Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure

Posted on December 18, 2025December 18, 2025 By CWS

A coalition of U.S. and worldwide cybersecurity businesses issued a stark warning this week about pro-Russia hacktivists exploiting uncovered Digital Community Computing (VNC) connections to infiltrate operational know-how (OT) programs in crucial infrastructure.

The joint advisory, launched December 9, 2025, highlights teams like Cyber Military of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 focusing on water, meals, and agriculture, and power sectors by rudimentary however efficient techniques.

These teams have advanced amid geopolitical tensions since Russia’s 2022 invasion of Ukraine. CARR, initially backed by Russia’s GRU army unit 74455, shifted to OT assaults by late 2023, claiming hits on European wastewater vegetation and U.S. dairy farms.

NoName057(16), tied to a Kremlin-linked youth monitoring heart, focuses on DDoS however collaborates on intrusions. Newer outfits like Z-Pentest, fashioned in September 2024 from CARR and NoName057(16) defectors and Sector16, launched in January 2025, prioritize “hack and leak” operations for publicity, usually exaggerating impacts through Telegram movies.

VNC Connections Exploited

In contrast to subtle APTs, these actors lack deep experience, choosing opportunistic strikes on internet-facing human-machine interfaces (HMIs) with weak VNC protections.

They scan ports like 5900 utilizing Nmap or OpenVAS, deploy VPS-hosted brute-force instruments in opposition to default or easy passwords, then manipulate GUIs to change parameters, disable alarms, or rename gadgets, inflicting “lack of view” that forces guide overrides.

The advisory particulars MITRE ATT&CK methods, from reconnaissance (T1595.002) to influence (T0829: Lack of View). Attackers log credentials, screenshot modifications, and publish proofs on-line, aiming for media buzz somewhat than espionage.

Victims face downtime, remediation prices, and uncommon bodily harm, comparable to disrupted manufacturing unit processes. One April 2025 case noticed simultaneous DDoS aiding SCADA entry, underscoring propagation through shared TTPs amongst allies.

Companies word no accidents but, however warn of escalating dangers to occupied websites. Impacts embrace reprogramming charges and operational halts, amplified by actors’ disregard for security.

Crucial infrastructure homeowners should act swiftly. Prime priorities: remove internet-exposed OT, section IT/OT networks, implement multifactor authentication (MFA), and ban defaults.

Use assault floor instruments to hunt VNC exposures, audit firewalls for egress, and allow view-only modes. Producers ought to ship “safe by design” gadgets with no defaults, SBOMs, and free logging.

Backup HMIs, check guide failsafes, and monitor anomalies like odd logins. Incident response: isolate, hunt, reimage, reprovision credentials, report back to CISA/FBI.

This advisory builds on prior alerts, like CISA’s Might 2025 OT mitigations, urging world vigilance. As hacktivists iterate, forging alliances and amplifying claims, defenders can’t afford complacency. Proactive hardening thwarts these low-barrier threats earlier than they evolve.

Cyber Security News Tags:Access, Connections, Control, Critical, Devices, Gain, Hackers, Hijacking, Infrastructure, VNC

Post navigation

Previous Post: Chinese Based Ink Dragon Compromises Asia and South America into European Government Networks
Next Post: Researchers Uncovered New Lazarus and Kimsuky Infrastructure with Active Tools and Tunnelling Nodes

Related Posts

North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets Cyber Security News
Microsoft Details Security Risks of New Agentic AI Feature Cyber Security News
Four Hackers Arrested by UK Police for Attacks on M&S, Co-op and Harrods Stores Cyber Security News
Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy Cyber Security News
Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories
  • Researchers Uncovered New Lazarus and Kimsuky Infrastructure with Active Tools and Tunnelling Nodes
  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • Chinese Based Ink Dragon Compromises Asia and South America into European Government Networks
  • The Case for Dynamic AI-SaaS Security as Copilots Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories
  • Researchers Uncovered New Lazarus and Kimsuky Infrastructure with Active Tools and Tunnelling Nodes
  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • Chinese Based Ink Dragon Compromises Asia and South America into European Government Networks
  • The Case for Dynamic AI-SaaS Security as Copilots Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark