Offensive security in refineries, terminals, platforms and pipelines — including OT/ICS, SCADA and downstream logistics.
Why now
Every hour of refinery downtime costs millions. An attack on process control can trigger shutdown, environmental spills or explosions — billion-dollar liability and media exposure that destroys corporate reputation.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Audit of distributed control system and safety instrumented system (SIL).
Fiscal metering, billing and movement systems.
Satellite/microwave communication, OT/IT segregation on platform.
Remote pumping monitoring and control systems.
Phishing against operations, contractors and service providers.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
Experience in continuous-process, high-criticality environments.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes, on-site when approved. We test satellite communication, OT segregation and control systems.
Yes. We never touch production without a mirror environment. For SIS, we validate via configuration analysis and simulation.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.