Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

Posted on December 16, 2025December 16, 2025 By CWS

Dec 16, 2025Ravie LakshmananCloud Safety / Vulnerability
Amazon’s menace intelligence crew has disclosed particulars of a “years-long” Russian state-sponsored marketing campaign that focused Western crucial infrastructure between 2021 and 2025.
Targets of the marketing campaign included vitality sector organizations throughout Western nations, crucial infrastructure suppliers in North America and Europe, and entities with cloud-hosted community infrastructure. The exercise has been attributed with excessive confidence to the GRU-affiliated APT44, which is also called FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear.
The exercise is notable for utilizing as preliminary entry vectors misconfigured buyer community edge gadgets with uncovered administration interfaces, as N-day and zero-day vulnerability exploitation exercise declined over the time interval – indicative of a shift in assaults geared toward crucial infrastructure, the tech big mentioned.
“This tactical adaptation allows the identical operational outcomes, credential harvesting, and lateral motion into sufferer organizations’ on-line companies and infrastructure, whereas lowering the actor’s publicity and useful resource expenditure,” CJ Moses, Chief Info Safety Officer (CISO) of Amazon Built-in Safety, mentioned.

The assaults have been discovered to leverage the next vulnerabilities and techniques over the course of 5 years –

2021-2022 – Exploitation of WatchGuard Firebox and XTM flaw (CVE-2022-26318) and concentrating on of misconfigured edge community gadgets
2022-2023 – Exploitation of Atlassian Confluence flaws (CVE-2021-26084 and CVE-2023-22518) and continued concentrating on of misconfigured edge community gadgets
2024 – Exploitation of Veeam flaw (CVE-2023-27532) and continued concentrating on of misconfigured edge community gadgets
2025 – Sustained concentrating on of misconfigured edge community gadgets

The intrusion exercise, per Amazon, singled out enterprise routers and routing infrastructure, VPN concentrators and distant entry gateways, community administration home equipment, collaboration and wiki platforms, and cloud-based mission administration techniques.
These efforts are doubtless designed to facilitate credential harvesting at scale, given the menace actor’s capability to place themselves strategically on the community edge to intercept delicate info in transit. Telemetry knowledge has additionally uncovered what has been described as coordinated makes an attempt geared toward misconfigured buyer community edge gadgets hosted on Amazon Internet Companies (AWS) infrastructure.
“Community connection evaluation reveals actor-controlled IP addresses establishing persistent connections to compromised EC2 situations working clients’ community equipment software program,” Moses mentioned. “Evaluation revealed persistent connections in step with interactive entry and knowledge retrieval throughout a number of affected situations.”

As well as, Amazon mentioned it noticed credential replay assaults towards sufferer organizations’ on-line companies as a part of makes an attempt to acquire a deeper foothold into focused networks. Though these makes an attempt are assessed to be unsuccessful, they lend weight to the aforementioned speculation that the adversary is grabbing credentials from compromised buyer community infrastructure for follow-on assaults.
The whole assault performs out as follows –

Compromise the shopper community edge system hosted on AWS
Leverage native packet seize functionality
Collect credentials from intercepted site visitors
Replay credentials towards the sufferer organizations’ on-line companies and infrastructure
Set up persistent entry for lateral motion

The credential replay operations have focused vitality, expertise/cloud companies, and telecom service suppliers throughout North America, Western and Jap Europe, and the Center East.
“The concentrating on demonstrates sustained give attention to the vitality sector provide chain, together with each direct operators and third-party service suppliers with entry to crucial infrastructure networks,” Moses famous.
Apparently, the intrusion set additionally shares infrastructure overlaps with one other cluster tracked by Bitdefender beneath the identify Curly COMrades, which is believed to be working with pursuits which might be aligned with Russia since late 2023. This has raised the likelihood that the 2 clusters could signify complementary operations inside a broader marketing campaign undertaken by GRU.
“This potential operational division, the place one cluster focuses on community entry and preliminary compromise whereas one other handles host-based persistence and evasion, aligns with GRU operational patterns of specialised subclusters supporting broader marketing campaign targets,” Moses mentioned.
Amazon mentioned it recognized and notified affected clients, in addition to disrupted lively menace actor operations concentrating on its cloud companies. Organizations are beneficial to audit all community edge gadgets for surprising packet seize utilities, implement sturdy authentication, monitor for authentication makes an attempt from surprising geographic places, and hold tabs on credential replay assaults.

The Hacker News Tags:Amazon, Campaign, Cloud, Cyber, Energy, Exposes, GRU, Infrastructure, Targeting, YearsLong

Post navigation

Previous Post: Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
Next Post: Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs

Related Posts

First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package The Hacker News
New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module The Hacker News
Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign The Hacker News
HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass The Hacker News
Why Your Security Culture is Critical to Mitigating Cyber Risk The Hacker News
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks
  • Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks
  • Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark