Novosti

When Default Passwords Become a Weapon Against Critical Infrastructure

Mala Eng

Velika Eng

 

At the end of December 2025, coordinated cyberattacks targeted Poland’s energy sector. Wind turbines, solar power plants, and combined heat and power facilities were among the attackers’ targets.

 

This was not an example of an advanced cyberattack – the issue was basic security hygiene. Attackers simply logged into devices using default administrator credentials. This incident demonstrates how even basic security oversights can have significant consequences.

 

Today, networks contain up to 10 times more xIoT devices than traditional computers: IP cameras, UPS systems, access controls, medical equipment, HVAC systems, industrial controllers…

 

The problem? For many organizations, it is often challenging to know exactly how many of these devices are in their infrastructure. Any unmanaged device can become an entry point for a cyberattack.

 

In large xIoT environments, it is still common for devices to operate with:
• default passwords
• weak or reused credentials
• outdated firmware and open services

 

Traditional IT tools are not sufficient to address these challenges – a solution that covers all xIoT devices on the network is essential.

 

Our recommendation is Phosphorus, a platform that enables organizations to:
✔ discover every xIoT device on the network
✔ identify default and weak passwords
✔ automate credential rotation and configuration hardening
✔ manage firmware and security hygiene at scale

 

Phosphorus Security is a unified platform for extended Internet of Things (xIoT) security, designed to protect devices that are often “blind spots” for traditional IT.

The platform bridges the IT and OT worlds, enabling organizations to:
• discover all xIoT devices on the network
• eliminate security vulnerabilities
• manage devices through a single unified platform

Phosphorus is the ideal solution for data centers, financial institutions, and critical infrastructure that must comply with regulations such as NIS2 and ISO 27001.

 

Infrastructure security today can no longer be fragmented – it must be integrated, visible, and automated. In a world where every unmanaged device can be an entry point for an attack, integrated and automated security is no longer a luxury – it is a necessity.