Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

December 16, 2025

Amazon Warns Russian GRU Hackers Target Western Firms via Edge Devices

December 16, 2025

Top 10 Cyber-Attacks of 2025

December 16, 2025
Facebook X (Twitter) Instagram
Tuesday, December 16
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Amazon Warns Russian GRU Hackers Target Western Firms via Edge Devices
News

Amazon Warns Russian GRU Hackers Target Western Firms via Edge Devices

Team-CWDBy Team-CWDDecember 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A Russian state-sponsored malicious campaign that has been targeting critical infrastructure organizations in Western countries for years has shifted its tactics from vulnerability exploitation to compromising misconfigured customer network edge devices.

While the threat actor remains unidentified, Amazon has attributed it “with high confidence” to Russia’s Main Intelligence Directorate (GRU), the country’s military intelligence service which several cyber threat groups are believed to be associated with.

The tech giant documented its latest findings about this threat in a December 15 report.

Shift to Misconfigured Edge Device Targeting

Security researchers at Amazon Threat Intelligence observed this unnamed group targeting global infrastructure between 2021 and 2025.

The group’s typical targets have been energy sector organizations across Western nations, critical infrastructure providers in North America and Europe and organizations with cloud-hosted network infrastructure.

Some of its previous campaigns included the exploitation of vulnerabilities in WatchGuard (e.g. CVE-2022-26318) in 2021 and 2022, in Confluence (e.g. CVE-2021-26084, CVE-2023-22518) in 2022 and 2023 and in Veeam (e.g. CVE-2023-27532) in 2024.

However, Amazon noticed that in 2025, the group shifted it tactics away from vulnerability exploits and now favors the targeting of misconfigured customer network edge device – including some hosted on Amazon Web Services (AWS) – to gain initial access to its victims.

The Amazon report highlighted that the device misconfigurations are on the customer side, not on the AWS cloud infrastructure.

Some of the group’s typical targets include:

  • Enterprise routers and routing infrastructure
  • VPN concentrators and remote access gateways
  • Network management appliances
  • Collaboration and wiki platforms
  • Cloud-based project management systems

“This tactical adaptation enables the same operational outcomes, persistent access to critical infrastructure networks, credential harvesting and lateral movement into victim organizations’ online services and infrastructure, while reducing the actor’s exposure and resource expenditure,” the Amazon researchers noted.

Other tactics observed with this group by the Amazon researchers include harvesting credentials from compromised infrastructure to launch systematic replay attacks against victim organizations’ online services.

Likely Part of a Bigger Russian GRU Campaign

The attribution to the Russian GRU is based on infrastructure overlaps with previous operations linked to another GRU-linked threat group, known as Sandworm, APT44 or Seashell Blizzard.

The latest campaign targeting misconfigured edge devices also contain infrastructure overlaps with a group Bitdefender tracks as ‘Curly COMrades.’

This operation, documented by the cybersecurity firm on November 4, 2025, showed the Curly COMrades group abusing Hyper-V, Microsoft’s native hypervisor technology, to evade endpoint detection and response (EDR) solutions and deploying two custom implants CurlyShell and CurlCat.

“We assess these may represent complementary operations within a broader GRU campaign, where one cluster focuses on network access and initial compromise while another handles host-based persistence and evasion,” the Amazone researchers wrote.

This operational division “aligns with GRU operational patterns of specialized subclusters supporting broader campaign objectives,” the Amazon report concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop 10 Cyber-Attacks of 2025
Next Article How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
Team-CWD
  • Website

Related Posts

News

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

December 16, 2025
News

Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features

December 16, 2025
News

Millions of Car Owners Hit By Credit700 Data Breach

December 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

What parents should know to protect their children from doxxing

November 28, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.