Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Sandworm Hackers Shift Focus to Critical Infrastructure

Sandworm Hackers Shift Focus to Critical Infrastructure

Posted on May 14, 2026 By CWS

A notorious Russian hacking group known as Sandworm has shifted its focus from compromised IT networks to operational technology (OT) systems, which are integral to physical infrastructure. This strategic move leverages existing vulnerabilities rather than new exploits, posing significant risks to industrial control systems.

Sandworm: A Persistent Threat

Identified by various aliases such as APT44 and Voodoo Bear, Sandworm is linked to GRU Unit 74455, a Russian military intelligence unit. The group is infamous for past cyber-sabotage campaigns, including attacks on Ukraine’s power grid and the 2017 NotPetya malware outbreak. Unlike financially driven cybercriminals, Sandworm aims to cause disruption and potential physical damage.

Recent analysis by Nozomi Networks, covering data from July 2025 to January 2026, revealed 29 incidents involving Sandworm. The group is known for its methodical and aggressive approach, persisting even when detected.

Exploiting Known Vulnerabilities

The alarming aspect of Sandworm’s latest campaign is its reliance on long-standing, unpatched vulnerabilities. Systems had been issuing high-confidence security alerts for weeks before Sandworm’s arrival, yet these warnings were largely ignored. Common exploit tools like EternalBlue and WannaCry were used to infiltrate environments already compromised by other attackers.

Once inside, Sandworm launched lateral attacks within networks, targeting industrial control systems. A single compromised system was found to attack up to 405 internal targets, focusing on engineering workstations and essential control devices.

Escalation and Defensive Measures

Upon detection, Sandworm does not retreat but instead escalates its activity. This includes increasing alert volumes, introducing new attack methods, and intensifying focus on industrial systems. Partial detection without effective containment can exacerbate the situation.

For effective defense, Nozomi Networks advises treating routine alerts seriously, enforcing network segmentation, and resolving past security breaches. It is crucial to treat engineering workstations and ICS management systems as critical assets, ensuring they remain offline from general internet access.

Sandworm’s exploitation of previously compromised environments underscores the need for strong security fundamentals to prevent such intrusions.

Stay informed with updates on cybersecurity by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for instant updates.

Cyber Security News Tags:Cobalt Strike, cyber attack, cyber threats, Cybersecurity, EternalBlue, GRU Unit 74455, ICS security, industrial control systems, IT security, Nozomi Networks, operational technology, Sandworm, Vulnerabilities

Post navigation

Previous Post: node-ipc npm Package Attack: Key Details and Response

Related Posts

Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems Cyber Security News
GitHub RCE Flaw Threatens Server Security GitHub RCE Flaw Threatens Server Security Cyber Security News
Hackers Exploit Fake OpenClaw Installer to Steal Data Hackers Exploit Fake OpenClaw Installer to Steal Data Cyber Security News
McGraw-Hill Data Breach Exposes 13.5 Million Users McGraw-Hill Data Breach Exposes 13.5 Million Users Cyber Security News
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks Cyber Security News
Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Sandworm Hackers Shift Focus to Critical Infrastructure
  • node-ipc npm Package Attack: Key Details and Response
  • Malicious Code Detected in Node-IPC Package Versions
  • TencShell Malware Threatens Cybersecurity with Advanced Capabilities
  • Cisco Catalyst SD-WAN Flaw Exploited for Admin Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Sandworm Hackers Shift Focus to Critical Infrastructure
  • node-ipc npm Package Attack: Key Details and Response
  • Malicious Code Detected in Node-IPC Package Versions
  • TencShell Malware Threatens Cybersecurity with Advanced Capabilities
  • Cisco Catalyst SD-WAN Flaw Exploited for Admin Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark