Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed

May 6, 2026

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

May 6, 2026

North Korean APT Targets Yanbian Gamers via Trojanized Platform

May 5, 2026
Facebook X (Twitter) Instagram
Wednesday, May 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Small Defense Firms Lack Network Data to Stop Nation-State Hackers
News

Small Defense Firms Lack Network Data to Stop Nation-State Hackers

Team-CWDBy Team-CWDMay 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The US defense industrial base (DIB) has become a prime target for nation-state hacking groups, yet small defense contractors critically lack network telemetry to detect these threats, a Team Cymru security analyst has argued.

In an article published on April 29, Stephen Campbell, senior threat intelligence advisor at Team Cymru, highlighted that recently some of the most notorious state-backed cyber espionage groups have started investing significantly more time in reconnaissance and pre-positioning operations than in the past.

The groups described by Campbell include China’s Volt and Salt Typhoon, Russia’s Fancy Bear (aka GRU Unit 26165) and Iran’s UNC1549.

According to the analyst, these hacking units heavily rely on one type of entry point: edge infrastructure, which includes internet routers, firewalls and VPN gateways.

The analyst noted that in 2025, over 14 zero-day vulnerabilities were observed in these types of devices.

“Volt Typhoon is a clear example. They maintained access to US critical infrastructure for over five years before it was publicly disclosed. This is not an attack. It is intelligence preparation of the battlefield, carried out in cyberspace,” Campbell wrote.

This targeting of edge devices, he argued, is the main reason some of these cyber espionage campaigns are successful.

While the common image people may have of the US defense industrial base includes powerhouses like Raytheon or Northrop Grumman, Campbell noted that around 80% of the DIB is made up of small and mid-size contractors.

“These companies hold sensitive data. Contracts, technical specifications and personnel information tied to clearances,” he said.

Despite how critical these small defense firms may be for the US DIB, Campbell noted that many of them “are not resourced to defend at the same level as the primes,” resulting in “a mismatch” between what they hold and what they can protect.

Specifically, the analyst argued that small DIB contractors are less likely to have endpoint detection capabilities and to have strict edge device patching policies, meaning these assets “can fall outside the scope of regular security monitoring.”

“Telemetry from edge infrastructure further shows these devices frequently communicating with previously unseen or short-lived external infrastructure, often before those endpoints are publicly identified as malicious,” he wrote.

Additionally, Campbell said nation-state groups like Volt Typhoon increasingly rely on “native system tools” instead of deploying custom malware. This ‘living-off-the-land’ (LOTL) approach allows these actors to operate without generating traditional endpoint alerts, making it critical to monitor the network level, where usually lie the “only observable indicators.”

Nation-state actors also increasingly leverage legitimate services such as cloud platforms, code repositories and commercial virtual private server (VPS) providers, rather than relying on malicious servers, meaning traffic patterns resemble normal enterprise usage and thus rendering detection even more difficult.

To fill this “structural gap,” Campbell recommended small DIB contractors to prioritize network telemetry by deploying NetFlow pattern recognition on edge devices and infrastructure mapping to detect nation-state threats, harden infrastructure through immediate patching and segmentation, hunt for pre-positioning by tracking anomalous DNS and lateral movement.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud
Next Article Trellix Reveals Unauthorized Access to Source Code
Team-CWD
  • Website

Related Posts

News

AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed

May 6, 2026
News

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

May 6, 2026
News

North Korean APT Targets Yanbian Gamers via Trojanized Platform

May 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Common Apple Pay scams, and how to stay safe

January 22, 2026

What’s at stake if your employees post too much online

December 1, 2025

Here’s what you should know

February 6, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.