Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems

Posted on August 21, 2025August 21, 2025 By CWS

A Russian state-sponsored cyber espionage group designated as Static Tundra has been actively exploiting a seven-year-old vulnerability in Cisco networking units to steal configuration information and set up persistent entry throughout important infrastructure networks.

The subtle menace actor, linked to Russia’s Federal Safety Service (FSB) Middle 16 unit, has been concentrating on unpatched and end-of-life community units since 2015, with operations considerably escalating following the Russia-Ukraine battle.

The marketing campaign facilities round CVE-2018-0171, a beforehand disclosed vulnerability in Cisco IOS software program’s Good Set up characteristic that enables unauthenticated distant attackers to execute arbitrary code or set off denial-of-service situations.

Regardless of Cisco issuing patches in 2018, Static Tundra continues to seek out success exploiting organizations which have failed to use safety updates or are working legacy units past their assist lifecycle.

Static Tundra’s victims span telecommunications, increased schooling, and manufacturing sectors throughout North America, Asia, Africa, and Europe.

The group demonstrates exceptional persistence, sustaining entry to compromised environments for a number of years with out detection.

Cisco Talos analysts recognized the menace cluster by way of ongoing evaluation of refined community system compromises, noting the group’s superior information of community infrastructure and deployment of bespoke exploitation instruments.

Assault Methodology and Configuration Exfiltration

Static Tundra employs a methodical method to configuration theft, starting with automated exploitation of the Good Set up vulnerability towards predetermined goal lists doubtless gathered from public scanning companies like Shodan or Censys.

Upon profitable exploitation, the attackers instantly modify the working configuration to allow native Trivial File Switch Protocol (TFTP) companies utilizing the command:-

tftp-server nvram:startup-config

This command creates a brief TFTP server that enables Static Tundra to determine a secondary connection and retrieve the system’s startup configuration file.

The extracted configurations usually comprise delicate credentials and Easy Community Administration Protocol (SNMP) neighborhood strings that facilitate deeper community penetration.

The menace actors leverage these compromised credentials to pivot laterally by way of community environments, utilizing SNMP protocols with spoofed supply addresses to bypass entry management lists.

Static Tundra has been noticed creating privileged native consumer accounts and establishing Generic Routing Encapsulation tunnels to redirect and seize community visitors of intelligence worth, demonstrating their deal with long-term espionage slightly than quick monetary achieve.

Increase your SOC and assist your workforce shield your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:7YearOld, Cisco, Collect, Configs, Exploiting, Hackers, Industrial, Russian, Systems, Vulnerability

Post navigation

Previous Post: Europol Says Qilin Ransomware Reward Fake
Next Post: Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data

Related Posts

Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Cyber Security News
Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware Cyber Security News
Reflectiz Now Available on the Datadog Marketplace Cyber Security News
Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies Cyber Security News
Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Cyber Security News
11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark