The FBI has issued a public service announcement warning that Russian cyber actors linked to the FSB, specifically the Static Tundra group, are exploiting a seven-year-old vulnerability in Cisco networking devices to target critical infrastructure sectors globally, including telecommunications, education, manufacturing, power grids, and water treatment facilities. This flaw, patched in 2018 but still present in many end-of-life and unpatched Cisco devices, is being used to steal network configurations, implant malware such as SYNful Knock, hijack traffic, and conduct cyber espionage. The FBI highlighted that these attacks have compromised thousands of critical U.S. infrastructure IT systems. The Russian espionage campaign has been ongoing for over a decade, establishing persistent access to sensitive networks worldwide. The FBI’s warnings come amid heightened diplomatic tensions with Russia. Additionally, cybersecurity experts emphasize the need for vigilance and system updates to mitigate these threats. Separate reports also note Chinese malware targeting U.S. energy, water, pipeline, and transportation systems, underscoring the broader cyber threat landscape facing U.S. critical infrastructure.
A Darktrace investigation has revealed how attackers used VPS endpoints to hijack accounts, conceal phishing activity, and bypass traditional security defences. https://t.co/dHXUnCQs6t #Tech | #News | #Darktrace
“Chinese malware has been discovered embedded in U.S. energy, water, pipeline, and transportation systems,” writes Anne Neuberger. To protect its infrastructure, the United States needs AI-powered digital twins “to safely test dangerous attack scenarios.” https://t.co/W1kEIHYgxG
Android.Backdoor.916.origin malware targets Russian business executives https://t.co/j01Dz0KN8w