Simulating Cyberattacks to Strengthen Defenses for Smart Buildings
None
<p><span data-contrast="auto">Smart buildings contain dozens, sometimes hundreds, of internet-connected devices with weak built-in security controls — a threat actor’s ideal target if there ever was one. Despite information technology (IT) teams’ best efforts to secure endpoints and entry points,<a href="https://securityboulevard.com/2025/10/iot-security-challenges-that-every-organization-should-be-aware-of/" target="_blank" rel="noopener"> internet-of-things (IoT) attacks are growing more frequent</a>. Can simulations strengthen their defenses?</span><span data-ccp-props="{}"> </span></p><h3 aria-level="2"><span data-contrast="auto">The Link Between Penetration Rate and Cyberattacks</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":360,"335559739":120}'> </span></h3><p><span data-contrast="auto">Experts expect the smart building market will steadily grow in the coming years, anticipating an average </span><a href="https://downloads.ctfassets.net/xygxkw97gcce/5TYB0NM3azSB93d4Wy5aIQ/c531c35a1fca272a66c32e0712359883/wp-smart-building-systems-unlocking-value-with-iot-technology.pdf#page=3" target="_blank" rel="noopener"><span data-contrast="none">compound annual growth rate (CAGR) of 17.44%</span></a><span data-contrast="auto"> through 2025. Its penetration rate and overall market value will progressively increase, prompting companies to rush implementation to maximize their return on investment — likely accelerating attack frequency.</span><span data-ccp-props="{}"> </span></p><div class="code-block code-block-13" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-13-1" data-info="WyIxMy0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="U2hvcnQ=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://www.techstrongevents.com/cruisecon-virtual-west-2025/home?ref=in-article-ad-2&utm_source=sb&utm_medium=referral&utm_campaign=in-article-ad-2" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2025/10/Banner-770x330-social-1.png" alt="Cruise Con 2025"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><span data-contrast="auto">Currently, the thorough integration of these technologies into critical building services makes it easier to tamper with security and safety systems, fueling cyberattacks. Disabling smoke alarms or surveillance networks creates panic and urgency, prompting companies to give in to attackers’ demands without attempting recovery.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Even when attackers target non-essential systems, the results can still be destructive or disruptive. For example, disabling motion-activated lighting could force staff to manually flip central circuit breakers whenever they need to turn on lights. Although interconnected tools offer incomparable efficiency and convenience, significant security weaknesses exist</span></p><p><span data-contrast="auto">As building owners incorporate more IoT devices and sensors — and add new integrations to control or monitor them — their vulnerability level increases. The </span><a href="https://www.statista.com/statistics/1322216/worldwide-internet-of-things-attacks/" target="_blank" rel="noopener"><span data-contrast="none">number of IoT attacks reached 10.54 million</span></a><span data-contrast="auto"> in the fourth quarter of 2022, an increase of roughly 4.5 million year-over-year. All indicators suggest this figure will only worsen in the coming years. </span><span data-ccp-props="{}"> </span></p><h3 aria-level="2"><span data-contrast="auto">Common Smart Building Cybersecurity Weaknesses </span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":360,"335559739":120}'> </span></h3><p><span data-contrast="auto">While hackers will exploit any vulnerability and test any entry point if they think it could result in a payout, their most common smart building targets include IoT technology, building automation systems (BASs) and unsecured networks.</span><span data-ccp-props="{}"> </span></p><p aria-level="3"><strong>IoT Devices </strong></p><p><span data-contrast="auto">As most IT professionals know, these devices are exceedingly vulnerable because they lack basic built-in security features despite their constant internet connection. Attackers increasingly seek to brick them, demanding payment in exchange for restoring functionality. In 2022, </span><a href="https://www.bitdefender.com/files/News/CaseStudies/study/429/2023-IoT-Security-Landscape-Report.pdf#page=9"><span data-contrast="none">84% of IoT cybersecurity incidents</span></a><span data-contrast="auto"> involved denial-of-service (DoS) attacks, making them the leading attack type. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Once attackers access an IoT sensor or device, they can move laterally through employees’ workstations to disrupt the standard functioning of programmable logic controllers, infecting connected automation technology. Unless IT professionals leverage network segmentation, firewalls and access controls, their internet-connected ecosystem remains high-risk. </span><span data-ccp-props="{}"> </span></p><p aria-level="3"><strong>Unsecured Networks</strong><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":320,"335559739":80}'> </span></p><p><span data-contrast="auto">Many smart buildings have inadequately secured networks, exposing them to man-in-the-middle and DoS attacks. If companies transmit data this way, attackers can access their IoT controller boxes through an external connection. In other words, they have dozens — potentially hundreds — of internet-facing entry points. Every device they add to their tech stack expands their attack surface, further exposing them to cyberthreats. </span><span data-ccp-props="{}"> </span></p><p aria-level="3"><strong>Building Automation Systems </strong></p><p><span data-contrast="auto">A BAS is a computer networking tool that provides a single interface for operators to monitor and control interconnected technologies. Bad actors frequently target them since they’re fundamental to many digital ecosystems. In 2019, they attacked </span><a href="https://www.sciencedirect.com/science/article/abs/pii/S1367578823000032" target="_blank" rel="noopener"><span data-contrast="none">37.8% of the computers</span></a><span data-contrast="auto"> controlling these systems, intending to destroy them. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Heirloom models operating on legacy versions of communication protocols — such as building automation and control network (BACnet) with CVE-2019-12480, which </span><a href="https://media.txone.com/prod/uploads/2023/01/Hacking-Smart-Buildings-IoT-Attack-Surfaces-and-Defenses-TXOne-WP-2212.pdf#page=7" target="_blank" rel="noopener"><span data-contrast="none">contains a segmentation fault</span></a><span data-contrast="auto"> — have inadequate built-in security measures, making them vulnerable to corruption, tampering and injection. Businesses utilizing them risk DoS attacks in the application layer protocol data units, rendering their systems unable to communicate with other controllers or the supervisory mechanism.</span><span data-ccp-props="{}"> </span></p><h3 aria-level="2"><span data-contrast="auto">The Consequences of a Smart Building Cyberattack</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":360,"335559739":120}'> </span></h3><p><span data-contrast="auto">Despite IT professionals’ best efforts, many smart buildings remain vulnerable to cyberattacks. Even if they heavily fortify one aspect of their digital ecosystem, a single misconfigured integration, flaw in communication protocols or network vulnerability enables lateral movement, allowing attackers to target control systems and cause extensive damage or disruptions. If their incident response plans are insufficient, they risk long-term losses.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">In 2021, a German firm experienced this scenario firsthand after attackers misused a stolen digital security key to lock them out of their BAS. The threat actors </span><a href="https://www.darkreading.com/cyberattacks-data-breaches/lights-out-cyberattacks-shut-down-building-automation-systems" target="_blank" rel="noopener"><span data-contrast="none">bricked 75% of their devices</span></a><span data-contrast="auto">, including lighting, window shutters and motion detectors, forcing them to revert to manual methods or go without until they recovered. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">In addition to damaging companies’ reputations and impacting staff productivity, cyberattacks can trigger unintended device behavior. Bad actors can remotely trigger smoke alarms, disable elevators, override thermostat set points, deactivate surveillance systems or strain components — causing equipment damage, discomfort, energy waste and safety hazards.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">In most cases, organizations suffer substantial financial losses due to unexpected downtime or system damage. Cyberattack-induced information exfiltration, encryption or interception can provoke regulatory action and public backlash, generating further losses. In 2022, a single data breach </span><a href="https://www.sitelogiq.com/blog/cybersecurity-tips-what-to-keep-on-your-radar/" target="_blank" rel="noopener"><span data-contrast="none">cost organizations an average of $4.35 million</span></a><span data-contrast="auto"> — a debilitating sum for many small and medium-sized businesses.</span><span data-ccp-props="{}"> </span></p><h3 aria-level="2"><span data-contrast="auto">Why Should IT Teams Simulate Cyberattacks?</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":360,"335559739":120}'> </span></h3><p><span data-contrast="auto">Simulations are as close as IT teams can get to experiencing real-world cyberattacks without causing lasting damage to their equipment or discomfort to staff. They can passively run these risk-free experiments to expose buildings’ security flaws and weaknesses while actively prioritizing critical alerts, patching vulnerabilities and addressing support tickets.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Outside of being a safe security posture testing method, simulations are also highly effective. They provide a dynamic, comprehensive overview of smart devices and control systems while offering insight into the potential severity and impact of relevant cyberthreats, enabling IT professionals, operators and staff to respond effectively to cybersecurity incidents.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">For example, one study showed that phishing success rates decreased as simulation frequency increased. The average person’s </span><a href="https://www.knowbe4.com/hubfs/Data-Confirms-Value-of-SAT-WP_EN-us.pdf#page=7" target="_blank" rel="noopener"><span data-contrast="none">phish-prone percentage fell to 1.79%</span></a><span data-contrast="auto"> with weekly sessions — a sharp decline from the 30% that untested individuals scored. Moreover, while those who attended quarterly sessions only improved by 35%, weekly attendees had a 96% improvement rate — meaning they were 2.74 times less likely to fall for social engineering attacks.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">IT professionals should conduct simulations when integrating a new tool or identifying an emerging threat. Outside of those scenarios, they should also consider periodically simulating cyberattacks as an essential aspect of their roles. Making it a standard job duty ensures results stay relevant and incident response plans remain appropriate.</span><span data-ccp-props="{}"> </span></p><h3 aria-level="2"><span data-contrast="auto">Ways to Simulate Smart Building Cyberattacks </span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":360,"335559739":120}'> </span></h3><p><span data-contrast="auto">While many simulation technologies exist, IT professionals should primarily consider leveraging artificial intelligence (AI), red teaming, cyber ranges or purple teaming to imitate real-world smart building cyberattacks in risk-free environments. </span><span data-ccp-props="{}"> </span></p><p aria-level="3"><strong>Red Team Exercises </strong></p><p><span data-contrast="auto">Red teaming reflects real-world conditions and leverages experienced white-hat hackers, effectively simulating bad actors’ tactics during a realistic attack on systems, networks or infrastructure. Utilizing third parties like these is beneficial since IT teams often overlook security weaknesses because of their proximity to them. </span><span data-ccp-props="{}"> </span></p><p aria-level="3"><strong>Deep Reinforcement Learning </strong></p><p><span data-contrast="auto">IT professionals can leverage deep reinforcement learning, where they reward an algorithm for exhibiting desired behaviors to rapidly improve its accuracy and efficacy. Whether they use it to craft synthetic data sets or simulate environments, the algorithm evolves with each cyberattack scenario to better respond to changing cyberthreats or building needs.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Notably, selecting the appropriate AI is critical, as its unique strengths and weaknesses affect its usefulness on a case-by-case basis. While research indicates actor-critic algorithms (a combination of value- and policy-based methods) </span><a href="https://www.mdpi.com/2079-9292/13/3/555"><span data-contrast="none">outperform others in accuracy</span></a><span data-contrast="auto"> and efficiency, a deep Q-network model initially learns at an accelerated pace.</span><span data-ccp-props="{}"> </span></p><p aria-level="3"><strong>Cyber Ranges </strong></p><p><span data-contrast="auto">A cyber range includes a range learning management system (RLMS), an orchestration layer, underlying infrastructure, virtualization and target infrastructure. Companies can tailor its characteristics to meet building-specific needs, making it an effective tool for simulating cyberattacks. </span><span data-ccp-props="{}"> </span></p><p aria-level="3"><strong>Purple Team Exercises</strong><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":320,"335559739":80}'> </span></p><p><span data-contrast="auto">While red team exercises alone are adequate, purple teaming enhances logging, accelerates testing and ensures professionals don’t overlook security weaknesses. When red and blue teams share knowledge and feedback, they align their tactics and procedures. This approach is particularly useful for IT professionals who want direct involvement in the simulation. </span><span data-ccp-props="{}"> </span></p><h3 aria-level="2"><span data-contrast="auto">Tips for Conducting Cyberattack Simulations</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":360,"335559739":120}'> </span></h3><p><span data-contrast="auto">Smart building owners and operators who are considering cyberattack simulations should review these considerations to ensure their results are accurate and relevant enough to act on. