A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
A Silent Saboteur at the Grid’s Edge: Decoding Supraharmonics Breadcrumb Home Insights Blog A Silent Saboteur at the Grid’s Edge: Decoding supraharmonics February 21, 2026 DERs like solar panels, bulk energy storage, and electric vehicle chargers could be weaponized to cause irreparable damage to the power grid. The physics of – and fixes for – a dangerous new security threat. The rapid decarbonization and digitization of the grid is leading to fundamental shifts in their design and operation, yet most cybersecurity efforts continue to prioritize data breaches and digital “denial of service” attacks. This focus may be missing a more catastrophic cyber-physical vulnerability: the ability of an adversary to weaponize the growing number of digital power electronics at the edge of our electrical grids. By hijacking smart inverters on solar panels or electric car chargers, attacks can transform a neighborhood’s green infrastructure into a synchronized electrical weapon, turning the grid’s digital assets against power systems and triggering outages, damage and instability that could take years to fix. Chirp and Destroy The attack surface weaponizes the invertors’ ability to generate, synchronize and focus destructive harmonic energy in the 15-28 kHz range. By exploiting the physics of supraharmonics, adversaries can bypass standard protection relays – which are effectively blind to these frequencies – and induce rapid dielectric breakdown in critical distribution assets. An attack like this does not rely on pre-existing knowledge of grid topology. Instead, it uses the invertors as a distributed array of sensors to perform grid tomography via active probing (chirp and detect). Hardware Exploitation: Melting the Grid From Within In a White Paper delivered this month at the S4 Conference, Optiv finds that the primary failure mechanism for targeted assets in a supraharmonics attack at scale – such as distribution transformers and capacitor banks – is not thermal overload but catastrophic insulation failure driven by high-voltage stress and partial discharge. Making matters worse, replacing affected equipment isn’t easy: transformer lead times exceed 100 weeks. This factors into a recovery timeline measured in years, potentially challenging the nation’s energy security and economic stability. Strategic Call to Action: Mitigating the Risks of Homogeneity The range of vulnerabilities posed both by an attack at scale are not just technical in nature, but symptoms of what’s possible if a growing software-defined monoculture continues. To counter the existential risk of Coordinated Supraharmonic Injection (CSHI) and adversarial grid shaping, a range of stakeholders – from regulators and professional associations to manufacturers and grid operators – must pivot from observation to active defense. For utilities and grid operators in particular, the distribution edge can no longer be treated as a black box. Utilities should deploy high-frequency sensing capabilities to monitor the supraharmonic spectrum in real time. By treating the invertor fleet as a senor array, rather than just a load, operators can detect the chirp of reconnaissance probing before the pulse of the attack, turning the adversary’s own tools into an early warning system. Building Better, More Holistic Cyber-Physical Defenses As digitization of the grid advances, utilities will benefit by improved and consistent collaboration between OT Cybersecurity, grid engineering and physical security resources to assess IT/OT vulnerabilities, integrate security, and to define new defenses. For a deeper dive into the physics of supraharmonics, the threats and potential responses, check out the White Paper and Optiv’s own Grid Security Program Assessment services. By: Jason Shea Shea is Principal Advisor Grid/OT Security at Optiv. A former utility senior leader with more than 30 years of experience in the field, Shea has led incident response, engineering and architecture teams and has collaborated extensively with CISA, DOE, FBI, National Labs and multiple utilities in the U.S. and abroad. By: Brian Foster Foster is an OT security strategist and former controls engineer specializing in the Energy Utility vertical. He leads cybersecurity initiatives for Grid Modernization projects, overseeing the protection of both legacy and next-generation control systems. Dedicated to critical infrastructure resilience, Brian focuses on threat mitigation and advancing the security posture of vital utility operations within today’s evolving landscape. Share: Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.