Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

Posted on December 16, 2025December 16, 2025 By CWS

Russian state-sponsored risk actors look like favoring misconfigurations over the exploitation of vulnerabilities for getting access to the techniques of focused crucial infrastructure organizations, in keeping with Amazon’s risk intelligence staff.

The malicious exercise has been linked to the broadly identified Russian risk actor named Sandworm, which has led Amazon’s consultants to conclude that the assaults are probably carried out by hackers related to Russia’s GRU navy intelligence company. 

Amazon has additionally seen some infrastructure overlaps with hackers tracked by Bitdefender as Curly COMrades, who could have been answerable for post-exploitation actions. 

Over the previous 5 years, Amazon has seen assaults geared toward vitality organizations in Western nations, crucial infrastructure in North America and Europe, and numerous kinds of organizations with cloud-hosted community infrastructure. 

The tech big has monitored the risk actors’ assaults between 2021 and 2025, and up till this yr they usually achieved preliminary entry by way of the exploitation of zero-day and n-day vulnerabilities.

Examples of vulnerabilities exploited between 2021 and 2024 embrace the WatchGuard flaw CVE-2022-26318, Confluence flaws CVE-2021-26084 and CVE-2023-22518, and the Veeam product flaw CVE-2023-27532.  

The attackers have been beforehand noticed concentrating on misconfigured units for preliminary entry. Nonetheless, beginning in 2025, Amazon’s risk intelligence staff has seen a decline within the exploitation of vulnerabilities and an elevated give attention to the concentrating on of misconfigured community edge units.

“This tactical adaptation permits the identical operational outcomes, credential harvesting, and lateral motion into sufferer organizations’ on-line providers and infrastructure, whereas lowering the actor’s publicity and useful resource expenditure,” Amazon stated.Commercial. Scroll to proceed studying.

The Russian hackers have been noticed concentrating on enterprise routers, VPN concentrators and distant entry gateways, collaboration platforms, community administration home equipment, and mission administration techniques. 

Amazon was capable of monitor assaults as a result of the focused community edge units have been hosted on AWS — clients’ failure to securely configure the units made them low-hanging fruit that could possibly be simply hacked and abused for preliminary entry.

The attackers have been additionally seen leveraging native packet-capture capabilities to intercept site visitors from which they might acquire credentials. The credentials then allowed the risk actors to conduct replay assaults towards the sufferer’s on-line providers and infrastructure, enabling lateral motion. 

Amazon has taken steps to disrupt the marketing campaign and notified victims. 

The corporate has been more and more lively within the risk intelligence house in latest months. It has detailed assaults involving zero-days, malicious NPM packages, and Iranian cyber-enabled kinetic assaults.

Associated: Amazon Disrupts Russian Hacking Marketing campaign Focusing on Microsoft Customers

Associated: US Indicts Extradited Ukrainian on Costs of Aiding Russian Hacking Teams

Associated: Reporters With out Borders Focused by Russian Hackers

Security Week News Tags:Amazon, Attacks, Critical, Favor, Hackers, Infrastructure, Misconfigurations, Russian

Post navigation

Previous Post: Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs
Next Post: Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges

Related Posts

Google Discloses Data Breach via Salesforce Hack  Google Discloses Data Breach via Salesforce Hack  Security Week News
Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ Security Week News
Fraud Prevention Firm Resistant AI Raises  Million Fraud Prevention Firm Resistant AI Raises $25 Million Security Week News
M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal Security Week News
Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks Security Week News
Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News