A nation-state threat actor (probably Russian) targets industrial systems. A quick look at the GRU's earlier attempt against Ukraine's power grid. The difficulty of recovering from a credible threat to industrial systems. Lazarus Group resumes Operation Dream Job. OldGremlin speaks Russian, and it holds Russian companies for ransom. Carole Theriault looks at research on lie detection. Josh Ray from Accenture drops some SBOMs. And another look at the privateers in the Conti gang.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/72\n\nSelected reading.\nUkraine Update: U.S., EU to Send More Arms; Warship Damaged (Bloomberg)\xa0\nINCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems (Mandiant).\nPIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | Dragos (Dragos)\xa0\nAPT Cyber Tools Targeting ICS/SCADA Devices (CISA)\xa0\nU.S. warns newly discovered malware could sabotage energy plants (Washington Post)\xa0\nIndustroyer2 Targets Ukraine\u2019s Electric Grid: Here\u2019s How Companies Can Stay Protected and Resilient (Nozomi Networks)\nWind Turbine Giant Nordex Hit By Cyber-Attack (Infosecurity Magazine)\nLazarus Targets Chemical Sector (Symantec)\nOld Gremlins, new methods (Group-IB)\nLeaked documents show notorious ransomware group has an HR department, performance reviews and an 'employee of the month' (CNBC)\nLearn more about your ad choices. Visit megaphone.fm/adchoices