Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure

Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure

Posted on December 18, 2025December 18, 2025 By CWS

A coalition of U.S. and worldwide cybersecurity businesses issued a stark warning this week about pro-Russia hacktivists exploiting uncovered Digital Community Computing (VNC) connections to infiltrate operational know-how (OT) programs in crucial infrastructure.

The joint advisory, launched December 9, 2025, highlights teams like Cyber Military of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 focusing on water, meals, and agriculture, and power sectors by rudimentary however efficient techniques.

These teams have advanced amid geopolitical tensions since Russia’s 2022 invasion of Ukraine. CARR, initially backed by Russia’s GRU army unit 74455, shifted to OT assaults by late 2023, claiming hits on European wastewater vegetation and U.S. dairy farms.

NoName057(16), tied to a Kremlin-linked youth monitoring heart, focuses on DDoS however collaborates on intrusions. Newer outfits like Z-Pentest, fashioned in September 2024 from CARR and NoName057(16) defectors and Sector16, launched in January 2025, prioritize “hack and leak” operations for publicity, usually exaggerating impacts through Telegram movies.

VNC Connections Exploited

In contrast to subtle APTs, these actors lack deep experience, choosing opportunistic strikes on internet-facing human-machine interfaces (HMIs) with weak VNC protections.

They scan ports like 5900 utilizing Nmap or OpenVAS, deploy VPS-hosted brute-force instruments in opposition to default or easy passwords, then manipulate GUIs to change parameters, disable alarms, or rename gadgets, inflicting “lack of view” that forces guide overrides.

The advisory particulars MITRE ATT&CK methods, from reconnaissance (T1595.002) to influence (T0829: Lack of View). Attackers log credentials, screenshot modifications, and publish proofs on-line, aiming for media buzz somewhat than espionage.

Victims face downtime, remediation prices, and uncommon bodily harm, comparable to disrupted manufacturing unit processes. One April 2025 case noticed simultaneous DDoS aiding SCADA entry, underscoring propagation through shared TTPs amongst allies.

Companies word no accidents but, however warn of escalating dangers to occupied websites. Impacts embrace reprogramming charges and operational halts, amplified by actors’ disregard for security.

Crucial infrastructure homeowners should act swiftly. Prime priorities: remove internet-exposed OT, section IT/OT networks, implement multifactor authentication (MFA), and ban defaults.

Use assault floor instruments to hunt VNC exposures, audit firewalls for egress, and allow view-only modes. Producers ought to ship “safe by design” gadgets with no defaults, SBOMs, and free logging.

Backup HMIs, check guide failsafes, and monitor anomalies like odd logins. Incident response: isolate, hunt, reimage, reprovision credentials, report back to CISA/FBI.

This advisory builds on prior alerts, like CISA’s Might 2025 OT mitigations, urging world vigilance. As hacktivists iterate, forging alliances and amplifying claims, defenders can’t afford complacency. Proactive hardening thwarts these low-barrier threats earlier than they evolve.

Cyber Security News Tags:Access, Connections, Control, Critical, Devices, Gain, Hackers, Hijacking, Infrastructure, VNC

Post navigation

Previous Post: Chinese Based Ink Dragon Compromises Asia and South America into European Government Networks
Next Post: Researchers Uncovered New Lazarus and Kimsuky Infrastructure with Active Tools and Tunnelling Nodes

Related Posts

New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News
Indonesia’s Gambling Ecosystem Exposed With Indicators of National-Level Cyber Operations Indonesia’s Gambling Ecosystem Exposed With Indicators of National-Level Cyber Operations Cyber Security News
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization Cyber Security News
Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Cyber Security News
FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News
Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark