Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

Posted on December 16, 2025December 16, 2025 By CWS

Russian state-sponsored risk actors look like favoring misconfigurations over the exploitation of vulnerabilities for getting access to the techniques of focused crucial infrastructure organizations, in keeping with Amazon’s risk intelligence staff.

The malicious exercise has been linked to the broadly identified Russian risk actor named Sandworm, which has led Amazon’s consultants to conclude that the assaults are probably carried out by hackers related to Russia’s GRU navy intelligence company. 

Amazon has additionally seen some infrastructure overlaps with hackers tracked by Bitdefender as Curly COMrades, who could have been answerable for post-exploitation actions. 

Over the previous 5 years, Amazon has seen assaults geared toward vitality organizations in Western nations, crucial infrastructure in North America and Europe, and numerous kinds of organizations with cloud-hosted community infrastructure. 

The tech big has monitored the risk actors’ assaults between 2021 and 2025, and up till this yr they usually achieved preliminary entry by way of the exploitation of zero-day and n-day vulnerabilities.

Examples of vulnerabilities exploited between 2021 and 2024 embrace the WatchGuard flaw CVE-2022-26318, Confluence flaws CVE-2021-26084 and CVE-2023-22518, and the Veeam product flaw CVE-2023-27532.  

The attackers have been beforehand noticed concentrating on misconfigured units for preliminary entry. Nonetheless, beginning in 2025, Amazon’s risk intelligence staff has seen a decline within the exploitation of vulnerabilities and an elevated give attention to the concentrating on of misconfigured community edge units.

“This tactical adaptation permits the identical operational outcomes, credential harvesting, and lateral motion into sufferer organizations’ on-line providers and infrastructure, whereas lowering the actor’s publicity and useful resource expenditure,” Amazon stated.Commercial. Scroll to proceed studying.

The Russian hackers have been noticed concentrating on enterprise routers, VPN concentrators and distant entry gateways, collaboration platforms, community administration home equipment, and mission administration techniques. 

Amazon was capable of monitor assaults as a result of the focused community edge units have been hosted on AWS — clients’ failure to securely configure the units made them low-hanging fruit that could possibly be simply hacked and abused for preliminary entry.

The attackers have been additionally seen leveraging native packet-capture capabilities to intercept site visitors from which they might acquire credentials. The credentials then allowed the risk actors to conduct replay assaults towards the sufferer’s on-line providers and infrastructure, enabling lateral motion. 

Amazon has taken steps to disrupt the marketing campaign and notified victims. 

The corporate has been more and more lively within the risk intelligence house in latest months. It has detailed assaults involving zero-days, malicious NPM packages, and Iranian cyber-enabled kinetic assaults.

Associated: Amazon Disrupts Russian Hacking Marketing campaign Focusing on Microsoft Customers

Associated: US Indicts Extradited Ukrainian on Costs of Aiding Russian Hacking Teams

Associated: Reporters With out Borders Focused by Russian Hackers

Security Week News Tags:Amazon, Attacks, Critical, Favor, Hackers, Infrastructure, Misconfigurations, Russian

Post navigation

Previous Post: Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs
Next Post: Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges

Related Posts

China Accuses US of Cyberattack on National Time Center China Accuses US of Cyberattack on National Time Center Security Week News
Pro-Iranian Group Hacks FBI Director’s Account Pro-Iranian Group Hacks FBI Director’s Account Security Week News
Reach Security Raises  Million for Exposure Management Solution Reach Security Raises $10 Million for Exposure Management Solution Security Week News
US Braces for Cyberattacks After Joining Israel-Iran War US Braces for Cyberattacks After Joining Israel-Iran War Security Week News
Cloudflare Puts a Default Block on AI Web Scraping Cloudflare Puts a Default Block on AI Web Scraping Security Week News
Dozens of Major Data Breaches Linked to Single Threat Actor Dozens of Major Data Breaches Linked to Single Threat Actor Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Security Threats and Global Cyber Developments
  • Telnyx SDK on PyPI Compromised by Hackers
  • European Commission Confirms Cyberattack on Cloud Systems
  • CanisterWorm Malware Threatens Cloud Security Globally
  • Huskeys Secures $8 Million in Seed Funding for ESM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Security Threats and Global Cyber Developments
  • Telnyx SDK on PyPI Compromised by Hackers
  • European Commission Confirms Cyberattack on Cloud Systems
  • CanisterWorm Malware Threatens Cloud Security Globally
  • Huskeys Secures $8 Million in Seed Funding for ESM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark