Critical Infrastructure.
The use of legacy systems no longer supported by the manufacturer is the norm in OT.
There is a fear of disturbing equipment that has been operating fine for years, sometimes decades, for a security patch.
Traditional cybersecurity strategies from the IT world cannot be directly applied to OT.
The electricity company used CounterCraft The Platform to detect threat actors using a vulnerable deception host to exploit the CVE-2018-13382 vulnerability and gain control of the substation. REE was able to gain visibility on exactly how the attacker carried out recon during the discovery and exploitation phase—before breach.