Unnamed natural gas compression facility

Victim

An attacker used a spearphishing link to obtain initial access to the organization’s information technology (IT) network before pivoting to its OT network, according to a report from Cybersecurity and Infrastructure Security Agency (CISA).