Products · Indian oil and gas

Sanket

Oil and gas cyber security dashboard
Threat posture 74 Elevated

Signals

Tracked risk signals

Public inputs only. No claims about live PSU systems.

Top priority right now Process control

OEM support path into dual-homed engineering context — broker every OEM session through recorded jump hosts.

Critical

OEM remote-access concentration

Vendor support paths can become a high-leverage bridge into plant context.

Critical

Plant SOC / corporate SOC seam

Watch the handoff gap between OT detection, corporate identity, and escalation.

High

Policy-document lures

Oil-and-gas decoys and cybersecurity-guideline lures hit executive and policy workflows.

High

Retail and consumer fraud surface

Dealer portals, loyalty flows, LPG subsidy messages, and fuel-discount scams convert cyber events into public-trust events quickly.

Critical

Frontier cyber-AI gap

AI-assisted vulnerability discovery shortens defender timelines.

Watch

Refinery-sim telemetry

Public telemetry showed sustained hits against simulated refinery-sector sensors, especially common industrial protocols.

News tracker

Public-source events feeding v0

  1. Anthropic announces Project Glasswing and Claude Mythos Preview. Flag: frontier cyber-AI capability. Use: compress patch and compensating-control timelines. Source
  2. Public reporting says unauthorized users accessed Mythos through a third-party environment. Flag: control-plane risk around powerful defensive/offensive cyber models. Source
  3. Seqrite reports SideCopy lures using HPCL-themed cybersecurity-guideline documents. Flag: policy-document lure. Use: harden mailbox, file-share, and executive-document workflows. Source
  4. Oil India Duliajan ransomware incident becomes the key public Indian oil-and-gas precedent. Flag: ransomware business-continuity stress. Use: rehearse recovery and executive communications. Source
  5. CyberPeace / Autobot refinery-sector simulated sensors record roughly 3.6 lakh attack events. Flag: protocol pressure. Use: model common exposed-service and industrial-protocol attack paths. Source

Key dates and timelines

Oil and gas cyber pathways

Switch between dated pathways. The score is derived from the scenario context and public signal spine, not editable pretend-control variables.

v0.2 Public data only
Active timeline

Baseline watch

Known Indian oil-and-gas incidents, public lures, AI capability shifts, and refinery-sim telemetry create the standing watch picture.

  1. Oil India ransomware becomes the core Indian sector precedent.
  2. HPCL-themed cybersecurity-guideline lures show policy-document targeting.
  3. Frontier cyber-AI capability shortens patch and compensating-control timelines.
Danger index 74 Elevated

Process-control and pipeline-SCADA seams are the first places to look.

Likely pathway
  1. Targeted phishing or credential reuse lands in the corporate estate.
  2. VPN/session abuse reaches vendor or engineering support access.
  3. Dual-homed workstation or OEM laptop bridges into plant context.
  4. Detection gap appears between plant SOC and corporate SOC.

Action queue

What moves first

  1. Issue OEM remote-access governance order.Jump-host brokering, session recording, time-bound credentials, and access inventory across CII-designated assets.
  2. Convene MD-level classified threat brief.Move the threat picture from CISO desk to CMD agenda before budgets are frozen.
  3. Run cross-PSU adversary-emulation tabletop.One refinery-and-pipeline scenario, all CMDs present, debrief chaired at ministry level.

Enterprise posture scan

Run the browser posture scan

Click once. 25 checks. No data leaves the device. Results include a plain-English verdict and role briefs for CMD, CISO, and IT admin.

Readiness score -- Not run

Run the check to produce a local browser-side posture report.

Run the check to see the plain-English verdict.

Network edge Not checked

Run the check to see what the public edge can infer from this connection.

History No baseline

This browser will compare the next run with recent local results.

Priority action Waiting

The first action will be generated from the scan, not fixed copy.

Role brief Not ready

Run once, then switch between owner, CMD, CISO, and IT-admin views.

Now Waiting

Run the check to generate the first concrete step.

Today Waiting

The next step will be based on this browser, public edge, and findings.

This week Waiting

Sanket will point to the next browser-only layer before any native collector path.

Plain-English output

Issues and simple fixes

  • No report yet. Run the check to see simple owner-level guidance.

CMD brief

Decision view

  • No CMD brief yet. Run the check to generate the decision view.

CISO brief

Control view

  • No CISO brief yet. Run the check to generate the control view.

IT admin

Work queue

  • No work queue yet. Run the check to generate admin tasks.

IT handoff

Technical fixes and evidence

  • No IT report yet. Run the check to build the handoff.
Run the check to generate a browser-side JSON log.

Permission prompts can test this browser and this site. They still cannot inspect routers, EDR, internal DNS, VPN split tunneling, open ports, or OT assets. That requires a signed local collector with written authorization.

Live

Browser + edge

Run the browser check, capture the public edge, save local history, and export role briefs.

Next

Managed-browser policy

Turn scan findings into Chrome/Edge policy guidance for permissions, WebRTC, device APIs, and privacy controls.

Next

Evidence upload

Let IT paste or upload approved exports from EDR, DNS, MDM, firewall, or vulnerability tools for Sanket to normalize.

Later

Browser extension

Add optional deeper browser/tab/header checks through a Chrome or Edge extension, without a full native endpoint collector.

Source spine

Public inputs behind v0