generally been russia. an attack that comes to mind is on petro saudi petrochemical facility a couple years ago. where hackers using customize the spoke code that never had been seen before, use that code to do something very serious which was neutralize the safety locks at this petrochemical plant. basically, the very last thing that can stave off an explosion. and it took a long time for and others to tribute that attack back to a gradual research university near moscow that was essentially an arm of the kremlin. and so, when you see this kind of highly customize mel where. you always have to stop and let these investigations take time. but given the situation we are in
give forensic investigators the time they need to attribute these attacks. but when we have seen this level of highly customized malware before, on an industrial control network, critical infrastructure network. it has always generally been russia. an attack that comes to mind is on petro saudi petrochemical facility a couple years ago. where hackers using customize the spoke code that never had been seen before, use that code to do something very serious which was neutralize the safety locks at this petrochemical plant. basically, the very last thing that can stave off an explosion. and it took a long time for and others to tribute that attack back to a gradual research university near moscow that was essentially an arm of the kremlin. and so, when you see this kind of highly customize mel where. you always have to stop and let