This malware is well-known for its highly destructive activity. After spear-phishing its way into systems, it’s taken down hard drives, host systems, network equipment, business organizations, worldwide shipping enterprises, ATMS, railways, news media organizations, and electrical grids. It’s also targeted remote server side ICS software and network equipment vulnerabilities.