Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Russian hacking group targets critical infrastructure in the US, the UK, and Canada
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Weaponizing IT software against global enterprises: Since early 2024, the hackers have exploited vulnerabilities in widely used IT management tools, including ConnectWise ScreenConnect (CVE-2024-1709) and Fortinet FortiClient EMS (CVE-2023-48788). By compromising these critical enterprise systems, the group has gained undetected access to networks, Microsoft warned.”Seashell Blizzard’s specialized operations have ranged from espionage to information operations and cyber-enabled disruptions, usually in the form of destructive attacks and manipulation of industrial control systems (ICS),” the report said. “The opportunistic access methods outlined in this campaign will continue to offer Russia opportunities for niche operations and activities.”The group’s evolving tradecraft has made its attacks increasingly difficult to detect, allowing it to establish persistent footholds in high-profile targets worldwide.Some of the notorious attacks of the subgroup include destructive attacks such as KillDisk and FoxBlade, supply-chain attacks such as MeDoc, and pseudo-ransomware attacks such as NotPetya and Prestige, Microsoft noted in the report.

Mounting cyberattacks signal a growing threat to enterprises: Microsoft has linked the subgroup to at least three destructive cyberattacks in Ukraine since 2023, underscoring the severity of its operations. The report highlights that while some attacks appear indiscriminate, the overall strategy provides Russia with valuable cyber access for future military and intelligence operations.”Since April 2022, Russia-aligned threat actors have increasingly targeted international organizations that are either geopolitically significant or provide military and/or political support to Ukraine,” Microsoft noted.The targeted industries include arms manufacturing, shipping, and energy”, sectors critical to national security and geopolitical stability. The campaign’s expanding reach signals an urgent need for stronger cybersecurity measures among enterprises and governments.”Due to their specialization in computer network exploitation (CNE) and expertise targeting critical infrastructure such as ICS and supervisory control and data acquisition systems (SCADA), Seashell Blizzard’s operations have frequently been leveraged during military conflicts and as an adaptable element during contentious geopolitical events,” the report added.The report said that Microsoft is actively tracking Seashell Blizzard’s operations and notifying affected organizations. It also urged enterprises to take immediate action by patching known vulnerabilities, enforcing network segmentation, and adopting a zero-trust security framework. “Security teams should monitor for suspicious activity and review logs for indicators of compromise linked to Seashell Blizzard’s evolving attack methods,” Microsoft suggested in the report.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3823955/russian-hacking-group-targets-critical-infrastructure-in-the-us-the-uk-and-canada.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link