Sandworm Hackers Pivot From Compromised IT Systems Toward Critical OT Assets