Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
UtiliaCS 970x120
Russian Cyber Operations Shift to Targeting Western Critical Infrastructure

Russian Cyber Operations Shift to Targeting Western Critical Infrastructure

17 December 2025 08:54

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations.

High-level 0-day exploits, often attributed to state-sponsored actors, have seen a significant decline, according to Amazon data for the period 2021-2025.

Previously, these groups were considered the primary perpetrators of such operations. However, they now appear to be focusing on a different approach, aiming to exploit opportunities overlooked by system administrators.

Abandoning their previous strategy of complex software exploits, the group associated with the fearsome Sandworm (also known as APT44 ) has adopted a more stealthy and direct approach.

Based on consistent targeting patterns and infrastructure overlap, Amazon Threat Intelligence assesses with “high confidence that this cluster of activity is associated with the Russian Main Intelligence Directorate (GRU).” This pattern involves targeting poorly configured edge network devices to compromise critical infrastructure across the West.

This report highlights that a key strategic element has allowed these entities to secure a stable presence within essential networks, without significantly increasing their visibility.

“Targeting low-hanging fruit, such as likely misconfigured customer devices with exposed management interfaces, achieves the same strategic goals,” the report notes . By targeting out-of-date or poorly secured routers, VPN concentrators, and network management devices, attackers can harvest credentials and move laterally without burning expensive software exploits.

“The time lag between device compromise and authentication attempts against victim services suggests passive collection rather than active credential theft,” analysts noted.

These stolen credentials are then weaponized in “systematic attacks against the online services of victim organizations,” allowing spies to move from network devices to cloud collaboration platforms and project management systems.

The campaign’s impact overlaps with operations previously attributed to Sandworm, a group known for its destabilizing attacks on the Ukrainian power grid. Researchers also found links to a cluster that Bitdefefem tracks as ” Curly COMrades,” suggesting a potential division of labor in which one team manages initial access while another manages persistence.

Once inside a compromised edge device, attackers don’t just target and steal; they listen . The report suggests the group uses native packet capture capabilities to passively intercept authentication traffic.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.