Energy
|Mid-market (~200 employees)
A European energy company had no idea that 40% of their internet-facing assets were invisible to their IT team. Here's what Discovero found — and what could have happened.
Book Your AssessmentThe Challenge
A mid-market European energy company engaged Discovero for a routine external attack surface assessment. Their IT team believed they had full visibility over their public infrastructure — approximately 10 internet-facing services across two domains.
They were wrong.
What Discovero Found
16
Subdomains discovered
41
Live services identified
9
caseStudies.energy.metrics.
45
caseStudies.energy.metrics.
4
caseStudies.energy.metrics.
12
caseStudies.energy.metrics.
18
caseStudies.energy.metrics.
11
caseStudies.energy.metrics.
An internet-facing server was running an outdated version of OpenSSH (7.4p1) vulnerable to CVE-2024-6387 (regreSSHion). This race condition vulnerability allows unauthenticated remote code execution as root. The server was a forgotten staging environment from 2019, still connected to the internal network.
A Kubernetes Dashboard was exposed on port 443 without authentication. Service Account tokens were extractable, granting full cluster access. Through mounted IAM roles, this provided access to cloud infrastructure including databases and storage. The dashboard had been deployed with --enable-skip-login during initial setup and never locked down.
The main customer portal contained a Stored XSS vulnerability via the file upload mechanism, and the REST API had an IDOR vulnerability exposing user records. Both issues were in the production application serving external customers.
None of the 16 discovered subdomains implemented Content-Security-Policy or Strict-Transport-Security. Average security header score: 7%. Multiple servers exposed version information via X-Powered-By headers.
The Impact
| Scenario | Estimated Impact |
|---|---|
| Ransomware attack (most likely) | EUR 160,000 – 600,000 |
| Data breach + GDPR fines | EUR 500,000 – 2,000,000 |
| Cloud infrastructure compromise | EUR 200,000 – 800,000 |
| Discovero assessment | EUR 4,900 |
Remediation was 20x cheaper than the most conservative incident estimate.
The Outcome
Key Takeaway
You can't protect what you can't see. This energy company had 4x more internet-facing services than they knew about — and a CVSS 10.0 vulnerability on one of them.
No agents. No credentials. Just your domain. First results in 48 hours.