Any company that is strategic could be targeted for the same kind of actions as this cyberattack.
The threat group then accessed the OT environment 'through a hypervisor that hosted a Supervisory Control And Data Acquisition (SCADA) management instance for the victim's substation environment.'
The cyberattack is a notable example of the evolving targeting of operational technology during wartime.
[
add
]
[
|
|
...
]