The FBI has issued a public service announcement warning that Russian cyber actors linked to the Federal Security Service (FSB), specifically the Static Tundra group, are exploiting a seven-year-old vulnerability in Cisco networking devices. These attacks target end-of-life and unpatched devices across critical infrastructure sectors including telecommunications, education, manufacturing, power grids, water treatment facilities, and other key systems in the United States and globally. The hackers are stealing device configurations, planting implants such as SYNful Knock, and hijacking network traffic to conduct espionage and maintain persistent access. This vulnerability, which was patched in 2018, continues to be abused to compromise thousands of network devices worldwide. The FBI has highlighted the activity of the FSB Center 16 unit in conducting these operations. The ongoing cyber espionage campaign coincides with heightened diplomatic tensions involving Russia. Additional reports note that other state-sponsored cyber threats, including Chinese malware embedded in U.S. energy and transportation systems, underscore the need for advanced defensive measures such as AI-powered digital twins to simulate and mitigate attack scenarios.
A Darktrace investigation has revealed how attackers used VPS endpoints to hijack accounts, conceal phishing activity, and bypass traditional security defences. https://t.co/dHXUnCQs6t #Tech | #News | #Darktrace
“Chinese malware has been discovered embedded in U.S. energy, water, pipeline, and transportation systems,” writes Anne Neuberger. To protect its infrastructure, the United States needs AI-powered digital twins “to safely test dangerous attack scenarios.” https://t.co/W1kEIHYgxG
Android.Backdoor.916.origin malware targets Russian business executives https://t.co/j01Dz0KN8w