Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

Posted on December 16, 2025December 16, 2025 By CWS

Russian state-sponsored risk actors look like favoring misconfigurations over the exploitation of vulnerabilities for getting access to the techniques of focused crucial infrastructure organizations, in keeping with Amazon’s risk intelligence staff.

The malicious exercise has been linked to the broadly identified Russian risk actor named Sandworm, which has led Amazon’s consultants to conclude that the assaults are probably carried out by hackers related to Russia’s GRU navy intelligence company. 

Amazon has additionally seen some infrastructure overlaps with hackers tracked by Bitdefender as Curly COMrades, who could have been answerable for post-exploitation actions. 

Over the previous 5 years, Amazon has seen assaults geared toward vitality organizations in Western nations, crucial infrastructure in North America and Europe, and numerous kinds of organizations with cloud-hosted community infrastructure. 

The tech big has monitored the risk actors’ assaults between 2021 and 2025, and up till this yr they usually achieved preliminary entry by way of the exploitation of zero-day and n-day vulnerabilities.

Examples of vulnerabilities exploited between 2021 and 2024 embrace the WatchGuard flaw CVE-2022-26318, Confluence flaws CVE-2021-26084 and CVE-2023-22518, and the Veeam product flaw CVE-2023-27532.  

The attackers have been beforehand noticed concentrating on misconfigured units for preliminary entry. Nonetheless, beginning in 2025, Amazon’s risk intelligence staff has seen a decline within the exploitation of vulnerabilities and an elevated give attention to the concentrating on of misconfigured community edge units.

“This tactical adaptation permits the identical operational outcomes, credential harvesting, and lateral motion into sufferer organizations’ on-line providers and infrastructure, whereas lowering the actor’s publicity and useful resource expenditure,” Amazon stated.Commercial. Scroll to proceed studying.

The Russian hackers have been noticed concentrating on enterprise routers, VPN concentrators and distant entry gateways, collaboration platforms, community administration home equipment, and mission administration techniques. 

Amazon was capable of monitor assaults as a result of the focused community edge units have been hosted on AWS — clients’ failure to securely configure the units made them low-hanging fruit that could possibly be simply hacked and abused for preliminary entry.

The attackers have been additionally seen leveraging native packet-capture capabilities to intercept site visitors from which they might acquire credentials. The credentials then allowed the risk actors to conduct replay assaults towards the sufferer’s on-line providers and infrastructure, enabling lateral motion. 

Amazon has taken steps to disrupt the marketing campaign and notified victims. 

The corporate has been more and more lively within the risk intelligence house in latest months. It has detailed assaults involving zero-days, malicious NPM packages, and Iranian cyber-enabled kinetic assaults.

Associated: Amazon Disrupts Russian Hacking Marketing campaign Focusing on Microsoft Customers

Associated: US Indicts Extradited Ukrainian on Costs of Aiding Russian Hacking Teams

Associated: Reporters With out Borders Focused by Russian Hackers

Security Week News Tags:Amazon, Attacks, Critical, Favor, Hackers, Infrastructure, Misconfigurations, Russian

Post navigation

Previous Post: Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs
Next Post: Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges

Related Posts

Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025 Security Week News
Helmet Security Emerges From Stealth Mode With $9 Million in Funding Security Week News
Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch Security Week News
Critical Triofox Vulnerability Exploited in the Wild Security Week News
CISA Warns of Attacks Exploiting N-able Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark