The timing of the Schneider attack is particuarly nasty given how embedded their systems are in critical infrastructure globally. Once attackers have engineering schematics and supplier chains from a company like this, they're not just looking at one breach, they're mapping an entire ecosystem of secondary targets. Organizations running their automation platforms need to be auditing third party access and segmenting OT networks yesterday.
The timing of the Schneider attack is particuarly nasty given how embedded their systems are in critical infrastructure globally. Once attackers have engineering schematics and supplier chains from a company like this, they're not just looking at one breach, they're mapping an entire ecosystem of secondary targets. Organizations running their automation platforms need to be auditing third party access and segmenting OT networks yesterday.