Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Pro-Russia Hackers Target US Critical Infrastructure in New Wave
Cyber Security

Pro-Russia Hackers Target US Critical Infrastructure in New Wave

Team-CWDBy Team-CWDDecember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Loosely organized pro-Russia hacktivist groups have been observed exploiting exposed virtual network computing connections to breach operational technology systems across multiple sectors.

According to a new report by CISA, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and other national and international partners, the attacks are part of a surge in low-skilled but disruptive intrusions affecting entities in water treatment, food production and energy in the US.

According to the authoring organizations, groups such as Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16) and Sector16 are using simple reconnaissance tools and common password-guessing techniques to reach internet-facing human-machine interfaces.

Their activity, though less advanced than that of state-directed threat groups, has led to physical impacts in some cases.

CISA said these hacktivists typically seek visibility rather than strategic advantage, often overstating the scale of incidents they publicize online.

Even so, operators have faced temporary loss of view and costly manual recovery efforts after attackers altered parameters, disabled alarms or restarted devices.

The advisory outlined how several pro-Russia collectives have expanded since 2022, with some receiving indirect or direct support from Russian state-linked organizations.

CARR and NoName057(16) collaborated extensively before forming Z-Pentest in 2024, while Sector16 emerged in early 2025 through similar alliances. Each group relies on widely available tools to scan ports, brute-force weak passwords and record screenshots of compromised systems for online distribution.

Read more on critical infrastructure cyber-threats: Critical Infrastructure Urged to Scrutinize Product Security During Procurement

Recommended Steps For Operators

The report stressed that owners of industrial and operational technology should tighten exposure and authentication practices. Suggested measures include:

  • Reducing public internet access to OT assets

  • Adopting stronger asset management, such as mapping data flows

  • Using robust authentication, including multi-factor authentication (MFA) where possible

The advisory also highlighted the importance of network segmentation, strict firewall policies, updated software and contingency plans that allow for rapid manual operation if systems are compromised.

It warned that organizations discovering exposed systems with weak credentials should assume compromise and initiate incident response immediately.

While these attacks remain relatively unsophisticated, the authoring agencies caution that continued activity could result in more severe consequences.

“The pro-Russia hacktivist groups highlighted in this advisory have demonstrated intent and capability to inflict tangible harm on vulnerable systems,” warned CISA executive assistant director for cybersecurity, Nick Andersen.

“In addition to implementing the recommended mitigations and rigorously validating their security controls, we are calling upon all OT device manufacturers to prioritize secure-by-design principles – because building in security from the start is essential to reducing risk and safeguarding the nation’s most vital systems.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIran-Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
Next Article Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.