT to OT with little resistance.
.png)
A global auto-parts manufacturer with 12 production plants across three countries engaged Rex Cyber Solutions to test their resilience against sophisticated cyberattacks.
Their environment included:
High-Value Intellectual Property: CAD designs, proprietary tooling configurations, and supply-chain documentation
Core Systems: SAP for ERP and Rockwell-based PLCs for plant automation
Existing Security: A Security Operations Center (SOC) with endpoint detection and response (EDR), SIEM, and a vulnerability management program
Despite these controls, leadership wanted a realistic “attacker’s perspective” to validate defenses across both IT and operational technology (OT) networks.
.png)
Red Team Attack Chain
Phase 1 – Reconnaissance & Social Engineering
Phase 2 – Lateral Movement & Privilege Escalation
Phase 3 – OT Reconnaissance
.png)
To close the gaps, Rex Cyber Solutions provided a prioritized roadmap: