A China-nexus threat group held a foothold inside U.S. critical infrastructure for more than five years before anyone detected it.[1] A separate campaign targeting aerospace and defense specifically averaged 393 days of undetected presence.[2] In both cases, the adversary did not force entry. They arrived inside a file, through a supplier, or across a network boundary that was enforced but never inspected.
The defense industrial base is not short of perimeter security. It has a gap between where defenders draw the boundary and where adversaries are actually crossing it. That gap lives in the content — the files, devices, and data transfers that move through defense networks every day, largely assumed to be safe.
Closing it requires verified controls at the specific points where trusted content crosses from one domain to another: the removable media ingestion point, the classification boundary, the OT-IT interface, and the software package entering a mission-critical environment.
Threats Targeting Defense in 2026
More than 80% of aerospace and defense organizations experienced a breach in the past twelve months.[3] The sector absorbs roughly 1,250 cyber incidents every week, [4] with a 300% increase in attacks since 2018 and 61% of organizations hit by ransomware in the past year.[5] The average breach costs $5.46 million before accounting for classified program disruption, counterintelligence exposure, or the contract risk that follows a supplier compromise.[6]
Google’s Threat Intelligence Group confirmed in February 2026 that China-nexus espionage groups have targeted defense and aerospace more than any other state actor over the past two years,[7] exploiting edge devices, VPN appliances, and file transfer pathways to establish long-dwell access. Russia, Iran, and North Korea operate across the same industrial base. Hacktivist DDoS campaigns generate over 76% of incident volume in the sector (double the cross-industry average[8]) but volume is not the measure that matters. The strategic threat is precise and patient. It does not knock. It enters through content that is already trusted.
LOTL (Living Off the Land) techniques, which use legitimate system tools already present on the network, allow adversaries to operate without triggering detection. By the time behavioral analysis fires, a sophisticated actor has often been resident long enough to map the environment, identify high-value targets, and stage for exfiltration. Detection is necessary. It is not sufficient. The leverage is at the entry point, not inside the network.
Zero Trust Access is Necessary. It is Not Sufficient.
Zero Trust has become the governing security model across defense and government networks, and for good reason. Continuous authentication, least-privilege access, device posture enforcement, micro-segmentation — these controls are necessary and they belong in every defense architecture. The issue is not with Zero Trust. The issue is with treating it as a complete answer to a problem it was never designed to solve. Zero Trust Access was built to control who gets onto a network. It was not built to verify what is carried across a boundary once they are on it.
The limitation is specific. Zero Trust verifies who is crossing the boundary. Content verification determines what is permitted to cross. A Zero Trust policy correctly validates that a credentialed user on an authorized device is requesting a legitimate transfer. It has no visibility into whether the file being transferred contains a weaponized macro, a concatenated malicious payload, or a zero-day embedded in a trusted document format.
The adversary campaigns that open this blog (BRICKSTORM’s 393-day dwell in A&D environments, Volt Typhoon’s five-year foothold in U.S. critical infrastructure) did not defeat access controls. They entered through content that the access controls had no reason to question.
Identity and access management is the necessary first layer. Content verification at the physical entry point, the classification boundary, and the software supply chain, is the layer that determines what is actually permitted to reach the destination. Together, they are complete. Independently, each leaves the other’s gap unaddressed.
Four Specific Attack Surfaces and Why Perimeter Controls Miss Them
Removable Media and Air-Gap Ingestion Points
51% of all malware detected in 2024 was specifically engineered to exploit USB devices, which represents a six-fold increase since 2019. [9] 82% of that malware is capable of causing loss of view or loss of control in OT environments. [10] Air gaps eliminate the network channel. They do not eliminate the physical channel.
For SCIFs, air-gapped weapons systems, and OT environments on isolated industrial networks, every device that enters the facility is a potential ingestion point. In 2024, a China-nexus threat actor used a single infected USB drive to penetrate a Western European defense manufacturer’s OT environment. One in four industrial security incidents that year involved a USB plug-and-play event. A single unscanned drive bypasses every network-layer control deployed because the network-layer controls never see it.
Software Supply Chain
Supply chain incidents now account for 30% of all cyber breaches, up from 15% the prior year.[11] At least 70% of the defense industrial base consists of small businesses with limited security resources facing the same state-sponsored threat actors targeting the largest primes. [12] Primes are well-defended. Adversaries go through tier-2 and tier-3 suppliers instead.
The attack surface extends into firmware updates delivered by maintenance contractors, open-source dependencies in weapons system software, and development toolchains used by DIB suppliers. Without component-level visibility into what is running in a defense environment, vulnerability response is reactive and supply chain risk management is aspirational. A malicious package can reach mission-critical systems before any signature exists for it.
Cross-Domain Data Transfers and OT-IT Boundaries
Files moving between SECRET and UNCLASSIFIED, coalition networks, OT and IT, ship-to-shore, airborne telemetry and ground systems, and centralized cyber defense monitoring across distributed environments [13] are potential entry or exfiltration points. The data types have expanded. The platforms hosting high-side and low-side environments have moved toward cloud architectures. The mission requirement for data exchange has grown.
Standard data diodes solve half the problem. Hardware-level one-way enforcement physically eliminates the reverse channel, and no software vulnerability can open a backchannel through a properly implemented diode. But a diode does not inspect the content of what crosses. A malicious payload in a trusted file travels through a diode as cleanly as legitimate data. The 2025 attack on Poland’s energy infrastructure illustrated exactly this failure mode: directional enforcement without content inspection leaves the payload free to execute once it reaches the destination network.
Defense-grade cross-domain architecture requires both controls simultaneously: directional enforcement and content verification at the same boundary. Enforcement without inspection passes malicious content. Inspection without enforcement leaves the reverse channel open. Neither half-measure is sufficient.
File-Based Evasion: the AI-Accelerated Gap
The most operationally significant change in the file-based threat landscape in 2025–2026 is the application of AI to malware generation and structural evasion. Google’s threat intelligence team has identified malware families that mutate in real time during the attack phase, [14] with exploit development costs collapsing from weeks of effort to near zero. [15]
OPSWAT’s own research documented a concrete example: the concatenated PDF technique, in which a malicious PDF is structurally appended to a clean one. Tested across 34 scanning engines, detection dropped from 34 to 5 when the files were concatenated. [16] Three engines that previously flagged the threat stopped flagging it. The user’s PDF reader rendered the phishing content exactly as the attacker intended. The security infrastructure evaluated a different document than the one the user opened.
There is no malware signature to find. No exploit to detect. Only a structural arrangement of a legitimate file format that causes scanners and readers to see different content. At a classification boundary, a single file using this technique can cross from UNCLASSIFIED to SECRET without triggering an alert. That gap is not theoretical.
CDR (Content Disarm and Reconstruction) addresses this at the mechanism level. CDR does not attempt to identify malicious content; rather, it deconstructs every file to its component elements, removes all active and executable content regardless of file structure, and rebuilds a clean, functionally intact version.
An AI-generated variant with no known signature, a structurally concatenated malicious document, a macro-embedded Office file, a weaponized archive: all are neutralized by the same process, because CDR removes the execution mechanism before the file reaches the destination.
CDR is a file-boundary control. It does not address LOTL activity inside a network, nor adversary presence already resident in the environment.
The MetaDefender® Platform
The MetaDefender Platform is powered by MetaDefender Core™ and its suite of prevention and detection-based technologies, deployed at the specific boundaries in a defense environment where content crosses trust domains.
Multi-Layered Defenses for Maximum Coverage
MetaDefender Core runs 30+ anti-malware engines simultaneously through Metascan™ Multiscanning, achieving up to 99.2% malware detection. [19] Deep CDR™ Technology covers 200+ file types — Office documents, PDFs, archives, images, CAD files — deconstructing and regenerating each file to eliminate potentially malicious or out-of-policy content. In independent SE Labs and SecureIQ Lab evaluations in 2024, Deep CDR™ Technology achieved 100% efficacy.[20]
In March 2026, MetaDefender Core achieved Common Criteria EAL4+ certification[21] — independent, accredited-laboratory verification of the full processing pipeline: file ingestion, format detection, content analysis, reconstruction logic, output validation, and the API layer through which systems interact with the platform. EAL4+ on a software platform is materially different from EAL4+ on a hardware appliance.
For an appliance, the evaluation is bounded by physical components and firmware. For MetaDefender Core, the evaluation covered the complete multi-engine software processing pipeline that organizations integrate into their own products, workflows, and infrastructure. For C3PAO assessors and program security officers evaluating vendor claims, that is lab-verified evidence.
MetaDefender Core also provides SBOM generation and component-level vulnerability assessment, giving program managers full visibility into every open-source and third-party dependency in their software stack addressing CMMC RA.5 and EO 14028 software supply chain requirements directly.
MetaDefender Kiosk™: the Physical Entry Point
MetaDefender Kiosk places MetaDefender Core technologies at the physical boundary that network-layer defenses cannot reach. Every USB drive, CD, and removable device is scanned. Metascan and Deep CDR™ Technology run against every file before the device touches any system. No firewall or endpoint agent can enforce this control. The kiosk is the only architecture that addresses a physical attack vector with a physical checkpoint.
OPSWAT secures 98% of U.S. nuclear facilities, which must operate under the most demanding removable media security requirements in existence. The Dounreay nuclear decommissioning site, for example, deployed MetaDefender Kiosk, MetaDefender Core, and MetaDefender Drive™ to replace a single-engine legacy system that could not reliably detect modern threats and required days of manual processing per device. The same architecture that protects nuclear programs maps directly to SCIF and air-gapped weapons system requirements in the defense industrial base.
MetaDefender Optical Diode™: the Verified Classification Boundary
MetaDefender Optical Diode provides hardware-enforced one-way data transfer between networks of different classification levels — a non-routable protocol break that physically eliminates any reverse channel.[22] The hardware enforcement eliminates the reverse channel, which means no software vulnerability can open a backchannel through a properly implemented diode. MetaDefender Core inspects content with Metascan™ and Deep CDR™ Technology technologies, integrated with the diode via MetaDefender Diode X (formerly Transfer Guard) or MetaDefender Managed File Transfer™ to form a complete cross-domain architecture. The diode guarantees direction. MetaDefender Core determines what content is permitted to cross.
A standard data diode enforces the channel. Combined with MetaDefender Core, the architecture verifies what crosses it. Across defense environments, this combination supports the use cases listed on OPSWAT’s cross-domain solutions page: secure replication of OT historian data (SCADA, DCS, AVEVA Pi) to IT monitoring environments; one-way transfer of alerts, syslog, and telemetry to centralized cyber defense monitoring; hardware-enforced network segmentation for power plants, naval systems, and air-gapped classified environments; and controlled file transfer across classification boundaries where a non-routable protocol break is required.
MetaDefender Optical Diode and MetaDefender Diode X (listed in the NATO NIAPC under its former name, MetaDefender Transfer Guard) are both approved for use in mission-critical environments across NATO member countries. MetaDefender Optical Diode holds EAL4+ certification, validated specifically for securing data transfers between networks of different security classifications to meet the independent laboratory standard required by NSTISSP #11 for National Security System IA products.
MetaDefender Managed File Transfer: the Orchestration Layer
Cross-domain solution requirements have evolved.[23] The communities of interest requiring data exchange are more diverse. The data types have expanded from standard productivity files to system workloads, intelligence feeds, and cloud-native formats. Designing a CDS with longevity requires a modular, orchestrated approach, not a static appliance.
MetaDefender Managed File Transfer (MFT) is a cross-domain solution for secure file ingestion and transfer across classified and unclassified networks. It coordinates Metascan™, Deep CDR™ Technology, file-type verification, Proactive DLP™, and vulnerability assessment in a controlled zero-trust workflow — with multi-stage supervisor approval, detailed audit trails supporting accreditation, and deployment flexibility across on-premises, air-gapped, and hybrid cloud environments.
For organizations importing software bundles, mission data, or intelligence feeds into classified environments, MetaDefender Managed File Transfer is the orchestration layer that makes the MetaDefender Core engine a complete, policy-enforced cross-domain solution.
Where Compliance Fits, and Where It Stops
CMMC 2.0 became enforceable in DoD contracts on November 10, 2025. For the first time, defense contractor cybersecurity is verified rather than self-attested. The FY 2026 NDAA Section 866 requires DoD to standardize DIB cybersecurity requirements by June 1, 2026 with fewer contract-specific rules, but stricter and more consistent enforcement.
Both developments matter. Neither closes the gaps described above. CMMC Level 2’s 110 controls were designed to raise the baseline across a broad industrial base rather than mandate the specific controls that address these attack surfaces. The controls do not require physical media inspection at facility entry points, file content verification at cross-domain boundaries, software component visibility at the dependency level, or content inspection inline with hardware-enforced network separation.
A contractor can pass a Level 2 assessment, including C3PAO verification, with every one of those gaps completely unaddressed. Only 21% of defense businesses had selected CMMC-compliant technology as of 2025.[17] As of December 2025, just 92 C3PAOs had been authorized against an industrial base of more than 80,000 contractors.[18] The compliance infrastructure has not caught up.
There is a second distinction that matters at the accreditation table. CMMC governs the contractor’s security practices. It does not certify the tools used to implement those practices. Common Criteria certification (mandated by NSTISSP #11 for IA products on National Security Systems) verifies the security properties of a specific product through evaluation by an accredited independent laboratory. A CC-certified product used to satisfy a CMMC control gives a C3PAO assessor lab-verified evidence.
CMMC and Common Criteria are complementary frameworks. One governs what the organization does, the other verifies that the tool does what it claims. Knowing which is which matters.
CMMC Level 2 Control Coverage
| Control | Requirement | MetaDefender capability | Produs |
|---|---|---|---|
| MP.6 | Media sanitization | Multiscanning + Deep CDR™ Technology on every removable device at physical entry | MetaDefender Kiosk |
| MP.7 | Removable media restriction | Physical scanning checkpoint – blocks unscanned devices from any network | MetaDefender Kiosk |
| SI.3 | Malware protection | 30+ AV engines + Deep CDR™ Technology inline at every file ingestion boundary | MetaDefender Core |
| RA.5 | Vulnerability scanning | SBOM generation + component-level vulnerability assessment across all dependencies | MetaDefender Core |
| SC.3 / SC.7 | Boundary protection | Hardware-enforced one-way transfer + inline CDR at classification boundary | Optical Diode + MFT |
MetaDefender addresses approximately 20 of the 110 CMMC Level 2 controls — the subset most security stacks were not designed for. Access control, audit logging, incident response, and personnel security are outside scope. The value is precision: the hard controls at boundaries your existing stack cannot reach, verified to an independent laboratory standard.
The Boundary is Where the Outcome is Determined
The organizations best positioned over the next three years are not the ones with the largest security budgets or the most CMMC controls checked. They are the ones that have mapped their actual attack surface — the physical entry points, the classification boundaries, the OT-IT interfaces, the software supply chain — and deployed verified controls at each one.
Detection inside the network will always lag a sophisticated adversary who has already established residency. Prevention at the boundary before a file executes, before a device connects, and before a payload crosses a classification line, is where the leverage is. That is where OPSWAT operates.
Request a briefing to discuss your specific environment and architecture.
Still mapping your CDS architecture? Download the Cross-Domain Solutions Buyer’s Guide for Government & Defense built by CDS experts for program managers, security architects, and procurement teams evaluating modern cross-domain requirements.
Surse
- [1] CISA, FBI, and NSA, Joint Advisory: Volt Typhoon (2024). https://www.cisa.gov/news-events/cybersecurity-advisories
- [2] GTIG, “Threats to the Defense Industrial Base,” February 10, 2026. BRICKSTORM (UNC5221): 393-day average dwell time. Ibid.
- [3] PreVeil, “Cybersecurity Statistics 2026.” https://www.preveil.com/blog/cybersecurity-statistics/
- [4] PreVeil, “Cybersecurity Statistics 2026.” Ibid.
- [5] PreVeil, “Cybersecurity Statistics 2026.” Ibid.
- [6] PreVeil, “Cybersecurity Statistics 2026.” Ibid.
- [7] Google Threat Intelligence Group (GTIG), “Threats to the Defense Industrial Base,” February 10, 2026. https://cloud.google.com/blog/topics/threat-intelligence/threats-to-defense-industrial-base
- [8] CybelAngel, “Aerospace & Defense Cyber Threat Landscape 2024–2025.” https://cybelangel.com/blog/aerospace-defense-2024-2025-cyber-threat-landscape-threat-note/
- [9] Honeywell, “2024 USB Threat Report.” https://www.honeywell.com/us/en/news/2024/04/cybersecurity-in-2024-usb-devices-continue-to-pose-major-threat
- [10] Honeywell, “2024 USB Threat Report.” Ibid
- [11] Verizon, Data Breach Investigations Report 2025; Honeywell, 2025 Cyber Threat Report. https://www.helpnetsecurity.com/2025/06/06/honeywell-2025-cyber-threat-report/
- [12] PreVeil, “Cybersecurity Statistics 2026.” Ibid.
- [13] OPSWAT, “Applications of Data Diodes in National Defense Environments,” March 23, 2026. https://www.opswat.com/blog/applications-of-data-diodes-in-national-defense-environments
- [14] Google, “AI-Based Malware Makes Attacks Stealthier and More Adaptive,” Cybersecurity Dive, November 5, 2025. https://www.cybersecuritydive.com/news/ai-powered-malware-google/804760/
- [15] SecurityWeek, “Cyber Insights 2026: Malware and Cyberattacks in the Age of AI,” February 2, 2026. https://www.securityweek.com/cyber-insights-2026-malware-and-cyberattacks-in-the-age-of-ai/
- [16] OPSWAT, “Concatenated PDFs: A Simple Trick That Confuses Anti-Malware Engines and AI Systems,” April 1, 2026. https://www.opswat.com/blog/concatenated-pdfs-a-simple-trick-that-confuses-anti-malware-engines-and-ai-systems
- [17] PreVeil, “Cybersecurity Statistics 2026.” Ibid.
- [18] GAO / Industrial Cyber, “GAO Report Highlights Risks to CMMC Rollout,” March 2026. https://industrialcyber.co/reports/gao-report-highlights-risks-to-cmmc-rollout-as-nation-state-attacks-target-defense-contractors/
- [19] OPSWAT, MetaDefender Core documentation. https://docs.opswat.com/mdcore
- [20] OPSWAT, “OPSWAT Earns Common Criteria EAL4+ Certification for MetaDefender Core™,” March 30, 2026. https://www.opswat.com/blog/opswat-earns-common-criteria-eal4-certification-for-metadefender-core
- [21] OPSWAT, MetaDefender Core EAL4+ certification announcement, March 30, 2026. Ibid.
- [22] OPSWAT, MetaDefender Optical Diode. https://www.opswat.com/products/metadefender/optical-diode
- [23] OPSWAT, “Cross Domain Solutions: More Than Just a One-Way Flow.” https://www.opswat.com/blog/cross-domain-solutions;