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="none">1. Inventory All Assets</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":320,"335559739":80}'> </span></p><p><span data-contrast="auto">IT teams must inventory all physical, digital and information assets to determine what their simulation should cover. While a comprehensive session is the most accurate, it’s also the most time-consuming and costly. Categorization enables risk assessments, allowing professionals to prioritize specific systems, networks, data or devices.</span><span data-ccp-props="{}"> </span></p><p><span data-contrast="none">2. Identify Indicators of Compromise</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":320,"335559739":80}'> </span></p><p><span data-contrast="auto">Indicators of compromise can help IT professionals determine which cyberthreats are relevant. While they can technically inform themselves using industry data, building-specific insights are only available through internal identification and analysis. This approach helps them identify which cyberattacks to simulate. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="none">3. Consider Physical Security</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":320,"335559739":80}'> </span></p><p><span data-contrast="auto">Building operators shouldn’t only consider cybersecurity during simulations, as physical threats may pose significant risks. For example, you can consider a scenario where attackers remotely brick an IoT surveillance system and door alarms to allow others — likely a malicious insider — to physically infiltrate a secured area. As unlikely as it may seem, it has a non-zero chance of occurring. </span><span data-ccp-props="{}"> </span></p><p><span data-contrast="none">4. Consider the Human Factor</span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":320,"335559739":80}'> </span></p><p><span data-contrast="auto">IT teams should factor the human element into their simulations to maximize accuracy. Considering research shows human error is </span><a href="https://www.weforum.org/agenda/2020/12/cyber-risk-cyber-security-education/" target="_blank" rel="noopener"><span data-contrast="none">responsible for 95% of cybersecurity incidents</span></a><span data-contrast="auto">, excluding it would likely skew results, making them much less realistic — or even worthless. Currently, AI is an ideal tool for emulating employees’ behavior in simulated environments.</span><span data-ccp-props="{}"> </span></p><h3 aria-level="2"><span data-contrast="auto">Simulations Improve Incident Response and Recovery </span><span data-ccp-props='{"134245418":true,"134245529":true,"335559738":360,"335559739":120}'> </span></h3><p><span data-contrast="auto">IT professionals could spend their entire workweek patching, implementing new security tools and monitoring logs. However, unless they know what threats to look for, what a realistic cyberattack would look like and which assets are the most vulnerable, their efforts might amount to nothing. Simulations strengthen their incident response and recovery by offering unique insights into these factors, safeguarding smart buildings against bad actors.</span><span data-ccp-props="{}"> </span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/11/simulating-cyberattacks-to-strengthen-defenses-for-smart-buildings/" data-a2a-title="Simulating Cyberattacks to Strengthen Defenses for Smart Buildings "><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fsimulating-cyberattacks-to-strengthen-defenses-for-smart-buildings%2F&linkname=Simulating%C2%A0Cyberattacks%C2%A0to%20Strengthen%20Defenses%20for%20Smart%20Buildings%C2%A0" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fsimulating-cyberattacks-to-strengthen-defenses-for-smart-buildings%2F&linkname=Simulating%C2%A0Cyberattacks%C2%A0to%20Strengthen%20Defenses%20for%20Smart%20Buildings%C2%A0" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fsimulating-cyberattacks-to-strengthen-defenses-for-smart-buildings%2F&linkname=Simulating%C2%A0Cyberattacks%C2%A0to%20Strengthen%20Defenses%20for%20Smart%20Buildings%C2%A0" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fsimulating-cyberattacks-to-strengthen-defenses-for-smart-buildings%2F&linkname=Simulating%C2%A0Cyberattacks%C2%A0to%20Strengthen%20Defenses%20for%20Smart%20Buildings%C2%A0" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fsimulating-cyberattacks-to-strengthen-defenses-for-smart-buildings%2F&linkname=Simulating%C2%A0Cyberattacks%C2%A0to%20Strengthen%20Defenses%20for%20Smart%20Buildings%C2%A0" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>