Hi All
To add to this theme, here is a good article on dissecting the MGM attack and the vendor technologies involved and how they carried out the attack.
https://zpesystems.com/dissecting-the-mgm-cyberattack-lions-tigers-bears-oh-my/
Regards
Caute_Cautim